Information Security Resources

CoreLabs Information Security Publications

Below is an index of publications, presentations and papers authored by members of the CoreLabs research team. Click on any title to get more information and access the publication on the CoreLabs extranet site

Title Authors Publication Date Venue / Publication
gFuzz: An Instrumented Web Application Fuzzing Environment Ezequiel Gutesman 10/22/08 Hack.Lu 2008, Luxembourg
Code injection in virtual machines Nicolas Economou 10/02/08 Ekoparty '08
Pass-the-Hash Toolkit for Windows Hernan Ochoa 10/01/08 HITB SECONF 2008 and Buenos Aires Conference (Ba-Con '08)
LeakedOut: the Social Networks You Get Caught In Jose Orlicki 09/30/08 BaCon (Buenos Aires Conference) '08
Your risk is not what it used to be Ariel Waissbein 09/26/08 ToorCon X, September 26-28, 2008. San Diego, CA, USA
Responsible Vulnerability Disclosure: The viewpoint of an IT security research and IT security software vendor (1996-2008) Iván Arce 08/25/08 Process Control Systems Security Forum, PCSF 2008
Viral Infections in Cisco IOS Ariel Futoransky 08/06/08 BlackHat ’08 USA
Two very small reverse engineering tools: a python disassembling engine and an iterative reverse engineering framework Gerardo Richarte 06/15/08 ReCon 2008
Advances in Automated Attack Planning Alejandro David Weil and Carlos Sarraute 11/01/08 PacSec Conference, Tokyo, Japan
Deformation Techniques for Sparse Systems Gabriela Jeronimo, Guillermo Matera, Pablo Solerno and Ariel Waissbein In 01/01/09 Foundations of Computational Mathematics, Volume 9 , Issue 1 (January 2009)
Tecnologías Emergentes y Tendencias de Seguridad: Una aproximación desde el punto de vista de un atacante Iván Arce 08/26/09 Workshop de Seguridad Informática 2009 (WSegI)
SQL/JavaScript Hybrid Worms As Two-stage Quines José Orlicki 08/26/09 Workshop de Seguridad Informática (WSegI)
Deactivate the Rootkit Anibal Sacco and Alfredo Ortega 07/30/09 Black Hat USA 2009
Systematic XSS exploitation Aureliano Calvo 07/27/09 Corelabs Technical Report
Risk assessment tactics optimizing efficiency and threat-space coverage Ariel Waissbein (presented by Fred Pinkett) 06/22/09 Annual Computer Network Defense Research and Technology Workshop