Index to CoreLabs Publications

Below is an index of publications, presentations and papers authored by members of the CoreLabs research team. Click on any title to get more information and access the publication on the CoreLabs extranet site.

Title Authors Publication Datesort descending Venue / Publication
Tecnologías Emergentes y Tendencias de Seguridad: Una aproximación desde el punto de vista de un atacante Iván Arce 08.26.2009 Workshop de Seguridad Informática 2009 (WSegI)
SQL/JavaScript Hybrid Worms As Two-stage Quines José Orlicki 08.26.2009 Workshop de Seguridad Informática (WSegI)
On the security of JIT based Smalltalk VMs and the possibility of a self-contained Smalltalk system Gerardo Richarte 09.02.2009 2009 International Smalltalk Conference
New Algorithms for Attack Planning Carlos Sarraute 09.07.2009 FRHACK Conference
Heuristics applied to Binary Diffing Nicolas Economou 09.17.2009 Ekoparty 2009
But...my station is awake! (Power Save Denial of Service in 802.11 Networks) Leandro Meiners 09.17.2009 Ekoparty 2009
Tendencias de seguridad en tecnologías para aplicaciones Iván Arce 10.02.2009 Jornadas de Seguridad Informática 2009
Attacker-centric risk assessment and metrics (spanish) Ezequiel Gutesman, Fernando Miranda 10.21.2009 Forum of Incident Response and Security Teams, FIRST 2009
Probabilistic Attack Planning in Network + WebApps Scenarios Carlos Sarraute 11.28.2009 H2HC Conference
Internet Explorer Turns Your Personal Computer into a Public File Server Jorge Luis Alvarez Medina 02.03.2010 Black Hat DC 2010
State of the Art Automation of Open Source Intelligence and Impersonation in Social Networks Pedro O. Varangot 03.04.2010 RSA Security Conference 2010
Automated SQL Ownage Techniques Sebastian Cufre (presented by Fernando Russ) 03.24.2010 CanSecWest Vancouver 2010
Using AI Techniques to improve Pentesting Automation Carlos Sarraute 04.08.2010 Hackito Ergo Sum (HES)
The impact of predicting attacker tools in security risk assessments Ezequiel Gutesman, Ariel Waissbein 04.21.2010 6th Annual Cyber Security and Information Intelligence Research Workshop - Oak Ridge National Laboratory
Assume Nothing, - Article about design flaws using as example a Microsoft Windows Virtual P Gary McGraw and Iván Arce 04.30.2010 InformIT

Pages