Information Security Resources

CoreLabs Information Security Publications

Below is an index of publications, presentations and papers authored by members of the CoreLabs research team. Click on any title to get more information and access the publication on the CoreLabs extranet site

Titlesort descending Authors Publication Date Venue / Publication
Bad Peripherals Iván Arce 02/01/05 IEEE Computer Society - Security & Privacy Magazine, Vol. 3, No. 1.
Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces Roberto Perdisci, Wenke Lee and Nick Feamster 04/28/10 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’10)
Beheading Hydras: Performing Effective Botnet Takedowns Yacin Nadji, Roberto Perdisci, Manos Antonakakis, David Dagon and Wenke Lee 11/04/13 Proceedings of the ACM Conference on Computer and Communications Security (CCS)
Binary Cryptography Carlos Sarraute 11/20/06 Jornadas de Criptografía y Códigos Autocorrectores
Blackberry Pwnage - the Bluejay Strikes Federico Muttis 02/28/13 RSA 2013
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu, Roberto Perdisci, Junjie Zhang and Wenke Lee 07/28/08 17th USENIX Security Symposium
Breaking Out of VirtualBox through 3D Acceleration Francisco Falcon 06/27/14 REcon 2014
Bug Hunting: The Seven Ways of the Security Samurai Iván Arce 04/01/02 IEEE Computer Magazine, Security and Privacy supplement, April 2002, pp. 11-15
Building a Dynamic Reputation System for DNS Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee and Nick Feamster 08/11/10 In Proceedings of the 19th USENIX Security Symposium
Building Computer Network Attacks Ariel Futoransky, Luciano Notarfrancesco, Gerardo Richarte and Carlos Sarraute 03/31/03 CoreLabs Technical Report (arXiv:1006.1916)
But...my station is awake! (Power Save Denial of Service in 802.11 Networks) Leandro Meiners 09/17/09 Ekoparty 2009
Characterizing Malicious Traffic on Cellular Networks: A Retrospective Charles Lever 04/22/15 RSA Conference
Code injection in virtual machines Nicolas Economou 10/02/08 Ekoparty '08
Collaborative Endpoint Security Iván Arce, Eduardo Arias 10/25/05 SecurityFocus.com
Connected Colors: Unveiling the Structure of Criminal Networks Yacin Nadji, Manos Antonakakis, Roberto Perdisci and Wenke Lee 10/23/13 Research in Attacks, Intrusions and Defenses (RAID)