Publications

SecureAuth Labs Information Security Publications

Below is an index of publications, presentations and papers authored by members of the SecureAuth Labs research team. Click on any title to get more information and access the publication on the SecureAuth Labs extranet site

Date Description Authors Venue / Publication
08/13/2007 A dynamic technique for enhancing the security and privacy of web applications Futoransky, Ariel; Gutesman, Ezequiel; Waissbein, Ariel. Black Hat USA 2007 
08/13/2007 The ND2DB attack: Database content extraction using timing attacks on the indexing algorithms Ariel Futoransky, Damian Saura, and Ariel Waissbein. First Workshop on Offensive Technologies (WOOT `07)
08/13/2007 OpenBSD Remote Exploit Alfredo Ortega and Gerardo Richarte Black Hat USA 2007 Briefings, August 1-2, 2007. Las Vegas, NV, USA.
08/01/2007 Simulation of Computer Network Attacks Fernando Miranda, Jose Orlicki and Carlos Sarraute Argentine Symposium on Computing Technology (AST) 2007
08/01/2007 Timing Attacks for Recovering Private Entries From Database Engines Ariel Futoransky, Damian Saura, and Ariel Waissbein Black Hat USA 2007 
07/31/2007 Security vulnerabilities, exploits and attack patterns: 15 years of art, pseudo-science, fun & profit Iván Arce 15th USENIX Security Symposium, July 31st –August 4th 2006, Vancouver, B.C. Canada
12/01/2006 Strong payload obfuscation and encryption Ariel Waissbein PacSec Conference
11/20/2006 Binary Cryptography Carlos Sarraute Jornadas de Criptografía y Códigos Autocorrectores
08/08/2006 Voices, I hear voices Iván Arce IEEE Computer Society - Security & Privacy magazine Vol 4. No 4.
05/31/2006 Outrepasser les limites des techniques classiques de Prise d'Empreintes grace aux Réseaux de Neurones, Javier Burroni Javier Burroni and Carlos Sarraute Symposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC)
05/23/2006 New SMB and DCERPC features in Impacket v0.9.6.0 Gerardo Richarte and Alberto Soliño Corelabs Technical Report
03/01/2006 Inverting bijective polynomial maps over finite fields Antonio Cafure, Guillermo Matera and Ariel Waissbein 2006 IEEE Information Theory Workshop, Punta del Este, Uruguay
02/20/2006 Analyzing OS fingerprints using Neural Networks and Statistical Machinery Javier Burroni and Carlos Sarraute EUSecWest, London
02/15/2006 Foundations and applications for secure triggers Ariel Futoransky, Emiliano Kargieman, Carlos Sarraute, Ariel Waissbein. ACM Transactions on Information and System Security (TISSEC)
01/01/2006 Virtualization in software development and QA Marcelo Picorelli VMworld `06