CoreLabs Information Security Publications
Below is an index of publications, presentations and papers authored by members of the CoreLabs research team. Click on any title to get more information and access the publication on the CoreLabs extranet site
Title | Authors |
Publication Date![]() |
Venue / Publication |
---|---|---|---|
PyCodin - Instrumentando codigo sin dolor | Adrian Manrique, Andres Lopez Luksenberg | 10/16/10 | PyCon Argentina |
2x1 Microsoft Bugs: Virtual PC hyper-hole-visor' + 'Windows Creation Vulnerability (MS10-048) | Nicolas Economou | 09/16/10 | Ekoparty 2010 |
The IMDDOS Botnet: Discovery and Analysis | Manos Antonakakis, Christopher Elisan, Aldrich de Mata and Erik Wu | 09/13/10 | Damballa Threat Research |
Building a Dynamic Reputation System for DNS | Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee and Nick Feamster | 08/11/10 | In Proceedings of the 19th USENIX Security Symposium |
Exploiting Digital Cameras | Oren Isacson and Alfredo Ortega | 08/01/10 | Defcon 18 2010 |
WPA Migration Mode: WEP is back to haunt you... | Leandro Meiners and Diego Sor | 07/28/10 | BlackHat 2010 USA |
Attack Planning in the Real World | Jorge Lucangeli Obes, Carlos Sarraute and Gerardo Richarte | 07/12/10 | AAAI 2010 |
Assume Nothing, Article about design flaws using as example a Microsoft Windows Virtual P | Gary McGraw and Iván Arce | 04/30/10 | InformIT |
Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces | Roberto Perdisci, Wenke Lee and Nick Feamster | 04/28/10 | 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’10) |
The impact of predicting attacker tools in security risk assessments | Ezequiel Gutesman, Ariel Waissbein | 04/21/10 | 6th Annual Cyber Security and Information Intelligence Research Workshop - Oak Ridge National Laboratory |
Using AI Techniques to improve Pen Testing Automation | Carlos Sarraute | 04/08/10 | Hackito Ergo Sum (HES), Paris, France |
Automated SQL Ownage Techniques | Sebastian Cufre (presented by Fernando Russ) | 03/24/10 | CanSecWest Vancouver 2010 |
State of the Art Automation of Open Source Intelligence and Impersonation in Social Networks | Pedro O. Varangot | 03/04/10 | RSA Security Conference 2010 |
Internet Explorer Turns Your Personal Computer into a Public File Server | Jorge Luis Alvarez Medina | 02/03/10 | Black Hat DC 2010 |
Probabilistic Attack Planning in Network + WebApps Scenarios | Carlos Sarraute | 11/28/09 | H2HC Conference, São Paulo, Brazil |