Information Security Resources

CoreLabs Information Security Publications

Below is an index of publications, presentations and papers authored by members of the CoreLabs research team. Click on any title to get more information and access the publication on the CoreLabs extranet site

Title Authors Publication Date Venue / Publication
Vulnerability Management at the Crossroads, part I Iván Arce 05/24/08 Network Security
Killing the myth of Cisco IOS rootkits:DIK (DA IOS ROOTKIT) Sebastián Miñiz 05/21/08 EuSecWest 2008, May 21-22. London, UK
A Penetration Testing Learning Kit Ariel Waissbein 04/23/08 Troopers08, April 23-24, 2008. Munich, Germany
Timing Attacks for Recovering Private Entries From Database Engines (RSA Conference) Ariel Waissbein. Joint work with Ariel Futoransky, Damian Saura and Pedro Varangot 04/07/08 RSA Conference 2008
Using Neural Networks to improve classical Operating System Fingerprinting techniques Carlos Sarraute and Javier Burroni 03/01/08 Electronic Journal of SADIO, Vol. 8, No. 1, pp. 35–47 (2008)
alert('A javascript agent') Aureliano Calvo and Diego Tiscornia 01/02/08 Corelabs Technical Report
Efficient Inversion of Rational Maps over Finite Fields Antonio Cafure, Guillermo Matera and Ariel Waissbein 12/01/07 Institute for Mathematics and its Applications (IMA) Volume 146
But...my station is awake! (Power Save Denial of Service in 802.11 Networks) Leandro Meiners 09/17/09 Ekoparty 2009
Vulnerability Management at the Crossroads, part II Iván Arce 06/10/08 Network Security (Elseiver), Volumen 2008, Issue 6, pp. 9-12
In Cloud Computing We Trust - But Should We? Iván Arce, Anup Ghosh 12/01/10 IEEE Security and Privacy
Tendencias de seguridad en tecnologías para aplicaciones Iván Arce 10/02/09 Jornadas de Seguridad Informática 2009 Presentation at the 10th aniversary of ARCERT, Argentina
Attacker-centric risk assessment and metrics (spanish) Ezequiel Gutesman, Fernando Miranda 10/21/09 Forum of Incident Response and Security Teams, FIRST 2009, Santiago, Chile
Probabilistic Attack Planning in Network + WebApps Scenarios Carlos Sarraute 11/28/09 H2HC Conference, São Paulo, Brazil
Internet Explorer Turns Your Personal Computer into a Public File Server Jorge Luis Alvarez Medina 02/03/10 Black Hat DC 2010
State of the Art Automation of Open Source Intelligence and Impersonation in Social Networks Pedro O. Varangot 03/04/10 RSA Security Conference 2010