Information Security Resources

CoreLabs Information Security Publications

Below is an index of publications, presentations and papers authored by members of the CoreLabs research team. Click on any title to get more information and access the publication on the CoreLabs extranet site

Title Authors Publication Datesort descending Venue / Publication
Vulnerability Management at the Crossroads, part II Iván Arce 06/10/08 Network Security (Elseiver), Volumen 2008, Issue 6, pp. 9-12
Two very small reverse engineering tools: a python disassembling engine and an iterative reverse engineering framework Gerardo Richarte 06/15/08 ReCon 2008
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu, Roberto Perdisci, Junjie Zhang and Wenke Lee 07/28/08 17th USENIX Security Symposium
Viral Infections in Cisco IOS Ariel Futoransky 08/06/08 BlackHat ’08 USA
Responsible Vulnerability Disclosure: The viewpoint of an IT security research and IT security software vendor (1996-2008) Iván Arce 08/25/08 Process Control Systems Security Forum, PCSF 2008
Your risk is not what it used to be Ariel Waissbein 09/26/08 ToorCon X, September 26-28, 2008. San Diego, CA, USA
LeakedOut: the Social Networks You Get Caught In Jose Orlicki 09/30/08 BaCon (Buenos Aires Conference) '08
Pass-the-Hash Toolkit for Windows Hernan Ochoa 10/01/08 HITB SECONF 2008 and Buenos Aires Conference (Ba-Con '08)
Code injection in virtual machines Nicolas Economou 10/02/08 Ekoparty '08
gFuzz: An Instrumented Web Application Fuzzing Environment Ezequiel Gutesman 10/22/08 Hack.Lu 2008, Luxembourg
Ether: Malware Analysis via Hardware Virtualization Extensions Artem Dinaburg, Paul Royal, Monirul Sharif and Wenke Lee 10/27/08 15th ACM Conference on Computer and Communications Security
Advances in Automated Attack Planning Alejandro David Weil and Carlos Sarraute 11/01/08 PacSec Conference, Tokyo, Japan
McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables Roberto Perdisci, Andrea Lanzi and Wenke Lee 12/08/08 Computer Security Applications Conference
Deformation Techniques for Sparse Systems Gabriela Jeronimo, Guillermo Matera, Pablo Solerno and Ariel Waissbein In 01/01/09 Foundations of Computational Mathematics, Volume 9 , Issue 1 (January 2009)
Simulating Cyber-Attacks for Fun and Profit Ariel Futoransky, Fernando Miranda, Jose Orlicki and Carlos Sarraute 03/02/09 SIMUTools 2009 - 2nd International Conference on Simulation Tools and Techniques