CoreLabs Information Security Publications
Below is an index of publications, presentations and papers authored by members of the CoreLabs research team. Click on any title to get more information and access the publication on the CoreLabs extranet site
Title | Authors |
Publication Date![]() |
Venue / Publication |
---|---|---|---|
Simulating Cyber-Attacks for Fun and Profit | Ariel Futoransky, Fernando Miranda, Jose Orlicki and Carlos Sarraute | 03/02/09 | SIMUTools 2009 - 2nd International Conference on Simulation Tools and Techniques |
McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables | Roberto Perdisci, Andrea Lanzi and Wenke Lee | 12/08/08 | Computer Security Applications Conference |
Advances in Automated Attack Planning | Alejandro David Weil and Carlos Sarraute | 11/01/08 | PacSec Conference, Tokyo, Japan |
Ether: Malware Analysis via Hardware Virtualization Extensions | Artem Dinaburg, Paul Royal, Monirul Sharif and Wenke Lee | 10/27/08 | 15th ACM Conference on Computer and Communications Security |
gFuzz: An Instrumented Web Application Fuzzing Environment | Ezequiel Gutesman | 10/22/08 | Hack.Lu 2008, Luxembourg |
Code injection in virtual machines | Nicolas Economou | 10/02/08 | Ekoparty '08 |
Pass-the-Hash Toolkit for Windows | Hernan Ochoa | 10/01/08 | HITB SECONF 2008 and Buenos Aires Conference (Ba-Con '08) |
LeakedOut: the Social Networks You Get Caught In | Jose Orlicki | 09/30/08 | BaCon (Buenos Aires Conference) '08 |
Your risk is not what it used to be | Ariel Waissbein | 09/26/08 | ToorCon X, September 26-28, 2008. San Diego, CA, USA |
Responsible Vulnerability Disclosure: The viewpoint of an IT security research and IT security software vendor (1996-2008) | Iván Arce | 08/25/08 | Process Control Systems Security Forum, PCSF 2008 |
Viral Infections in Cisco IOS | Ariel Futoransky | 08/06/08 | BlackHat ’08 USA |
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection | Guofei Gu, Roberto Perdisci, Junjie Zhang and Wenke Lee | 07/28/08 | 17th USENIX Security Symposium |
Two very small reverse engineering tools: a python disassembling engine and an iterative reverse engineering framework | Gerardo Richarte | 06/15/08 | ReCon 2008 |
Vulnerability Management at the Crossroads, part II | Iván Arce | 06/10/08 | Network Security (Elseiver), Volumen 2008, Issue 6, pp. 9-12 |
Vulnerability Management at the Crossroads, part I | Iván Arce | 05/24/08 | Network Security |