Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ariel Waissbein is active.

Publication


Featured researches published by Ariel Waissbein.


ACM Transactions on Information and System Security | 2006

Foundations and applications for secure triggers

Ariel Futoransky; Emiliano Kargieman; Carlos Sarraute; Ariel Waissbein

Imagine there is certain content we want to maintain private until some particular event occurs, when we want to have it automatically disclosed. Suppose, furthermore, that we want this done in a (possibly) malicious host. Say the confidential content is a piece of code belonging to a computer program that should remain ciphered and then “be triggered” (i.e., deciphered and executed) when the underlying system satisfies a preselected condition, which must remain secret after code inspection. In this work we present different solutions for problems of this sort, using different “declassification” criteria, based on a primitive we call secure triggers. We establish the notion of secure triggers in the universally composable security framework of Canetti [2001] and introduce several examples. Our examples demonstrate that a new sort of obfuscation is possible. Finally, we motivate its use with applications in realistic scenarios.


cyber security and information intelligence research workshop | 2010

The impact of predicting attacker tools in security risk assessments

Ezequiel Gutesman; Ariel Waissbein

In this article we present a new model and method for anticipating attacks against the networked computing infrastructures for an organization. The model combines existing models for cyber-attack representation and attack planning, with a new approach at anticipating what tools (e.g., exploits) an unknown attacker may hold. This approach allows us to take statistical samples of exploits an attacker could hold. Combining attack simulation and attack planning with a sampling algorithm, we show that we are able to derive information that can be used to anticipate threats. As a result, the model allows predictive risk assessments improving over older reactive models. We further present a software solution that implements this model by introducing a sampling algorithm and combining it with software for simulating attacks and automatically planning them. Finally, using this tool, we derive a mechanism to compute a security metric that describes which is the most fragile computer in the network.


Archive | 2008

Efficient Inversion of Rational Maps Over Finite Fields

Antonio Cafure; Guillermo Matera; Ariel Waissbein

We study the problem of finding the inverse image of a point in the image of a rational map F : \( \mathbb{F}_q^n \to \mathbb{F}_q^n \) over a finite field \( \mathbb{F}_q \). Our interest mainly stems from the case where F encodes a permutation given by some public-key cryptographic scheme. Given an element y (0)∈F(\( \mathbb{F}_q^n \)), we are able to compute the set of values x (0)∈\( \mathbb{F}_q^n \) for which F(x (0)= y (0) holds with O(Tn 4.38 D 2.38δlog2 q) bit operations, up to logarithmic terms. Here T is the cost of the evaluation of F 1,..., F n, D is the degree of F and δ is the degree of the graph of F.


Archive | 2005

Establishing and enforcing security and privacy policies in web-based applications

Ariel Futoransky; Ariel Waissbein; Diego Bartolome Tiscornia; Ezequiel Gutesman


Archive | 2003

Security framework for protecting rights in computer software

Ariel Futoransky; Carlos Emilio Sarraute Yamada; Diego Ariel Bendersky; Luciano Notarfrancesco; Ariel Waissbein


Archive | 2008

System and method for providing application penetration testing

Alberto Gustavo Solino Testa; Gerardo Gabriel Richarte; Fernando Federico Russ; Diego Martin Kelyacoubian; Ariel Futoransky; Diego Bartolome Tiscornia; Ariel Waissbein; Hector Adrian Manrique; Javier Ricardo De Acha Campos; Eduardo Arias; Sebastian Pablo Cufre; Axel Elian Brzostowski


arXiv: Cryptography and Security | 2010

Advanced Software Protection Now

Diego Ariel Bendersky; Ariel Futoransky; Luciano Notarfrancesco; Carlos Sarraute; Ariel Waissbein


Archive | 2012

System and method for providing automated computer security compromise as a service

Ariel Futoransky; Aureliano Emanuel Calvo; Fernando Federico Russ; Jorge Lucangeli Obes; Ariel Waissbein; Alejandro Javier Frydman; Ezequiel Gutesman; Pedro Oscar Varangot


WOOT '07 Proceedings of the first USENIX workshop on Offensive Technologies | 2007

The ND2DB attack: database content extraction using timing attacks on the indexing algorithms

Ariel Futoransky; Damián Saura; Ariel Waissbein


IACR Cryptology ePrint Archive | 2005

Foundations and Applications for Secure Triggers.

Ariel Futoransky; Emiliano Kargieman; Carlos Sarraute; Ariel Waissbein

Collaboration


Dive into the Ariel Waissbein's collaboration.

Top Co-Authors

Avatar

Carlos Sarraute

Core Security Technologies

View shared research outputs
Top Co-Authors

Avatar

Antonio Cafure

University of Buenos Aires

View shared research outputs
Top Co-Authors

Avatar

Guillermo Matera

National Scientific and Technical Research Council

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge