Follow
Iván Arce
Iván Arce
Quarkslab
Verified email at quarkslab.com
Title
Cited by
Cited by
Year
Secure auditing of information systems
A Futoransky, E Kargieman, D Bendersky, L Notarfrancesco, G Richarte, ...
US Patent App. 10/414,120, 2003
1602003
An analysis of the slapper worm
I Arce, E Levy
IEEE Security & Privacy 1 (1), 82-87, 2003
1582003
The weakest link revisited
I Arce
IEEE Security & Privacy 99 (2), 72-76, 2003
128*2003
Avoiding the top 10 software security design flaws
I Arce, K Clark-Fisher, N Daswani, J DelGrosso, D Dhillon, C Kern, ...
IEEE Computer Society Center for Secure Design (CSD), Tech. Rep, 2014
712014
Criminals Become Tech Savvy.
E Levy, I Arce
IEEE Secur. Priv. 2 (2), 65-68, 2004
572004
Guest editors' introduction: Why attacking systems is a good idea
I Arce, G McGraw
IEEE Security & Privacy 2 (4), 17-19, 2004
532004
The shellcode generation
I Arce
IEEE security & privacy 2 (5), 72-76, 2004
502004
Guest editors' introduction: In cloud computing we trust-But should we?
A Ghosh, I Arce
IEEE security & privacy 8 (6), 14-16, 2010
452010
Framework for maintaining information security in computer networks
IA Velleggia, A Futoransky, G Richarte, E Kargieman, C Ochoa
US Patent App. 10/354,568, 2003
432003
The Rise of the Gadgets
I Arce
IEEE Security & Privacy 1 (5), 78-81, 2003
252003
More bang for the bug: An account of 2003's attack trends
I Arce
IEEE Security & Privacy 2 (1), 66-68, 2004
212004
BARF: a multiplatform open source binary analysis and reverse engineering framework
C Heitman, I Arce
XX Congreso Argentino de Ciencias de la Computación (Buenos Aires, 2014), 2014
152014
Ghost in the virtual machine
I Arce
IEEE Security & Privacy 5 (4), 68-71, 2007
152007
Bad peripherals
I Arce
IEEE security & privacy 3 (1), 70-73, 2005
142005
New threats and attacks on the world wide web
E Levy, I Arce
IEEE Security & Privacy, 234-266, 2006
132006
The confused deputy and the domain hijacker
D Ahmad, I Arce
IEEE Security & Privacy 6 (1), 74-77, 2008
112008
State of the art security from an attacker’s viewpoint
I Arce, G Richarte
PacSec Conference, Tokyo, Japan, 2003
102003
Bug hunting: the seven ways of the security samurai
I Arce
Computer 35 (4), supl11-supl15, 2002
72002
The kernel craze
I Arce
IEEE security & privacy 2 (3), 79-81, 2004
52004
Why offensive security needs engineering textbooks
S Bratus, I Arce, ME Locasto, S Zanero
Yale Law & Policy Review, 2, 2013
42013
The system can't perform the operation now. Try again later.
Articles 1–20