Publications

SecureAuth Labs Information Security Publications

Below is an index of publications, presentations and papers authored by members of the SecureAuth Labs research team. Click on any title to get more information and access the publication on the SecureAuth Labs extranet site

Date Description Authors Venue / Publication
12/01/2010 In Cloud Computing We Trust - But Should We? Iván Arce, Anup Ghosh IEEE Security and Privacy
11/27/2010 Finding bugs and publishing advisories - the Core Security way Carlos Sarraute Hackers to Hackers (H2HC)
11/24/2010 Cyber Warmongering and Influence Peddling Iván Arce, Gary McGraw InformIT
10/28/2010 Showing differences between disassembled functions Aureliano Calvo Hack.lu
10/16/2010 PyCodin - Instrumentando codigo sin dolor Adrian Manrique, Andres Lopez Luksenberg PyCon Argentina
09/16/2010 2x1 Microsoft Bugs: Virtual PC hyper-hole-visor' + 'Windows Creation Vulnerability (MS10-048) Nicolas Economou Ekoparty 2010
09/13/2010 The IMDDOS Botnet: Discovery and Analysis Manos Antonakakis, Christopher Elisan, Aldrich de Mata and Erik Wu Damballa Threat Research
08/11/2010 Building a Dynamic Reputation System for DNS Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee and Nick Feamster In Proceedings of the 19th USENIX Security Symposium
08/01/2010 Exploiting Digital Cameras Oren Isacson and Alfredo Ortega Defcon 18 2010
07/28/2010 WPA Migration Mode: WEP is back to haunt you... Leandro Meiners and Diego Sor BlackHat 2010 USA
07/12/2010 Attack Planning in the Real World Jorge Lucangeli Obes, Carlos Sarraute and Gerardo Richarte AAAI 2010
04/30/2010 Assume Nothing, Article about design flaws using as example a Microsoft Windows Virtual P Gary McGraw and Iván Arce InformIT
04/28/2010 Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces Roberto Perdisci, Wenke Lee and Nick Feamster 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’10)
04/21/2010 The impact of predicting attacker tools in security risk assessments Ezequiel Gutesman, Ariel Waissbein 6th Annual Cyber Security and Information Intelligence Research Workshop - Oak Ridge National Laboratory
04/08/2010 Using AI Techniques to improve Pen Testing Automation Carlos Sarraute Hackito Ergo Sum (HES), Paris, France