CoreLabs Information Security Publications
Below is an index of publications, presentations and papers authored by members of the CoreLabs research team. Click on any title to get more information and access the publication on the CoreLabs extranet site
Title | Authors |
Publication Date![]() |
Venue / Publication |
---|---|---|---|
Security vulnerabilities, exploits and attack patterns: 15 years of art, pseudo-science, fun & profit | Iván Arce | 07/31/07 | 15th USENIX Security Symposium, July 31st –August 4th 2006, Vancouver, B.C. Canada |
Strong payload obfuscation and encryption | Ariel Waissbein | 12/01/06 | PacSec Conference |
Binary Cryptography | Carlos Sarraute | 11/20/06 | Jornadas de Criptografía y Códigos Autocorrectores |
Voices, I hear voices | Iván Arce | 08/08/06 | IEEE Computer Society - Security & Privacy magazine Vol 4. No 4. |
Outrepasser les limites des techniques classiques de Prise d'Empreintes grace aux Réseaux de Neurones, Javier Burroni | Javier Burroni and Carlos Sarraute | 05/31/06 | Symposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC) |
New SMB and DCERPC features in Impacket v0.9.6.0 | Gerardo Richarte and Alberto Soliño | 05/23/06 | Corelabs Technical Report |
Inverting bijective polynomial maps over finite fields | Antonio Cafure, Guillermo Matera and Ariel Waissbein | 03/01/06 | 2006 IEEE Information Theory Workshop, Punta del Este, Uruguay |
Analyzing OS fingerprints using Neural Networks and Statistical Machinery | Javier Burroni and Carlos Sarraute | 02/20/06 | EUSecWest, London |
Foundations and applications for secure triggers | Ariel Futoransky, Emiliano Kargieman, Carlos Sarraute, Ariel Waissbein. | 02/15/06 | ACM Transactions on Information and System Security (TISSEC) |
Virtualization in software development and QA | Marcelo Picorelli | 01/01/06 | VMworld `06 |
How about a nice game of chess? | Iván Arce | 12/09/05 | Peltier Associates: December 2005 Year End Review |
Una técnica de protección para agentes móviles contra estaciones (hosts) maliciosas | Ariel Waissbein | 11/21/05 | 3er Congreso Iberoamericano de Seguridad Informática (CIBSI), Valparaiso, Chile. ISBN: 956-7051-10-0. |
Using Neural Networks for Remote OS Identification | Javier Burroni and Carlos Sarraute | 11/15/05 | PacSec Conference, Tokyo, Japan |
MD5 to be considered harmful today | Gerardo Richarte | 11/15/05 | PacSec'05 Conference, Tokyo, Japan. |
Collaborative Endpoint Security | Iván Arce, Eduardo Arias | 10/25/05 | SecurityFocus.com |