<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=David+Lindsay</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=David+Lindsay"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/David_Lindsay"/>
		<updated>2026-04-24T11:16:36Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Source_Code_Analysis_Tools&amp;diff=162042</id>
		<title>Source Code Analysis Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Source_Code_Analysis_Tools&amp;diff=162042"/>
				<updated>2013-10-30T16:30:22Z</updated>
		
		<summary type="html">&lt;p&gt;David Lindsay: Corrected name/link for Coverity's static analysis tool&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Source Code Analysis tools are designed to analyze source code and/or compiled version of code in order to help find security flaws. Ideally, such tools would automatically find security flaws with a high degree of confidence that what is found is indeed a flaw. However, this is beyond the state of the art for many types of application security flaws. Thus, such tools frequently serve as aids for an analyst to help them zero in on security relevant portions of code so they can find flaws more efficiently, rather than a tool that simply finds flaws automatically.&lt;br /&gt;
&lt;br /&gt;
Some tools are starting to move into the IDE. For the types of problems that can be detected during the software development phase itself, this is a powerful phase within the development lifecycle to employ such tools, as it provides immediate feedback to the developer on issues they might be introducing into the code during code development itself. This immediate feedback is very useful as compared to finding vulnerabilities much later in the development cycle.&lt;br /&gt;
&lt;br /&gt;
==Strengths and Weaknesses of such tools==&lt;br /&gt;
&lt;br /&gt;
=== Strengths ===&lt;br /&gt;
* Scales Well (Can be run on lots of software, and can be repeatedly (like in nightly builds))&lt;br /&gt;
* For things that such tools can automatically find with high confidence, such as buffer overflows, SQL Injection Flaws, etc. they are great.&lt;br /&gt;
* Output is good for developers - it highlights the precise source files and line numbers that are affected&lt;br /&gt;
&lt;br /&gt;
=== Weaknesses ===&lt;br /&gt;
* Many types of security vulnerabilities are very difficult to find automatically, such as authentication problems, access control issues, insecure use of cryptography, etc. The current state of the art only allows such tools to automatically find a relatively small percentage of application security flaws. Tools of this type are getting better, however.&lt;br /&gt;
* High numbers of false positives.&lt;br /&gt;
* Frequently can't find configuration issues, since they are not represented in the code.&lt;br /&gt;
* Difficult to 'prove' that an identified security issue is an actual vulnerability.&lt;br /&gt;
* Many of these tools have difficulty analyzing code that can't be compiled. Analysts frequently can't compile code because they don't have the right libraries, all the compilation instructions, all the code, etc.&lt;br /&gt;
&lt;br /&gt;
==Important Selection Criteria==&lt;br /&gt;
&lt;br /&gt;
* Requirement: Must support your language, but not usually a key factor once it does.&lt;br /&gt;
&lt;br /&gt;
* Types of Vulnerabilities it can detect (Out of the OWASP Top Ten?) (plus more?)&lt;br /&gt;
* Does it require a fully buildable set of source?&lt;br /&gt;
* Can it run against binaries instead of source?&lt;br /&gt;
* Can it be integrated into the developer's IDE?&lt;br /&gt;
* License cost for the tool. (Some are sold per user, per org, per app, per line of code analyzed. Consulting licenses are frequently different than end user licenses.)&lt;br /&gt;
&lt;br /&gt;
==OWASP Tools Of This Type==&lt;br /&gt;
* [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project OWASP Orizon Project]&lt;br /&gt;
* [[OWASP_LAPSE_Project | OWASP LAPSE Project]]&lt;br /&gt;
* [[OWASP O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
==Open Source or Free Tools Of This Type==&lt;br /&gt;
&lt;br /&gt;
* [http://www.stachliu.com/resources/tools/google-hacking-diggity-project/attack-tools/ Google CodeSearchDiggity] - Utilizes Google Code Search to identifies vulnerabilities in open source code projects hosted by Google Code, MS CodePlex, SourceForge, Github, and more. The tool comes with over 130 default searches that identify SQL injection, cross-site scripting (XSS), insecure remote and local file includes, hard-coded passwords, and much more.  ''Essentially, Google CodeSearchDiggity provides a source code security analysis of nearly every single open source code project in existence – simultaneously.'' &lt;br /&gt;
* [http://findbugs.sourceforge.net/ FindBugs] - Find Bugs (including some security flaws) in Java Programs&lt;br /&gt;
* [http://msdn.microsoft.com/en-us/library/bb429476(VS.80).aspx FxCop] (Microsoft) - FxCop is an application that analyzes managed code assemblies (code that targets the .NET Framework common language runtime) and reports information about the assemblies, such as possible design, localization, performance, and security improvements.&lt;br /&gt;
* [http://pmd.sourceforge.net/ PMD] - PMD scans Java source code and looks for potential code problems (this is a code quality tool that does not focus on security issues)&lt;br /&gt;
* [http://msdn.microsoft.com/en-us/library/ms933794.aspx PreFast] (Microsoft) - PREfast is a static analysis tool that identifies defects in C/C++ programs&lt;br /&gt;
* [https://www.fortify.com/ssa-elements/threat-intelligence/rats.html RATS] (Fortify) - Scans C, C++, Perl, PHP and Python source code for security problems like buffer overflows and TOCTOU (Time Of Check, Time Of Use) race conditions&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_SWAAT_Project OWASP SWAAT Project] - Simplistic Beta Tool - Languages: Java, JSP, ASP .Net, and PHP&lt;br /&gt;
* [http://www.dwheeler.com/flawfinder/ Flawfinder] Flawfinder - Scans C and C++&lt;br /&gt;
* [http://sourceforge.net/projects/rips-scanner/ RIPS] - RIPS is a static source code analyzer for vulnerabilities in PHP web applications&lt;br /&gt;
* [http://brakemanscanner.org/ Brakeman] - Brakeman is an open source vulnerability scanner specifically designed for Ruby on Rails applications&lt;br /&gt;
* [http://rubygems.org/gems/codesake-dawn Codesake Dawn] - Codesake Dawn is an open source security source code analyzer designed for Sinatra, Padrino and Ruby on Rails applications. It can work also for non web application wrote in Ruby programming language &lt;br /&gt;
* [http://sourceforge.net/projects/visualcodegrepp/ VCG] - Scans C/C++, Java, C# and PL/SQL for security issues and for comments which may indicate defective code. The config files can be used to carry out additional checks for banned functions or functions which commonly cause security issues.&lt;br /&gt;
&lt;br /&gt;
==Commercial Tools from OWASP Members Of This Type==&lt;br /&gt;
&lt;br /&gt;
These vendors have decided to support OWASP by becoming [[Membership|members]]. OWASP appreciates the support from these organizations, but cannot endorse any commercial products or services.&lt;br /&gt;
&lt;br /&gt;
* [http://www-01.ibm.com/software/rational/products/appscan/source/ IBM Security AppScan Source Edition] (formerly Ounce)&lt;br /&gt;
* [http://www.armorize.com/codesecure/ Static Source Code Analysis with CodeSecure™] (Armorize Technologies)&lt;br /&gt;
* [http://www.checkmarx.com/technology/static-code-analysis-sca/ Static Code Analysis] (Checkmarx)&lt;br /&gt;
* [http://www.coverity.com/products/security-advisor.html Security Advisor] (Coverity)&lt;br /&gt;
* [https://www.fortify.com/products/hpfssc/source-code-analyzer.html Source Code Analysis] (HP/Fortify)&lt;br /&gt;
* [http://www.parasoft.com/jsp/capabilities/static_analysis.jsp?itemId=547 Parasoft Test] (Parasoft)&lt;br /&gt;
* [http://www.veracode.com/ Veracode] (Veracode)&lt;br /&gt;
&lt;br /&gt;
==Other Well Known Commercial Tools Of This Type==&lt;br /&gt;
&lt;br /&gt;
* [http://www.klocwork.com/products/insight.asp Insight] (KlocWork)&lt;br /&gt;
* [http://www.sourcepatrol.co.uk/ Source Patrol] (Pentest)&lt;br /&gt;
&lt;br /&gt;
==More Info==&lt;br /&gt;
&lt;br /&gt;
* TODO: add comments from: http://lists.owasp.org/pipermail/owasp-dotnet/2006-August/000002.html&lt;br /&gt;
* [[Appendix_A:_Testing_Tools | Appendix A: Testing Tools]]&lt;br /&gt;
* [http://samate.nist.gov/index.php/Source_Code_Security_Analyzers NIST's list of Source Code Security Analysis Tools]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP .NET Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>David Lindsay</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Source_Code_Analysis_Tools&amp;diff=162041</id>
		<title>Source Code Analysis Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Source_Code_Analysis_Tools&amp;diff=162041"/>
				<updated>2013-10-30T16:28:03Z</updated>
		
		<summary type="html">&lt;p&gt;David Lindsay: Moving Coverity and Parasoft into the OWASP Members category since they're both listed as OWASP members on the home page.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Source Code Analysis tools are designed to analyze source code and/or compiled version of code in order to help find security flaws. Ideally, such tools would automatically find security flaws with a high degree of confidence that what is found is indeed a flaw. However, this is beyond the state of the art for many types of application security flaws. Thus, such tools frequently serve as aids for an analyst to help them zero in on security relevant portions of code so they can find flaws more efficiently, rather than a tool that simply finds flaws automatically.&lt;br /&gt;
&lt;br /&gt;
Some tools are starting to move into the IDE. For the types of problems that can be detected during the software development phase itself, this is a powerful phase within the development lifecycle to employ such tools, as it provides immediate feedback to the developer on issues they might be introducing into the code during code development itself. This immediate feedback is very useful as compared to finding vulnerabilities much later in the development cycle.&lt;br /&gt;
&lt;br /&gt;
==Strengths and Weaknesses of such tools==&lt;br /&gt;
&lt;br /&gt;
=== Strengths ===&lt;br /&gt;
* Scales Well (Can be run on lots of software, and can be repeatedly (like in nightly builds))&lt;br /&gt;
* For things that such tools can automatically find with high confidence, such as buffer overflows, SQL Injection Flaws, etc. they are great.&lt;br /&gt;
* Output is good for developers - it highlights the precise source files and line numbers that are affected&lt;br /&gt;
&lt;br /&gt;
=== Weaknesses ===&lt;br /&gt;
* Many types of security vulnerabilities are very difficult to find automatically, such as authentication problems, access control issues, insecure use of cryptography, etc. The current state of the art only allows such tools to automatically find a relatively small percentage of application security flaws. Tools of this type are getting better, however.&lt;br /&gt;
* High numbers of false positives.&lt;br /&gt;
* Frequently can't find configuration issues, since they are not represented in the code.&lt;br /&gt;
* Difficult to 'prove' that an identified security issue is an actual vulnerability.&lt;br /&gt;
* Many of these tools have difficulty analyzing code that can't be compiled. Analysts frequently can't compile code because they don't have the right libraries, all the compilation instructions, all the code, etc.&lt;br /&gt;
&lt;br /&gt;
==Important Selection Criteria==&lt;br /&gt;
&lt;br /&gt;
* Requirement: Must support your language, but not usually a key factor once it does.&lt;br /&gt;
&lt;br /&gt;
* Types of Vulnerabilities it can detect (Out of the OWASP Top Ten?) (plus more?)&lt;br /&gt;
* Does it require a fully buildable set of source?&lt;br /&gt;
* Can it run against binaries instead of source?&lt;br /&gt;
* Can it be integrated into the developer's IDE?&lt;br /&gt;
* License cost for the tool. (Some are sold per user, per org, per app, per line of code analyzed. Consulting licenses are frequently different than end user licenses.)&lt;br /&gt;
&lt;br /&gt;
==OWASP Tools Of This Type==&lt;br /&gt;
* [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project OWASP Orizon Project]&lt;br /&gt;
* [[OWASP_LAPSE_Project | OWASP LAPSE Project]]&lt;br /&gt;
* [[OWASP O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
==Open Source or Free Tools Of This Type==&lt;br /&gt;
&lt;br /&gt;
* [http://www.stachliu.com/resources/tools/google-hacking-diggity-project/attack-tools/ Google CodeSearchDiggity] - Utilizes Google Code Search to identifies vulnerabilities in open source code projects hosted by Google Code, MS CodePlex, SourceForge, Github, and more. The tool comes with over 130 default searches that identify SQL injection, cross-site scripting (XSS), insecure remote and local file includes, hard-coded passwords, and much more.  ''Essentially, Google CodeSearchDiggity provides a source code security analysis of nearly every single open source code project in existence – simultaneously.'' &lt;br /&gt;
* [http://findbugs.sourceforge.net/ FindBugs] - Find Bugs (including some security flaws) in Java Programs&lt;br /&gt;
* [http://msdn.microsoft.com/en-us/library/bb429476(VS.80).aspx FxCop] (Microsoft) - FxCop is an application that analyzes managed code assemblies (code that targets the .NET Framework common language runtime) and reports information about the assemblies, such as possible design, localization, performance, and security improvements.&lt;br /&gt;
* [http://pmd.sourceforge.net/ PMD] - PMD scans Java source code and looks for potential code problems (this is a code quality tool that does not focus on security issues)&lt;br /&gt;
* [http://msdn.microsoft.com/en-us/library/ms933794.aspx PreFast] (Microsoft) - PREfast is a static analysis tool that identifies defects in C/C++ programs&lt;br /&gt;
* [https://www.fortify.com/ssa-elements/threat-intelligence/rats.html RATS] (Fortify) - Scans C, C++, Perl, PHP and Python source code for security problems like buffer overflows and TOCTOU (Time Of Check, Time Of Use) race conditions&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_SWAAT_Project OWASP SWAAT Project] - Simplistic Beta Tool - Languages: Java, JSP, ASP .Net, and PHP&lt;br /&gt;
* [http://www.dwheeler.com/flawfinder/ Flawfinder] Flawfinder - Scans C and C++&lt;br /&gt;
* [http://sourceforge.net/projects/rips-scanner/ RIPS] - RIPS is a static source code analyzer for vulnerabilities in PHP web applications&lt;br /&gt;
* [http://brakemanscanner.org/ Brakeman] - Brakeman is an open source vulnerability scanner specifically designed for Ruby on Rails applications&lt;br /&gt;
* [http://rubygems.org/gems/codesake-dawn Codesake Dawn] - Codesake Dawn is an open source security source code analyzer designed for Sinatra, Padrino and Ruby on Rails applications. It can work also for non web application wrote in Ruby programming language &lt;br /&gt;
* [http://sourceforge.net/projects/visualcodegrepp/ VCG] - Scans C/C++, Java, C# and PL/SQL for security issues and for comments which may indicate defective code. The config files can be used to carry out additional checks for banned functions or functions which commonly cause security issues.&lt;br /&gt;
&lt;br /&gt;
==Commercial Tools from OWASP Members Of This Type==&lt;br /&gt;
&lt;br /&gt;
These vendors have decided to support OWASP by becoming [[Membership|members]]. OWASP appreciates the support from these organizations, but cannot endorse any commercial products or services.&lt;br /&gt;
&lt;br /&gt;
* [http://www-01.ibm.com/software/rational/products/appscan/source/ IBM Security AppScan Source Edition] (formerly Ounce)&lt;br /&gt;
* [http://www.armorize.com/codesecure/ Static Source Code Analysis with CodeSecure™] (Armorize Technologies)&lt;br /&gt;
* [http://www.checkmarx.com/technology/static-code-analysis-sca/ Static Code Analysis] (Checkmarx)&lt;br /&gt;
* [http://www.coverity.com/products/static-analysis.html Static Analysis] (Coverity)&lt;br /&gt;
* [https://www.fortify.com/products/hpfssc/source-code-analyzer.html Source Code Analysis] (HP/Fortify)&lt;br /&gt;
* [http://www.parasoft.com/jsp/capabilities/static_analysis.jsp?itemId=547 Parasoft Test] (Parasoft)&lt;br /&gt;
* [http://www.veracode.com/ Veracode] (Veracode)&lt;br /&gt;
&lt;br /&gt;
==Other Well Known Commercial Tools Of This Type==&lt;br /&gt;
&lt;br /&gt;
* [http://www.klocwork.com/products/insight.asp Insight] (KlocWork)&lt;br /&gt;
* [http://www.sourcepatrol.co.uk/ Source Patrol] (Pentest)&lt;br /&gt;
&lt;br /&gt;
==More Info==&lt;br /&gt;
&lt;br /&gt;
* TODO: add comments from: http://lists.owasp.org/pipermail/owasp-dotnet/2006-August/000002.html&lt;br /&gt;
* [[Appendix_A:_Testing_Tools | Appendix A: Testing Tools]]&lt;br /&gt;
* [http://samate.nist.gov/index.php/Source_Code_Security_Analyzers NIST's list of Source Code Security Analysis Tools]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP .NET Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>David Lindsay</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Browser_Security_ACID_Tests_Project&amp;diff=106223</id>
		<title>OWASP Browser Security ACID Tests Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Browser_Security_ACID_Tests_Project&amp;diff=106223"/>
				<updated>2011-03-04T02:34:46Z</updated>
		
		<summary type="html">&lt;p&gt;David Lindsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
&lt;br /&gt;
== Welcome! ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the Browser Security Acid Tests project.  OWASP has adopted this project with the goal to create an in-depth suite of test cases for highlighting security issues in web browsers.  By highlighting such issues, we can help browser vendors adopt appropriate security controls and implement new security features in a more consistent manner.  We can also help raise public awareness about various security issues while providing objective data on the current status of browser security.&lt;br /&gt;
&lt;br /&gt;
The project is under active development.  Please take a look at TBD for ways you can contribute.&lt;br /&gt;
&lt;br /&gt;
==== Purpose ====&lt;br /&gt;
&lt;br /&gt;
Web browsers are *very* complicated pieces of software. The landscape of functionality provided by modern browsers is pocketed with security concerns, both large and small.  This project was started in order to help people get a better understanding of what these issues are while also providing browser vendors a forum to compare strategies, vulnerabilities, and new features.&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
==== Approach ====&lt;br /&gt;
&lt;br /&gt;
In order to get a feel for the security landscape of modern browsers, it's essential to be able to create have a wide range of test cases covering both high and low level security issues.  In order to keep things as objective (and simple) as possible, we've opted to focus on automation as much as possible.  To run these automated tests, a powerful and generic framework is needed that can run in as many browsers as possible.  Fortunately, OWASP has adopted the [http://www.owasp.org/index.php/OWASP_Web_Browser_Testing_System_Project Web Browser Testing System Project], a testing harness originally developed and contributed by Isaac Dawson.&lt;br /&gt;
&lt;br /&gt;
...more details...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Current Status ====&lt;br /&gt;
&lt;br /&gt;
This project is under active development.  We are currently working to establish the scope of the project, adopt a sensible testing framework, and gather support from interested browser vendors.  &lt;br /&gt;
&lt;br /&gt;
This roadmap is being developed to help establish project scope, goals, needed contributions, and so forth.&lt;br /&gt;
&lt;br /&gt;
'''Phase 0: Project Setup'''&lt;br /&gt;
* Adopt testing framework&lt;br /&gt;
** Isaac's WBTS&lt;br /&gt;
** Configure/setup/tweak framework for internal (project contributors) use&lt;br /&gt;
** If we're adopting Isaac's framework, he/we will need to finish the rewrite&lt;br /&gt;
&lt;br /&gt;
* Establish test case generation/submission process&lt;br /&gt;
** figure out how to integrate automated and manual tests&lt;br /&gt;
** clarify what a test case is exactly&lt;br /&gt;
** crowd-sourcing test cases (potentially, if so, we'll need a submission portal)&lt;br /&gt;
** confirm key team members contributors including &amp;quot;tainted&amp;quot; people key reviewers who are vendor neutral&lt;br /&gt;
** crowd-source component (?)&lt;br /&gt;
&lt;br /&gt;
* Clarify categories/scope for test cases&lt;br /&gt;
** ensure separation between funded test case work and unfunded &amp;quot;edge-case&amp;quot; work (e.g. fuzzing tests which qualify for bounty rewards)&lt;br /&gt;
&lt;br /&gt;
* Establish communication policy between project and browser vendors&lt;br /&gt;
** disclosure policy for vulns identified in any given browser&lt;br /&gt;
&lt;br /&gt;
* Establish deliverable output format&lt;br /&gt;
** Presumably a website which the public can visit to run all automated tests and view results of manual tests&lt;br /&gt;
** Clarify what deliverable items funding browser vendors can expect (if any)&lt;br /&gt;
&lt;br /&gt;
* Secure funding&lt;br /&gt;
** Establish website development requirements&lt;br /&gt;
&lt;br /&gt;
'''Phase 1: Project Work for Basic Test Cases'''&lt;br /&gt;
* Establish test case areas to cover&lt;br /&gt;
** Prioritize these areas&lt;br /&gt;
&lt;br /&gt;
* Develop Test Cases&lt;br /&gt;
** have a meetup for primary contributors to hammer out test cases (potentially)&lt;br /&gt;
&lt;br /&gt;
* Develop website for running test cases and viewing results&lt;br /&gt;
** may include a submission portal&lt;br /&gt;
&lt;br /&gt;
* Execute test cases&lt;br /&gt;
** Disclose failing test cases to appropriate vendors&lt;br /&gt;
&lt;br /&gt;
* Deploy website&lt;br /&gt;
** establish hosting location (say in amazon cloud)&lt;br /&gt;
** domain name&lt;br /&gt;
&lt;br /&gt;
* Complete/deliver any other deliverables to funding entities&lt;br /&gt;
&lt;br /&gt;
'''Phase 2: Periodic Updates'''&lt;br /&gt;
* Develop new test cases&lt;br /&gt;
&lt;br /&gt;
* Rerun all test cases&lt;br /&gt;
&lt;br /&gt;
* Bug Fixes&lt;br /&gt;
&lt;br /&gt;
* Update Website and Test Cases&lt;br /&gt;
&lt;br /&gt;
* Market website&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Get Involved ====&lt;br /&gt;
&lt;br /&gt;
You can help by...&lt;br /&gt;
&lt;br /&gt;
==== Proposal to Browser Vendors ====&lt;br /&gt;
&lt;br /&gt;
Build test cases...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== About ====&lt;br /&gt;
{{:Projects/OWASP Browser Security ACID Tests Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|Browser Security ACID Tests Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Alpha_Quality_Tool]]&lt;/div&gt;</summary>
		<author><name>David Lindsay</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Browser_Security_ACID_Tests_Project&amp;diff=105536</id>
		<title>OWASP Browser Security ACID Tests Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Browser_Security_ACID_Tests_Project&amp;diff=105536"/>
				<updated>2011-02-22T03:09:10Z</updated>
		
		<summary type="html">&lt;p&gt;David Lindsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
&lt;br /&gt;
== Welcome! ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the Browser Security Acid Tests project.  OWASP has adopted this project with the goal to create an in-depth suite of test cases for highlighting security issues in web browsers.  By highlighting such issues, we can help browser vendors adopt appropriate security controls and implement new security features in a more consistent manner.  We can also help raise public awareness about various security issues while providing objective data on the current status of browser security.&lt;br /&gt;
&lt;br /&gt;
The project is under active development.  Please take a look at TBD for ways you can contribute.&lt;br /&gt;
&lt;br /&gt;
==== Purpose ====&lt;br /&gt;
&lt;br /&gt;
Web browsers are *very* complicated pieces of software. The landscape of functionality provided by modern browsers is pocketed with security concerns, both large and small.  This project was started in order to help people get a better understanding of what these issues are while also providing browser vendors a forum to compare strategies, vulnerabilities, and new features.&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
==== Approach ====&lt;br /&gt;
&lt;br /&gt;
In order to get a feel for the security landscape of modern browsers, it's essential to be able to create have a wide range of test cases covering both high and low level security issues.  In order to keep things as objective (and simple) as possible, we've opted to focus on automation as much as possible.  To run these automated tests, a powerful and generic framework is needed that can run in as many browsers as possible.  Fortunately, OWASP has adopted the [http://www.owasp.org/index.php/OWASP_Web_Browser_Testing_System_Project Web Browser Testing System Project], a testing harness originally developed and contributed by Isaac Dawson.&lt;br /&gt;
&lt;br /&gt;
...more details...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Current Status ====&lt;br /&gt;
&lt;br /&gt;
This project is under active development.  We are currently working to establish the scope of the project, adopt a sensible testing framework, and gather support from interested browser vendors.  &lt;br /&gt;
&lt;br /&gt;
This roadmap is being developed to help establish project scope, goals, needed contributions, and so forth.&lt;br /&gt;
&lt;br /&gt;
'''Phase 0: Project Setup'''&lt;br /&gt;
* Adopt testing framework&lt;br /&gt;
** Isaac's WBTS&lt;br /&gt;
** Configure/setup/tweak framework for internal (project contributors) use&lt;br /&gt;
** If we're adopting Isaac's framework, he/we will need to finish the rewrite&lt;br /&gt;
&lt;br /&gt;
* Establish test case generation/submission process&lt;br /&gt;
** figure out how to integrate automated and manual tests&lt;br /&gt;
** clarify what a test case is exactly&lt;br /&gt;
** crowd-sourcing test cases (potentially, if so, we'll need a submission portal)&lt;br /&gt;
** confirm key team members contributors including &amp;quot;tainted&amp;quot; people key reviewers who are vendor neutral&lt;br /&gt;
** crowd-source component (?)&lt;br /&gt;
&lt;br /&gt;
* Clarify categories/scope for test cases&lt;br /&gt;
** ensure separation between funded test case work and unfunded &amp;quot;edge-case&amp;quot; work (e.g. fuzzing tests which qualify for bounty rewards)&lt;br /&gt;
&lt;br /&gt;
* Establish communication policy between project and browser vendors&lt;br /&gt;
** disclosure policy for vulns identified in any given browser&lt;br /&gt;
&lt;br /&gt;
* Establish deliverable output format&lt;br /&gt;
** Presumably a website which the public can visit to run all automated tests and view results of manual tests&lt;br /&gt;
** Clarify what deliverable items funding browser vendors can expect (if any)&lt;br /&gt;
* Secure funding&lt;br /&gt;
&lt;br /&gt;
'''Phase 1: Project Work for Basic Test Cases'''&lt;br /&gt;
* Establish test case areas to cover&lt;br /&gt;
** Prioritize these areas&lt;br /&gt;
&lt;br /&gt;
* Develop Test Cases&lt;br /&gt;
** have a meetup for primary contributors to hammer out test cases (potentially)&lt;br /&gt;
&lt;br /&gt;
* Develop website for running test cases and viewing results&lt;br /&gt;
** may include a submission portal&lt;br /&gt;
&lt;br /&gt;
* Execute test cases&lt;br /&gt;
** Disclose failing test cases to appropriate vendors&lt;br /&gt;
&lt;br /&gt;
* Deploy website&lt;br /&gt;
** establish hosting location (say in amazon cloud)&lt;br /&gt;
** domain name&lt;br /&gt;
&lt;br /&gt;
* Complete/deliver any other deliverables to funding entities&lt;br /&gt;
&lt;br /&gt;
'''Phase 2: Periodic Updates'''&lt;br /&gt;
* Develop new test cases&lt;br /&gt;
&lt;br /&gt;
* Rerun all test cases&lt;br /&gt;
&lt;br /&gt;
* Bug Fixes&lt;br /&gt;
&lt;br /&gt;
* Update Website and Test Cases&lt;br /&gt;
&lt;br /&gt;
* Market website&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Get Involved ====&lt;br /&gt;
&lt;br /&gt;
You can help by...&lt;br /&gt;
&lt;br /&gt;
==== Proposal to Browser Vendors ====&lt;br /&gt;
&lt;br /&gt;
Build test cases...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== About ====&lt;br /&gt;
{{:Projects/OWASP Browser Security ACID Tests Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|Browser Security ACID Tests Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Alpha_Quality_Tool]]&lt;/div&gt;</summary>
		<author><name>David Lindsay</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Browser_Security_ACID_Tests_Project&amp;diff=105535</id>
		<title>OWASP Browser Security ACID Tests Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Browser_Security_ACID_Tests_Project&amp;diff=105535"/>
				<updated>2011-02-22T02:45:53Z</updated>
		
		<summary type="html">&lt;p&gt;David Lindsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
&lt;br /&gt;
== Browser Security Acid Tests ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the Browser Security Acid Tests.  OWASP has adopted this project with the goal to create an in-depth suite of test cases for identifying security issues in web browsers.  By highlighting such issues, we can help browser vendors adopt appropriate security controls and implement new security features in a more consistent manner.  We can also help raise public awareness about various security issues while providing objective data on the current status of browser security.&lt;br /&gt;
&lt;br /&gt;
The project is under active development.  Please take a look at TBD for ways you can contribute.&lt;br /&gt;
&lt;br /&gt;
==== Purpose ====&lt;br /&gt;
&lt;br /&gt;
Web browsers are *very* complicated pieces of software. The landscape of functionality provided by modern browsers is pocketed with security concerns, both large and small.  This project was started in order to help people get a better understanding of what these issues are while also providing browser vendors a forum to compare strategies, vulnerabilities, and new features.&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
==== Approach ====&lt;br /&gt;
&lt;br /&gt;
In order to get a feel for the security landscape of modern browsers, it's essential to be able to create have a wide range of test cases covering both high and low level security issues.  In order to keep things as objective (and simple) as possible, we've opted to focus on automation as much as possible.  To run these automated tests, a powerful and generic framework is needed that can run in as many browsers as possible.  Fortunately, OWASP has adopted the [http://www.owasp.org/index.php/OWASP_Web_Browser_Testing_System_Project Web Browser Testing System Project], a testing harness originally developed and contributed by Isaac Dawson.&lt;br /&gt;
&lt;br /&gt;
...more details...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Current Status ====&lt;br /&gt;
&lt;br /&gt;
This project is under active development.  We are currently working to establish the scope of the project, adopt a sensible testing framework, and gather support from interested browser vendors.&lt;br /&gt;
&lt;br /&gt;
==== Get Involved ====&lt;br /&gt;
&lt;br /&gt;
You can help by...&lt;br /&gt;
&lt;br /&gt;
==== Proposal to Browser Vendors ====&lt;br /&gt;
&lt;br /&gt;
Build test cases...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== About ====&lt;br /&gt;
{{:Projects/OWASP Browser Security ACID Tests Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|Browser Security ACID Tests Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Alpha_Quality_Tool]]&lt;/div&gt;</summary>
		<author><name>David Lindsay</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Browser_Security_ACID_Tests_Project&amp;diff=105534</id>
		<title>OWASP Browser Security ACID Tests Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Browser_Security_ACID_Tests_Project&amp;diff=105534"/>
				<updated>2011-02-22T02:44:57Z</updated>
		
		<summary type="html">&lt;p&gt;David Lindsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
&lt;br /&gt;
== Browser Security Acid Tests ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the Browser Security Acid Tests.  OWASP has adopted this project with the goal to create an in-depth suite of test cases for identifying security issues in web browsers.  By highlighting such issues, we can help browser vendors adopt appropriate security controls and implement new security features in a more consistent manner.  We can also help raise public awareness about various security issues while providing objective data on the current status of browser security.&lt;br /&gt;
&lt;br /&gt;
The project is under active development.  Please take a look at TBD for ways you can contribute.&lt;br /&gt;
&lt;br /&gt;
==== Purpose ====&lt;br /&gt;
&lt;br /&gt;
Web browsers are *very* complicated pieces of software. The landscape of functionality provided by modern browsers is pocketed with security concerns, both large and small.  This project was started in order to help people get a better understanding of what these issues are while also providing browser vendors a forum to compare strategies, vulnerabilities, and new features.&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
==== Approach ====&lt;br /&gt;
&lt;br /&gt;
In order to get a feel for the security landscape of modern browsers, it's essential to be able to create have a wide range of test cases covering both high and low level security issues.  In order to keep things as objective (and simple) as possible, we've opted to focus on automation as much as possible.  To run these automated tests, a powerful and generic framework is needed that can run in as many browsers as possible.  Fortunately, OWASP has adopted the [http://www.owasp.org/index.php/OWASP_Web_Browser_Testing_System_Project Web Browser Testing System Project], a testing harness originally developed and contributed by Isaac Dawson.&lt;br /&gt;
&lt;br /&gt;
...more details...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Current Status ====&lt;br /&gt;
&lt;br /&gt;
This project is under active development.  We are currently working to establish the scope of the project, adopt a sensible testing framework, and gather support from interested browser vendors.&lt;br /&gt;
&lt;br /&gt;
==== Get Involved ====&lt;br /&gt;
&lt;br /&gt;
You can help by...&lt;br /&gt;
&lt;br /&gt;
==== Proposal to Browser Vendors ====&lt;br /&gt;
&lt;br /&gt;
Build test cases...&lt;br /&gt;
&lt;br /&gt;
==== &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== About ====&lt;br /&gt;
{{:Projects/OWASP Browser Security ACID Tests Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|Browser Security ACID Tests Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Alpha_Quality_Tool]]&lt;/div&gt;</summary>
		<author><name>David Lindsay</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Browser_Security_ACID_Tests_Project&amp;diff=105533</id>
		<title>OWASP Browser Security ACID Tests Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Browser_Security_ACID_Tests_Project&amp;diff=105533"/>
				<updated>2011-02-22T02:30:53Z</updated>
		
		<summary type="html">&lt;p&gt;David Lindsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
&lt;br /&gt;
== Browser Security Acid Tests ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the Browser Security Acid Tests.  OWASP has adopted this project with the goal to create an in-depth suite of test cases for identifying security issues in web browsers.  By highlighting such issues, we can help browser vendors adopt appropriate security controls and implement new security features in a more consistent manner.  We can also help raise public awareness about various security issues while providing objective data on the current status of browser security.&lt;br /&gt;
&lt;br /&gt;
The project is under active development.  Please take a look at TBD for ways you can contribute.&lt;br /&gt;
&lt;br /&gt;
==== Purpose ====&lt;br /&gt;
&lt;br /&gt;
Web browsers are *very* complicated pieces of software. The landscape of functionality provided by modern browsers is pocketed with security concerns, both large and small.  This project was started in order to help people get a better understanding of what these issues are while also providing browser vendors a forum to compare strategies, vulnerabilities, and new features.&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
==== Current Status ====&lt;br /&gt;
&lt;br /&gt;
This project is under active development.  We are currently working to establish the scope of the project, adopt a sensible testing framework, and gather support from interested browser vendors.&lt;br /&gt;
&lt;br /&gt;
==== Get Involved ====&lt;br /&gt;
&lt;br /&gt;
You can help by...&lt;br /&gt;
&lt;br /&gt;
==== Proposal to Browser Vendors ====&lt;br /&gt;
&lt;br /&gt;
Build test cases...&lt;br /&gt;
&lt;br /&gt;
==== &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== About ====&lt;br /&gt;
{{:Projects/OWASP Browser Security ACID Tests Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|Browser Security ACID Tests Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Alpha_Quality_Tool]]&lt;/div&gt;</summary>
		<author><name>David Lindsay</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session043&amp;diff=103543</id>
		<title>Summit 2011 Working Sessions/Session043</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session043&amp;diff=103543"/>
				<updated>2011-02-05T22:47:02Z</updated>
		
		<summary type="html">&lt;p&gt;David Lindsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name1 = Lucas C. Ferreira&lt;br /&gt;
| summit_session_attendee_email1 = lucas.ferreira@owasp.org&lt;br /&gt;
| summit_session_attendee_username1 = &lt;br /&gt;
| summit_session_attendee_company1=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name2 = Achim Hoffmann&lt;br /&gt;
| summit_session_attendee_email2 = achim@owasp.org&lt;br /&gt;
| summit_session_attendee_username2 = Achim&lt;br /&gt;
| summit_session_attendee_company2= sic[!]sec&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name3 = Justin Clarke&lt;br /&gt;
| summit_session_attendee_email3 = justin.clarke@owasp.org&lt;br /&gt;
| summit_session_attendee_username3 = &lt;br /&gt;
| summit_session_attendee_company3=Gotham Digital Science&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3=How can we package, and/or make this easier for noobs to deploy?&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name4 = Giorgio Fedon&lt;br /&gt;
| summit_session_attendee_email4 = &lt;br /&gt;
| summit_session_attendee_username4 = gfedon&lt;br /&gt;
| summit_session_attendee_company4=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name5 = Abraham Kang&lt;br /&gt;
| summit_session_attendee_email5 = &lt;br /&gt;
| summit_session_attendee_username5 = &lt;br /&gt;
| summit_session_attendee_company5=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name6 = Mario Heiderich&lt;br /&gt;
| summit_session_attendee_email6 = &lt;br /&gt;
| summit_session_attendee_username6 = &lt;br /&gt;
| summit_session_attendee_company6= Ruhr University Bochum / NDS&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6= Filter Evasions&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name7 = Gareth Heyes&lt;br /&gt;
| summit_session_attendee_email7 = &lt;br /&gt;
| summit_session_attendee_username7 = &lt;br /&gt;
| summit_session_attendee_company7= Businessinfo&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name8 = Eduardo Vela&lt;br /&gt;
| summit_session_attendee_email8 = evn@google.com&lt;br /&gt;
| summit_session_attendee_username8 = EduardoVela&lt;br /&gt;
| summit_session_attendee_company8= Google&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8= ACS etc..&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name9 = Stefano Di Paola&lt;br /&gt;
| summit_session_attendee_email9 = &lt;br /&gt;
| summit_session_attendee_username9 = Wisec&lt;br /&gt;
| summit_session_attendee_company9= Minded Security&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name10 = David Lindsay&lt;br /&gt;
| summit_session_attendee_email10 = &lt;br /&gt;
| summit_session_attendee_username10 = David Lindsay&lt;br /&gt;
| summit_session_attendee_company10= Cigital Inc&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10=Filter Evasions&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name11 = &lt;br /&gt;
| summit_session_attendee_email11 = &lt;br /&gt;
| summit_session_attendee_username11 = &lt;br /&gt;
| summit_session_attendee_company11=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name12 = &lt;br /&gt;
| summit_session_attendee_email12 = &lt;br /&gt;
| summit_session_attendee_username12 = &lt;br /&gt;
| summit_session_attendee_company12=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name13 = &lt;br /&gt;
| summit_session_attendee_email13 = &lt;br /&gt;
| summit_session_attendee_username13 = &lt;br /&gt;
| summit_session_attendee_company13=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name14 = &lt;br /&gt;
| summit_session_attendee_email14 = &lt;br /&gt;
| summit_session_attendee_username14 = &lt;br /&gt;
| summit_session_attendee_company14=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name15 = &lt;br /&gt;
| summit_session_attendee_email15 = &lt;br /&gt;
| summit_session_attendee_username15 = &lt;br /&gt;
| summit_session_attendee_company15=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name16 = &lt;br /&gt;
| summit_session_attendee_email16 = &lt;br /&gt;
| summit_session_attendee_username16 = &lt;br /&gt;
| summit_session_attendee_company16=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name17 = &lt;br /&gt;
| summit_session_attendee_email17 = &lt;br /&gt;
| summit_session_attendee_username17 = &lt;br /&gt;
| summit_session_attendee_company17=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name18 = &lt;br /&gt;
| summit_session_attendee_email18 = &lt;br /&gt;
| summit_session_attendee_username18 = &lt;br /&gt;
| summit_session_attendee_company18=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name19 = &lt;br /&gt;
| summit_session_attendee_email19 = &lt;br /&gt;
| summit_session_attendee_username19 = &lt;br /&gt;
| summit_session_attendee_company19=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name20 = &lt;br /&gt;
| summit_session_attendee_email20 = &lt;br /&gt;
| summit_session_attendee_username20 = &lt;br /&gt;
| summit_session_attendee_company20=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20=&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| summit_track_logo = [[Image:T._cross_site.jpg]]&lt;br /&gt;
| summit_ws_logo = [[Image:WS._cross_site.jpg]]&lt;br /&gt;
| summit_session_name = WAF Mitigations for XSS&lt;br /&gt;
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session043&lt;br /&gt;
| mailing_list =&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| short_working_session_description= To discuss if/when/how web application firewalls can help to prevent XSS attacks&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| related_project_name1 = Blog post by Ryan Barnett on defending against XSS&lt;br /&gt;
| related_project_url_1 = http://blog.modsecurity.org/2010/09/advanced-topic-of-the-week-identifying-improper-output-handling-xss-flaws.html&lt;br /&gt;
&lt;br /&gt;
| related_project_name2 = Blog post by Ryan Barnett on using content injection to combat XSS&lt;br /&gt;
| related_project_url_2 = http://blog.modsecurity.org/2010/09/advanced-topic-of-the-week-xss-defense-via-content-injection.html&lt;br /&gt;
&lt;br /&gt;
| related_project_name3 = ModSecurity Demo&lt;br /&gt;
| related_project_url_3 = http://www.modsecurity.org/demo/demo-deny-noescape.html&lt;br /&gt;
&lt;br /&gt;
| related_project_name4 = &lt;br /&gt;
| related_project_url_4 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name5 = &lt;br /&gt;
| related_project_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name1= Improve XSS Attack Payload Detection Techniques&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name2 = Identifying Improper Output Handling Flaws in Web Apps&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name3 = Feasibility of Profile Page Scripts/Iframes&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name4 = Testing Injection of JS Sandbox Code in Responses&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name5 =  &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_date_and_time = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| discussion_model = participants and attendees&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_resources = Projector, whiteboards, markers, Internet connectivity, power&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_additional_details = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name1 = White paper describing “Next Generation WAF Capabilities” such as the ones described above.  Include areas requiring additional research and funding.&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name2 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name3 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name4 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name5 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name6 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name7 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name8 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name1 = Ryan Barnett&lt;br /&gt;
| summit_session_leader_email1 = ryan.barnett@owasp.org&lt;br /&gt;
| summit_session_leader_username1 = Rcbarnett&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name2 = &lt;br /&gt;
| summit_session_leader_email2 = &lt;br /&gt;
| summit_session_leader_username2 =&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name3 = &lt;br /&gt;
| summit_session_leader_email3 = &lt;br /&gt;
| summit_session_leader_username3 =&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_leader_name1 =&lt;br /&gt;
| operational_leader_email1 =&lt;br /&gt;
| operational_leader_username1 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| meeting_notes = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| session_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Session043&lt;br /&gt;
| session_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Working_Sessions/Session043&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>David Lindsay</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session043&amp;diff=103532</id>
		<title>Summit 2011 Working Sessions/Session043</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session043&amp;diff=103532"/>
				<updated>2011-02-05T19:43:25Z</updated>
		
		<summary type="html">&lt;p&gt;David Lindsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name1 = Lucas C. Ferreira&lt;br /&gt;
| summit_session_attendee_email1 = lucas.ferreira@owasp.org&lt;br /&gt;
| summit_session_attendee_username1 = &lt;br /&gt;
| summit_session_attendee_company1=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name2 = Achim Hoffmann&lt;br /&gt;
| summit_session_attendee_email2 = achim@owasp.org&lt;br /&gt;
| summit_session_attendee_username2 = Achim&lt;br /&gt;
| summit_session_attendee_company2= sic[!]sec&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name3 = Justin Clarke&lt;br /&gt;
| summit_session_attendee_email3 = justin.clarke@owasp.org&lt;br /&gt;
| summit_session_attendee_username3 = &lt;br /&gt;
| summit_session_attendee_company3=Gotham Digital Science&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3=How can we package, and/or make this easier for noobs to deploy?&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name4 = Giorgio Fedon&lt;br /&gt;
| summit_session_attendee_email4 = &lt;br /&gt;
| summit_session_attendee_username4 = gfedon&lt;br /&gt;
| summit_session_attendee_company4=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name5 = Abraham Kang&lt;br /&gt;
| summit_session_attendee_email5 = &lt;br /&gt;
| summit_session_attendee_username5 = &lt;br /&gt;
| summit_session_attendee_company5=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name6 = Mario Heiderich&lt;br /&gt;
| summit_session_attendee_email6 = &lt;br /&gt;
| summit_session_attendee_username6 = &lt;br /&gt;
| summit_session_attendee_company6= Ruhr University Bochum / NDS&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6= Filter Evasions&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name7 = Gareth Heyes&lt;br /&gt;
| summit_session_attendee_email7 = &lt;br /&gt;
| summit_session_attendee_username7 = &lt;br /&gt;
| summit_session_attendee_company7= Businessinfo&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name8 = Eduardo Vela&lt;br /&gt;
| summit_session_attendee_email8 = evn@google.com&lt;br /&gt;
| summit_session_attendee_username8 = EduardoVela&lt;br /&gt;
| summit_session_attendee_company8= Google&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8= ACS etc..&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name9 = Stefano Di Paola&lt;br /&gt;
| summit_session_attendee_email9 = &lt;br /&gt;
| summit_session_attendee_username9 = Wisec&lt;br /&gt;
| summit_session_attendee_company9= Minded Security&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name10 = David Lindsay&lt;br /&gt;
| summit_session_attendee_email10 = &lt;br /&gt;
| summit_session_attendee_username10 = thornmaker&lt;br /&gt;
| summit_session_attendee_company10= Cigital Inc&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10=Filter Evasions&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name11 = &lt;br /&gt;
| summit_session_attendee_email11 = &lt;br /&gt;
| summit_session_attendee_username11 = &lt;br /&gt;
| summit_session_attendee_company11=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name12 = &lt;br /&gt;
| summit_session_attendee_email12 = &lt;br /&gt;
| summit_session_attendee_username12 = &lt;br /&gt;
| summit_session_attendee_company12=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name13 = &lt;br /&gt;
| summit_session_attendee_email13 = &lt;br /&gt;
| summit_session_attendee_username13 = &lt;br /&gt;
| summit_session_attendee_company13=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name14 = &lt;br /&gt;
| summit_session_attendee_email14 = &lt;br /&gt;
| summit_session_attendee_username14 = &lt;br /&gt;
| summit_session_attendee_company14=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name15 = &lt;br /&gt;
| summit_session_attendee_email15 = &lt;br /&gt;
| summit_session_attendee_username15 = &lt;br /&gt;
| summit_session_attendee_company15=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name16 = &lt;br /&gt;
| summit_session_attendee_email16 = &lt;br /&gt;
| summit_session_attendee_username16 = &lt;br /&gt;
| summit_session_attendee_company16=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name17 = &lt;br /&gt;
| summit_session_attendee_email17 = &lt;br /&gt;
| summit_session_attendee_username17 = &lt;br /&gt;
| summit_session_attendee_company17=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name18 = &lt;br /&gt;
| summit_session_attendee_email18 = &lt;br /&gt;
| summit_session_attendee_username18 = &lt;br /&gt;
| summit_session_attendee_company18=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name19 = &lt;br /&gt;
| summit_session_attendee_email19 = &lt;br /&gt;
| summit_session_attendee_username19 = &lt;br /&gt;
| summit_session_attendee_company19=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name20 = &lt;br /&gt;
| summit_session_attendee_email20 = &lt;br /&gt;
| summit_session_attendee_username20 = &lt;br /&gt;
| summit_session_attendee_company20=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20=&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| summit_track_logo = [[Image:T._cross_site.jpg]]&lt;br /&gt;
| summit_ws_logo = [[Image:WS._cross_site.jpg]]&lt;br /&gt;
| summit_session_name = WAF Mitigations for XSS&lt;br /&gt;
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session043&lt;br /&gt;
| mailing_list =&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| short_working_session_description= To discuss if/when/how web application firewalls can help to prevent XSS attacks&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| related_project_name1 = Blog post by Ryan Barnett on defending against XSS&lt;br /&gt;
| related_project_url_1 = http://blog.modsecurity.org/2010/09/advanced-topic-of-the-week-identifying-improper-output-handling-xss-flaws.html&lt;br /&gt;
&lt;br /&gt;
| related_project_name2 = Blog post by Ryan Barnett on using content injection to combat XSS&lt;br /&gt;
| related_project_url_2 = http://blog.modsecurity.org/2010/09/advanced-topic-of-the-week-xss-defense-via-content-injection.html&lt;br /&gt;
&lt;br /&gt;
| related_project_name3 = ModSecurity Demo&lt;br /&gt;
| related_project_url_3 = http://www.modsecurity.org/demo/demo-deny-noescape.html&lt;br /&gt;
&lt;br /&gt;
| related_project_name4 = &lt;br /&gt;
| related_project_url_4 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name5 = &lt;br /&gt;
| related_project_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name1= Improve XSS Attack Payload Detection Techniques&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name2 = Identifying Improper Output Handling Flaws in Web Apps&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name3 = Feasibility of Profile Page Scripts/Iframes&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name4 = Testing Injection of JS Sandbox Code in Responses&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name5 =  &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_date_and_time = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| discussion_model = participants and attendees&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_resources = Projector, whiteboards, markers, Internet connectivity, power&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_additional_details = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name1 = White paper describing “Next Generation WAF Capabilities” such as the ones described above.  Include areas requiring additional research and funding.&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name2 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name3 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name4 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name5 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name6 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name7 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name8 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name1 = Ryan Barnett&lt;br /&gt;
| summit_session_leader_email1 = ryan.barnett@owasp.org&lt;br /&gt;
| summit_session_leader_username1 = Rcbarnett&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name2 = &lt;br /&gt;
| summit_session_leader_email2 = &lt;br /&gt;
| summit_session_leader_username2 =&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name3 = &lt;br /&gt;
| summit_session_leader_email3 = &lt;br /&gt;
| summit_session_leader_username3 =&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_leader_name1 =&lt;br /&gt;
| operational_leader_email1 =&lt;br /&gt;
| operational_leader_username1 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| meeting_notes = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| session_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Session043&lt;br /&gt;
| session_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Working_Sessions/Session043&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>David Lindsay</name></author>	</entry>

	</feed>