Information Security Resources

CoreLabs Information Security Publications

Below is an index of publications, presentations and papers authored by members of the CoreLabs research team. Click on any title to get more information and access the publication on the CoreLabs extranet site

Titlesort descending Authors Publication Date Venue / Publication
Enforcing Privacy in Web Applications A. Futoransky and A. Waissbein 10/11/05 Third Annual Conference on Privacy, Security and Trust. October 12-14, 2005. The Fairmont Algonquin, St. Andrews , New Brunswick, Canada.
Ether: Malware Analysis via Hardware Virtualization Extensions Artem Dinaburg, Paul Royal, Monirul Sharif and Wenke Lee 10/27/08 15th ACM Conference on Computer and Communications Security
ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates Terry Nelms, Roberto Perdisci, Mustaque Ahamad 08/14/13 22nd USENIX Security Symposium
Exploiting Adobe Flash Player in the Era of Control Flow Guard Francisco Falcon 11/13/15 Black Hat Europe 2015
Exploiting Digital Cameras Oren Isacson and Alfredo Ortega 08/01/10 Defcon 18 2010
Faceted Ranking in Collaborative Tagging Systems Pablo Fierens, Jose Ignacio Alvarez-Hamelin, Jose Orlicki 03/23/09 WEBIST 2009 - International Conference on Web Information Systems and Technologies
Finding bugs and publishing advisories - the Core Security way Carlos Sarraute 11/27/10 Hackers to Hackers (H2HC)
Foundations and applications for secure triggers Ariel Futoransky, Emiliano Kargieman, Carlos Sarraute, Ariel Waissbein. 02/15/06 ACM Transactions on Information and System Security (TISSEC)
Four different tricks to bypass StackShield and StackGuard protection Gerardo Richarte, April 24, 2002 04/24/02 Corelabs Technical Report
From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee and David Dagon 08/08/12 21st USENIX Security Symposium
Getting fun with Frida Nahuel Cayetano Riva 10/31/16 Ekoparty
gFuzz: An Instrumented Web Application Fuzzing Environment Ezequiel Gutesman 10/22/08 Hack.Lu 2008, Luxembourg
Ghost in the Virtual Machine Iván Arce 08/16/07 IEEE Security and Privacy, vol.5, no.4
Heuristics applied to Binary Diffing Nicolas Economou 09/17/09 Ekoparty 2009
HoneySAP: Who really wants your money Martin Gallo 03/18/15 Troopers