CoreLabs Information Security Publications

Below is an index of publications, presentations and papers authored by members of the CoreLabs research team. Click on any title to get more information and access the publication on the CoreLabs extranet site.

Title Authors Publication Date Venue / Publicationsort descending
Security in Free Software Carlos Sarraute and Ariel Futoransky 06.07.2005 Second Free Software National Congress 
Bug Hunting: The Seven Ways of the Security Samurai Iván Arce 04.01.2002 Security & Privacy - Supplement to Computer Magazine. 
Simulating Cyber-Attacks for Fun and Profit Ariel Futoransky, Fernando Miranda, Jose Orlicki and Carlos Sarraute 03.02.2009 SIMUTools'09
Outrepasser les limites des techniques classiques de Prise d'Empreintes grace aux Réseaux de Neurones, Javier Burroni Javier Burroni and Carlos Sarraute 05.31.2006 Symposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC)
Enforcing Privacy in Web Applications A. Futoransky and A. Waissbein 10.11.2005 Third Annual Conference on Privacy, Security and Trust
Your risk is not what it used to be Ariel Waissbein 09.26.2008 ToorCon X
HoneySAP: Who really wants your money Martin Gallo 03.18.2015 Troopers
SAP’s Network Protocols Revisited Martin Gallo 03.19.2014 Troopers 2014 Conference
A Penetration Testing Learning Kit Ariel Waissbein 04.23.2008 Troopers08
POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing Carlos Sarraute, Olivier Buffet, Joerg Hoffmann 07.23.2012 Twenty-Sixth Conference on Artificial Intelligence (AAAI-12)
Virtualization in software development and QA Marcelo Picorelli 01.01.2006 VMworld `06
Faceted Ranking in Collaborative Tagging Systems Pablo Fierens, Jose Ignacio Alvarez-Hamelin, Jose Orlicki 03.23.2009 WEBIST 2009
CORE IMPACT: Penetration Test Automation Iván Arce 08.01.2001 White paper
SQL/JavaScript Hybrid Worms As Two-stage Quines José Orlicki 08.26.2009 Workshop de Seguridad Informática (WSegI)
Tecnologías Emergentes y Tendencias de Seguridad: Una aproximación desde el punto de vista de un atacante Iván Arce 08.26.2009 Workshop de Seguridad Informática 2009 (WSegI)

Pages