Information Security Resources

CoreLabs Information Security Publications

Below is an index of publications, presentations and papers authored by members of the CoreLabs research team. Click on any title to get more information and access the publication on the CoreLabs extranet site

Title Authors Publication Date Venue / Publicationsort descending
McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables Roberto Perdisci, Andrea Lanzi and Wenke Lee 12/08/08 Computer Security Applications Conference
Ether: Malware Analysis via Hardware Virtualization Extensions Artem Dinaburg, Paul Royal, Monirul Sharif and Wenke Lee 10/27/08 15th ACM Conference on Computer and Communications Security
Security vulnerabilities, exploits and attack patterns: 15 years of art, pseudo-science, fun & profit Iván Arce 07/31/07 15th USENIX Security Symposium, July 31st –August 4th 2006, Vancouver, B.C. Canada
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu, Roberto Perdisci, Junjie Zhang and Wenke Lee 07/28/08 17th USENIX Security Symposium
Tendencias de ataque en seguridad informática Iván Arce 10/03/05 2005 FIRST Technical Colloquium, Buenos Aires, Argentina
Inverting bijective polynomial maps over finite fields Antonio Cafure, Guillermo Matera and Ariel Waissbein 03/01/06 2006 IEEE Information Theory Workshop, Punta del Este, Uruguay
On the security of JIT based Smalltalk VMs and the possibility of a self-contained Smalltalk system Gerardo Richarte 09/02/09 2009 International Smalltalk Conference
Detecting Malware Domains at the Upper DNS Hierarchy M. Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou and David Dagon 08/08/11 20th USENIX Security Symposium
From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee and David Dagon 08/08/12 21st USENIX Security Symposium
ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates Terry Nelms, Roberto Perdisci, Mustaque Ahamad 08/14/13 22nd USENIX Security Symposium
VCR y PEO, dos protocolos criptográficos simples (Spanish) A. Futoransky and E. Kargieman 07/11/95 25 Jornadas Argentinas de Informática e Investigación Operativa, July 1995.
Una técnica de protección para agentes móviles contra estaciones (hosts) maliciosas Ariel Waissbein 11/21/05 3er Congreso Iberoamericano de Seguridad Informática (CIBSI), Valparaiso, Chile. ISBN: 956-7051-10-0.
An Oblivious Password Cracking Server Aureliano Calvo, Ariel Futoransky, Carlos Sarraute 08/31/12 41th JAIIO
The impact of predicting attacker tools in security risk assessments Ezequiel Gutesman, Ariel Waissbein 04/21/10 6th Annual Cyber Security and Information Intelligence Research Workshop - Oak Ridge National Laboratory
Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces Roberto Perdisci, Wenke Lee and Nick Feamster 04/28/10 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’10)