Framework for maintaining information security in computer networks

Emiliano Kargieman , Ariel Futoransky , Gerardo Richarte , Carlos Ochoa

32
2003
BARF: a multiplatform open source binary analysis and reverse engineering framework

Christian Heitman , Iván Arce
XX Congreso Argentino de Ciencias de la Computación (Buenos Aires, 2014)

4
2014
Producir software seguro argentino

Susana Cristina Romaniz , Marta Castellaro , Ivana Gaspoz , Iván Arce
XLIII Jornadas Argentinas de Informática e Investigación Operativa (43JAIIO)-VIII Jornadas de Vinculación Universidad-Industria (JUI) (Buenos Aires, 2014)

1
2014
Vulnerability management at the crossroads

Iván Arce
Network Security 2008 ( 5) 11 -13

2
2008
Avoiding the top 10 software security design flaws

Iván Arce , Kathleen Clark-Fisher , Neil Daswani , Jim DelGrosso
IEEE Computer Society Center for Secure Design (CSD), Tech. Rep

71
2014
Why offensive security needs engineering textbooks

Sergey Bratus , Iván Arce , Michael E Locasto , Stefano Zanero
Yale Law & Policy Review 2 -2

5
2013
New threats and attacks on the world wide web

Elias Levy , Iván Arce
IEEE Security & Privacy 234 -266

13
2006
The Rise of the Gadgets

Iván Arce
IEEE Security & Privacy 1 ( 5) 78 -81

26
2003
The Confused Deputy and the Domain Hijacker

Dave Ahmad , Iván Arce
ieee symposium on security and privacy 6 ( 1) 74 -77

8
2008
Automating Penetration Tests: A new challenge for the IS industry

Iván Arce , Maximiliano Caceres
BlackHat Briefings Las Vegas

4
2001
The land of the blind

Iván Arce
IEEE security & privacy 3 ( 4) 63 -67

1
2005
Análisis de factibilidad en la implementación de tecnología en diferentes aspectos y etapas del proceso electoral

José Andrés Diaz Pace , Dante Zanarini , Iván Arce , Maximilinado Cristiá
CONICET

2017
Infraestructuras críticas y seguridad de la información

Iván Arce
Seminario Regional de Ciberdefensa, Consejo de Defensa Sudamericana, UNASUR

2014
2006
An attack on the MySQL authentication protocol

Ivan FF Arce , Agustın Azubel , Emiliano Kargieman , Gerardo Richarte
Technical report from Core Security Technologies

1
2002
Vulnerability management at the crossroads, part 2

Ivan Arce
Network Security 2008 ( 6) 9 -12

2008
Guest Editors' Introduction: In Cloud Computing We Trust - But Should We?

Anup Ghosh , Ivan Arce
ieee symposium on security and privacy 8 ( 6) 14 -16

45
2010
A Surprise Party (on Your Computer)

Ivan Arce
ieee symposium on security and privacy 5 ( 2) 15 -16

1
2007
Ghost in the Virtual Machine

Ivan Arce
ieee symposium on security and privacy 5 ( 4) 68 -71

9
2007
An attack on MySQL's login protocol

Ivan Arce , Emiliano Kargieman , Gerardo Richarte , Carlos Sarraute
arXiv preprint arXiv:1006.2411

2010