Information Security Resources

CoreLabs Information Security Publications

Below is an index of publications, presentations and papers authored by members of the CoreLabs research team. Click on any title to get more information and access the publication on the CoreLabs extranet site

Title Authors Publication Datesort ascending Venue / Publication
Dynamic Binary Instrumentation Frameworks: I know you're there spying on me Nahuel Riva and Francisco Falcon 06/16/12 REcon 2012 Conference
Les POMDP font de meilleurs hackers: Tenir compte de l'incertitude dans les tests de penetration Carlos Sarraute, Olivier Buffet, Joerg Hoffmann 05/22/12 JFPDA 2012
Decomposing the Network to perform Attack Planning under Uncertainty Carlos Sarraute 04/12/12 Hackito Ergo Sum (HES)
Understanding the Prevalence and Use of Alternative Plans in Malware with Network Games Y. Nadji, M. Antonakakis, R. Perdisci and W. Lee 12/07/11 In Proceedings of The 27th Annual Computer Security Applications Conference (ACSAC 2011)
On Exploit Quality Metrics - and how to use them for Automated Pentesting Carlos Sarraute 11/18/11 8.8 Computer Security Conference
Some Research Directions in Automated Pentesting Carlos Sarraute 10/29/11 Hackers To Hackers (H2HC)
An Algorithm to Find Optimal Attack Paths in Nondeterministic Scenarios Carlos Sarraute, Gerardo Richarte, Jorge Lucangeli Obes 10/21/11 ACM CCS Conference 2011
Snakes on a Payload Fernando Russ, Pedro Varangot 09/21/11 Ekoparty
Deep Boot Nicolas Economou, Andres Lopez Luksenberg 09/20/11 Ekoparty
Abusing the Windows WiFi native API to create a Covert Channel Andres Blanco, Ezequiel Gutesman 09/20/11 2011
Detecting Malware Domains at the Upper DNS Hierarchy M. Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou and David Dagon 08/08/11 20th USENIX Security Symposium
Pentesting en AWS Aureliano Calvo 08/08/11 AWS User Group Argentina
Penetration Testing == POMDP Solving? Carlos Sarraute, Olivier Buffet, Joerg Hoffmann 07/18/11 IJCAI'11
In Cloud Computing We Trust - But Should We? Iván Arce, Anup Ghosh 12/01/10 IEEE Security and Privacy
Finding bugs and publishing advisories - the Core Security way Carlos Sarraute 11/27/10 Hackers to Hackers (H2HC)