Secure auditing of information systems A Futoransky, E Kargieman, D Bendersky, L Notarfrancesco, G Richarte, ... US Patent App. 10/414,120, 2003 | 160 | 2003 |
An analysis of the slapper worm I Arce, E Levy IEEE Security & Privacy 1 (1), 82-87, 2003 | 158 | 2003 |
The weakest link revisited I Arce IEEE Security & Privacy 99 (2), 72-76, 2003 | 128* | 2003 |
Avoiding the top 10 software security design flaws I Arce, K Clark-Fisher, N Daswani, J DelGrosso, D Dhillon, C Kern, ... IEEE Computer Society Center for Secure Design (CSD), Tech. Rep, 2014 | 71 | 2014 |
Criminals Become Tech Savvy. E Levy, I Arce IEEE Secur. Priv. 2 (2), 65-68, 2004 | 57 | 2004 |
Guest editors' introduction: Why attacking systems is a good idea I Arce, G McGraw IEEE Security & Privacy 2 (4), 17-19, 2004 | 53 | 2004 |
The shellcode generation I Arce IEEE security & privacy 2 (5), 72-76, 2004 | 51 | 2004 |
Guest editors' introduction: In cloud computing we trust-But should we? A Ghosh, I Arce IEEE security & privacy 8 (6), 14-16, 2010 | 46 | 2010 |
Framework for maintaining information security in computer networks IA Velleggia, A Futoransky, G Richarte, E Kargieman, C Ochoa US Patent App. 10/354,568, 2003 | 43 | 2003 |
The Rise of the Gadgets I Arce IEEE Security & Privacy 1 (5), 78-81, 2003 | 25 | 2003 |
More bang for the bug: An account of 2003's attack trends I Arce IEEE Security & Privacy 2 (1), 66-68, 2004 | 21 | 2004 |
BARF: a multiplatform open source binary analysis and reverse engineering framework C Heitman, I Arce XX Congreso Argentino de Ciencias de la Computación (Buenos Aires, 2014), 2014 | 15 | 2014 |
Ghost in the virtual machine I Arce IEEE Security & Privacy 5 (4), 68-71, 2007 | 15 | 2007 |
Bad peripherals I Arce IEEE security & privacy 3 (1), 70-73, 2005 | 14 | 2005 |
New threats and attacks on the world wide web E Levy, I Arce IEEE Security & Privacy, 234-266, 2006 | 13 | 2006 |
The confused deputy and the domain hijacker D Ahmad, I Arce IEEE Security & Privacy 6 (1), 74-77, 2008 | 11 | 2008 |
State of the art security from an attacker’s viewpoint I Arce, G Richarte PacSec Conference, Tokyo, Japan, 2003 | 10 | 2003 |
Bug hunting: the seven ways of the security samurai I Arce Computer 35 (4), supl11-supl15, 2002 | 7 | 2002 |
Why offensive security needs engineering textbooks S Bratus, I Arce, ME Locasto, S Zanero Yale Law & Policy Review, 2, 2013 | 5 | 2013 |
The kernel craze I Arce IEEE security & privacy 2 (3), 79-81, 2004 | 5 | 2004 |