CoreLabs Information Security Publications

Below is an index of publications, presentations and papers authored by members of the CoreLabs research team. Click on any title to get more information and access the publication on the CoreLabs extranet site.

Titlesort descending Authors Publication Date Venue / Publication
Una técnica de protección para agentes móviles contra estaciones (hosts) maliciosas Ariel Waissbein 11.01.2005 3er Congreso Iberoamericano de Seguridad Informática (CIBSI)
Uncovering SAP vulnerabilities: reversing and breaking the Diag protocol Martin Gallo 07.30.2012 Defcon 20 Conference
Uncovering SAP vulnerabilities: reversing and breaking the Diag protocol Martin Gallo 09.22.2012 BruCon 2012
Using AI Techniques to improve Pentesting Automation Carlos Sarraute 04.08.2010 Hackito Ergo Sum (HES)
Using Neural Networks to improve classical Operating System Fingerprinting techniques Carlos Sarraute and Javier Burroni 03.01.2008 Electronic Journal of SADIO
VCR y PEO, dos protocolos criptográficos simples (Spanish) A. Futoransky and E. Kargieman 07.11.1995 Jornadas Argentinas de Informática e Investigación Operativa
VGA Persistent Rootkit Diego Juarez, Nicolás A. Economou 09.23.2012 Ekoparty 2012
Viral Infections in Cisco IOS Ariel Futoransky 08.06.2008 BlackHat ’08 USA
Virtualization in software development and QA Marcelo Picorelli 01.01.2006 VMworld `06
Voices, I hear voices Iván Arce 08.08.2006 IEEE Computer Society - Security & Privacy magazine Vol 4. No 4.
Vulnerability Management at the Crossroads, part I Iván Arce 05.24.2008 Network Security
Vulnerability Management at the Crossroads, part II Iván Arce 06.10.2008 Network Security
Why Attacking Systems Is a Good Idea Iván Arce, Gary Mcgraw 08.01.2004 IEEE Computer Society - Security & Privacy Magazine, Vol. 2, No. 4.
WPA Migration Mode: WEP is back to haunt you... Leandro Meiners and Diego Sor 07.28.2010 BlackHat 2010 USA
Your risk is not what it used to be Ariel Waissbein 09.26.2008 ToorCon X

Pages