CoreLabs Information Security Publications

Below is an index of publications, presentations and papers authored by members of the CoreLabs research team. Click on any title to get more information and access the publication on the CoreLabs extranet site.

Titlesort descending Authors Publication Date Venue / Publication
Tendencias de seguridad en tecnologías para aplicaciones Iván Arce 10.02.2009 Jornadas de Seguridad Informática 2009
The impact of predicting attacker tools in security risk assessments Ezequiel Gutesman, Ariel Waissbein 04.21.2010 6th Annual Cyber Security and Information Intelligence Research Workshop - Oak Ridge National Laboratory
The ND2DB attack: Database content extraction using timing attacks on the indexing algorithms Ariel Futoransky, Damian Saura, and Ariel Waissbein. 08.13.2007 First Workshop on Offensive Technologies (WOOT `07)
The Rise of the Gadgets Iván Arce 10.01.2003 IEEE Security and Privacy, vol. 1, no. 5
The Shellcode Generation Iván Arce 09.01.2004 IEEE Computer Society - Security & Privacy Magazine, Vol. 2, No. 5
Timing Attacks for Recovering Private Entries From Database Engines Ariel Futoransky, Damian Saura, and Ariel Waissbein 08.01.2007 Black Hat USA 2007 
Timing Attacks for Recovering Private Entries From Database Engines (RSA Conference) Ariel Waissbein. Joint work with Ariel Futoransky, Damian Saura and Pedro Varangot 04.07.2008 RSA Conference 2008
Two very small reverse engineering tools: a python disassembling engine and an iterative reverse engineering framework Gerardo Richarte 06.15.2008 ReCon 2008
Una técnica de protección para agentes móviles contra estaciones (hosts) maliciosas Ariel Waissbein 11.01.2005 3er Congreso Iberoamericano de Seguridad Informática (CIBSI)
Uncovering SAP vulnerabilities: reversing and breaking the Diag protocol Martin Gallo 07.30.2012 Defcon 20 Conference
Using AI Techniques to improve Pentesting Automation Carlos Sarraute 04.08.2010 Hackito Ergo Sum (HES)
Using Neural Networks to improve classical Operating System Fingerprinting techniques Carlos Sarraute and Javier Burroni 03.01.2008 Electronic Journal of SADIO
VCR y PEO, dos protocolos criptográficos simples (Spanish) A. Futoransky and E. Kargieman 07.11.1995 Jornadas Argentinas de Informática e Investigación Operativa
VGA Persistent Rootkit Diego Juarez, Nicolás A. Economou 09.23.2012 Ekoparty 2012
Viral Infections in Cisco IOS Ariel Futoransky 08.06.2008 BlackHat ’08 USA

Pages