Information Security Resources

CoreLabs Information Security Publications

Below is an index of publications, presentations and papers authored by members of the CoreLabs research team. Click on any title to get more information and access the publication on the CoreLabs extranet site

Title Authors Publication Date Venue / Publication
Internet Explorer Turns Your Personal Computer into a Public File Server Jorge Luis Alvarez Medina 02/03/10 Black Hat DC 2010
A Penetration Testing Learning Kit Ariel Waissbein 04/23/08 Troopers08, April 23-24, 2008. Munich, Germany
In Cloud Computing We Trust - But Should We? Iván Arce, Anup Ghosh 12/01/10 IEEE Security and Privacy
Efficient Inversion of Rational Maps over Finite Fields Antonio Cafure, Guillermo Matera and Ariel Waissbein 12/01/07 Institute for Mathematics and its Applications (IMA) Volume 146
Cyber Warmongering and Influence Peddling Iván Arce, Gary McGraw 11/24/10 InformIT
Showing differences between disassembled functions Aureliano Calvo 10/28/10
PyCodin - Instrumentando codigo sin dolor Adrian Manrique, Andres Lopez Luksenberg 10/16/10 PyCon Argentina
2x1 Microsoft Bugs: Virtual PC hyper-hole-visor' + 'Windows Creation Vulnerability (MS10-048) Nicolas Economou 09/16/10 Ekoparty 2010
Exploiting Digital Cameras Oren Isacson and Alfredo Ortega 08/01/10 Defcon 18 2010
Attack Planning in the Real World Jorge Lucangeli Obes, Carlos Sarraute and Gerardo Richarte 07/12/10 AAAI 2010
Assume Nothing, Article about design flaws using as example a Microsoft Windows Virtual P Gary McGraw and Iván Arce 04/30/10 InformIT
The impact of predicting attacker tools in security risk assessments Ezequiel Gutesman, Ariel Waissbein 04/21/10 6th Annual Cyber Security and Information Intelligence Research Workshop - Oak Ridge National Laboratory
Using AI Techniques to improve Pen Testing Automation Carlos Sarraute 04/08/10 Hackito Ergo Sum (HES), Paris, France
Automated SQL Ownage Techniques Sebastian Cufre (presented by Fernando Russ) 03/24/10 CanSecWest Vancouver 2010
Finding bugs and publishing advisories - the Core Security way Carlos Sarraute 11/27/10 Hackers to Hackers (H2HC)