<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=John.wilander</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=John.wilander"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/John.wilander"/>
		<updated>2026-04-23T17:09:14Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Sweden&amp;diff=174529</id>
		<title>Sweden</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Sweden&amp;diff=174529"/>
				<updated>2014-05-08T09:26:40Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Sweden|extra=The chapter co-leaders are [mailto:Mattias.Bergling@owasp.org Mattias Bergling] and [mailto:Robert.Malmgren@owasp.org Robert Malmgren].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
&lt;br /&gt;
== The OWASP Sweden blog ==&lt;br /&gt;
&lt;br /&gt;
For lengthy news and event reports please visit the [http://owaspsweden.blogspot.com/ OWASP Sweden blog] (in Swedish).&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Stockholm, November 20, 2012: OWASP Top 10 for JavaScript + RESTful Security'''&lt;br /&gt;
&lt;br /&gt;
Welcome to an OWASP Sweden seminar November 20, with Erlend Oftedal. Book your seat at [https://oftedal.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Stockholm, May 14, 2012: Secure Mashups, IT Sec in Cars, Buffer Overflow Prevention, &amp;quot;How We Won the Deutche Post Security Cup&amp;quot;, and Multi-Step, Semi-Blind CSRF'''&lt;br /&gt;
&lt;br /&gt;
Welcome to an OWASP Sweden seminar May 14, with Jonas Magazinius, Mattias Jidhage, and John Wilander. Book your seat at [https://14maj2012.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
 '''Slides from the OWASP Sweden Meeting, Stockholm, March 20, 2012'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/6/60/Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip Here are the slides (.ppt.zip)] from Jim Manico's presentation on &amp;quot;Web Application Access Control Design Excellence&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Stockholm, March 20, 2012: &amp;quot;Web Application Access Control Design Excellence&amp;quot;'''&lt;br /&gt;
&lt;br /&gt;
Welcome to an OWASP Sweden seminar March 20, with Jim Manico. Book your seat at [https://owaspsweden200312.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
This event will be in English.&lt;br /&gt;
&lt;br /&gt;
Sponsors for this event are:&lt;br /&gt;
* F5 who is sponsoring for Jim's travel and hotel&lt;br /&gt;
* .SE sponsoring with the venue&lt;br /&gt;
* Cybercom who will supply you with beverage and snacks during the evening&lt;br /&gt;
&lt;br /&gt;
The Speaker&lt;br /&gt;
Jim Manico is a profile in the OWASP community working with the OWASP podcasts and ESAPI amongst other things. During march he is doing a nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Stockholm on March 20.&lt;br /&gt;
Read more on the OWASP webpage https://www.owasp.org/index.php/User:Jmanico&lt;br /&gt;
&lt;br /&gt;
Abstract for Jim´s talk:&lt;br /&gt;
&lt;br /&gt;
'''Web Application Access Control Design Excellence'''&lt;br /&gt;
&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms. In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden SSL Day, Stockholm, November 23 2011'''&lt;br /&gt;
OWASP Sweden, Stockholm branch is happy to announce a full-day on the topic of SSL in cooperation with Internetdagarna&lt;br /&gt;
http://www.internetdagarna.se/ind11/program/seminarium/92&lt;br /&gt;
&lt;br /&gt;
The speakers are&lt;br /&gt;
* Jakob Schlyter, Kirei&lt;br /&gt;
* John Wilander, OWASP Sweden and Handelsbanken&lt;br /&gt;
* Andreas Jonson, Romab&lt;br /&gt;
* Henrich Pöhls, University of Passau&lt;br /&gt;
* Robert Malmgren, OWASP Sweden and Romab&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting March 7 2011, &amp;quot;Security impact of SVG&amp;quot; + &amp;quot;&amp;quot;ECMA Script 5, a frozen DOM and the eradication of XSS'''&lt;br /&gt;
Mario Heiderich works as a researcher for the Ruhr-University in Bochum, Germany and currently focuses on HTML5, SVG security and security implications of the ES5 specification draft while finishing his PhD thesis.&lt;br /&gt;
&lt;br /&gt;
We're very happy to invite Mario to OWASP Sweden in March. His two talks will be given in English at Royal Institute of Technology (KTH).&lt;br /&gt;
&lt;br /&gt;
Get your ticket now at [http://marioheiderich.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mario's slides:&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Mario_Heiderich_OWASP_Sweden_The_image_that_called_me.pdf‎]] &amp;quot;The Image That Called Me&amp;quot; on SVG security&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Mario_Heiderich_OWASP_Sweden_Locking_the_throneroom.pdf‎]] &amp;quot;Locking the Throneroom&amp;quot; on locking the DOM to eradicate XSS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Jan 31 2011, &amp;quot;HTTP-säkerhet&amp;quot;'''&lt;br /&gt;
Daniel Stenberg, Martin Holst Swende, and John Wilander will give talks for OWASP Sweden on Jan 31, 5:30 pm - 21 pm. The topics are Websockets, the new Cookie RFC, Content Security Policy, HTTP Strict Transport Security, and X-Frame-Options. We will be in lecture hall &amp;quot;New York&amp;quot;, World Trade Center, Stockholm ([http://www.hitta.se/SearchMixed.aspx?vad=world%20trade%20center&amp;amp;var=stockholm map]).&lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers.&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden reaches 500 members ... and gets three leaders'''&lt;br /&gt;
OWASP Sweden now has a stunning 500 members on the mailing list. From now the chapter will be lead by three co-leaders: John Wilander, Mattias Bergling, and Robert Malmgren.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden invites Samy Kamkar, October 4, 2010'''&lt;br /&gt;
Samy Kamkar, famous for the [http://en.wikipedia.org/wiki/Samy_(XSS) Samy XSS attack on MySpace] in 2005 will be giving a talk for OWASP Sweden on October 4, 5:30 pm - 22 pm. We will be in Ljusgården, Årstaängsvägen 19, Marievik/Liljeholmen, Stockholm ([http://www.hitta.se/LargeMap.aspx?var=%c5rsta%e4ngsv%e4gen+19%2c+Liljeholmen%2fMarievik%2c+Stockholm map]).&lt;br /&gt;
&lt;br /&gt;
Nexus Safe and Data@UrService are sponsors and there will be lighter food and beers.&lt;br /&gt;
&lt;br /&gt;
[[Media:OWASP_Sweden_Samy_Kamkar_oktober_2010.pdf]]&lt;br /&gt;
&lt;br /&gt;
Go to [http://samykamkar.eventbrite.com/ EventBrite] and register for free now!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden + FOSS Sthlm &amp;quot;Community Hack&amp;quot; September 4-5 2010'''&lt;br /&gt;
The first weekend of September OWASP Sweden together with FOSS Sthlm invite our members to Community Hack II in Stockholm. A full weekend of hacking on open projects, testing new security hacks, trying out tools (for instance the favorite OWASP tool you've always wanted to learn), or writing new, open guidelines.&lt;br /&gt;
&lt;br /&gt;
Go to [http://communityhack2.eventbrite.com/ EventBrite] and register for free now!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP AppSec Research 2010 in Stockholm, June 21-24 2010'''&lt;br /&gt;
June 21-24, 2010 appsec people will meet in beautiful Stockholm, Sweden. The OWASP chapters in Sweden, Norway, and Denmark together with Stockholm University host the [http://www.owasp.org/index.php/OWASP_AppSec_Research_2010_-_Stockholm,_Sweden OWASP AppSec Research 2010].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting January 21st 2010 -- The Big Protocols'''&lt;br /&gt;
Stiftelsen för Internetinfrastruktur (.SE) and Swedish Network Users' Society (SNUS) invite us to three seminars on the big protocols: BGP, DNSSEC, and SSL/TLS.&lt;br /&gt;
&lt;br /&gt;
Program and invitation (in Swedish): [[File:OWASP_Sweden_-_De_stora_protokollen_2010-01-21.pdf]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting December 2nd 2009 -- OWASP Top 10 2010 (rc1)'''&lt;br /&gt;
Omegapoint invites us to discuss the release candidate of OWASP Top 10 2010 that was presented at OWASP AppSec DC November 13th. The invitation in Swedish is found [[File:OWASP_Sweden_Top_10_december_2009.pdf | here]]. &lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@owasp.org) no later than November 23rd to say you're coming.''' Seats usually fill up fast.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP AppSec Research 2010, June 21-24 in Stockholm, Sweden'''&lt;br /&gt;
OWASP Sweden, Norway, and Denmark invite you to OWASP AppSec Research 2010, June 21-24 in Stockholm. Read more on the [https://www.owasp.org/index.php/OWASP_AppSec_Research_2010_-_Stockholm%2C_Sweden conference wiki page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting April 28th 2009 -- Code Analysis and Review'''&lt;br /&gt;
&lt;br /&gt;
The second chapter meeting of 2009 will be held on Tuesday April 28th at Clarion Hotel Stockholm. The focus is code analysis and code review. Fortify sponsors the event and welcome the chapter members to refreshments, starting at 17.30.&lt;br /&gt;
&lt;br /&gt;
The program:&lt;br /&gt;
&lt;br /&gt;
* Fredrik Möller (Fortify) will biefly present Fortify and their support of OWASP&lt;br /&gt;
* David Anumudu (Fortify) will present and do a live demo of Fortify Solution&lt;br /&gt;
* James Dickson (Simovits Consulting) will give a talk on code review&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@omegapoint.se) no later than April 23rd to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting March 26th 2009 -- XSS &amp;amp; CSRF'''&lt;br /&gt;
&lt;br /&gt;
The first meeting of 2009 will be held Thursday March 26th at LabCenter, Oxtorgsgränd 2, Stockholm. The focus is cross-site scripting and cross-site request forgery, attacks and countermeasures. Inspect it and LabCenter sponsor the event and welcome the chapter members to refreshments, starting at 17.00.&lt;br /&gt;
&lt;br /&gt;
The program:&lt;br /&gt;
&lt;br /&gt;
* Hasain Alshakarti, TrueSec: &amp;quot;XSS &amp;amp; CSRF -- A Deadly Cocktail&amp;quot;&lt;br /&gt;
* Sergio Molero, Concrete IT: &amp;quot;Skydd mot XSS och CSRF&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Mattias Bergling (mattias.bergling@inspectit.se) no later than March 23rd to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting November 19th 2008 -- PCI DSS'''&lt;br /&gt;
&lt;br /&gt;
The next chapter meeting is Wednesday November 19th. The focus of the seminars is on PCI-DSS, i.e. security in payment card handling on the Internet. &lt;br /&gt;
The program:&lt;br /&gt;
* Mats Henriksson, Pan Nordic Card Assoc: &amp;quot;PCI DSS - Tre goda anledningar&amp;quot;&lt;br /&gt;
* Pål Göran Stensson, Defensor Sverige AB: &amp;quot;PCI DSS - Externa krav och konsulten&amp;quot;&lt;br /&gt;
* Bengt Berg, Cybercom Sweden East AB: &amp;quot;Olika angreppssätt på PCI DSS&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''The meeting is fully booked. But do send an email to John Wilander (john.wilander@omegapoint.se) to say you're interested and we'll let you know if seats become available.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Hosts the OWASP AppSec Europe Conference 2010'''&lt;br /&gt;
&lt;br /&gt;
We're hosting the European OWASP AppSec conference in 2010! Please read the [http://www.owasp.org/index.php/OWASP_AppSec_Europe_2010_-_Sweden announcement].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting October 6th 2008 -- Security in the Open Source Process'''&lt;br /&gt;
&lt;br /&gt;
The next chapter meeting is Monday October 6th at Clarion Hotel Stockholm (Skanstull). The focus of the seminars will be on &amp;quot;Security in the Open Source Process&amp;quot;. Refreshments will be served from 16:30 and the seminars will commence at 17:30. Except for a closing panel discussion the program contains the following:&lt;br /&gt;
&lt;br /&gt;
* Simon Josefsson, SJD: ”Anekdoter och lärdomar från granskning av säkerhetsprogram”&lt;br /&gt;
* Daniel Stenberg, daniel.haxx.se: ”Säker kod och utveckling i cURL-projektet”&lt;br /&gt;
* Anders Karlsson, MySQL och Sun Microsystems: ”MySQL: Säkerhet i ett kommersiellt open source-projekt”&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Robert Malmgren (anmalan@romab.com) no later than September 29th to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting May 27th 2008 - SQL Injection, Web Scarab'''&lt;br /&gt;
&lt;br /&gt;
OWASP-Sweden welcomes its members to the next chapter meeting - Tuesday May 27th at Clarion Hotel Stockholm. Refreshments will be served from 17:00, demos will be shown from 17:30, and the seminars will commence at 18:00. The main attractions are:&lt;br /&gt;
 &lt;br /&gt;
* Patrik Karlson, Inspect it: &amp;quot;SQL injection, identifiering och utnyttjande&amp;quot;&lt;br /&gt;
* Johannes Gumbel, TrueSec: &amp;quot;WebScarab—funktioner, fördelar och nackdelar&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Mattias Bergling (mattias.bergling@inspectit.se) no later than May 21st to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Kick-Off Meeting for OWASP-Sweden April 1st 2008'''&lt;br /&gt;
&lt;br /&gt;
The OWASP-Sweden kick-off will be held at WTC in Stockholm on April 1st. Yeah, it's April Fool's Day but we go under the tagline &amp;quot;Application Security is Not a Joke&amp;quot;. The presentation program includes:&lt;br /&gt;
&lt;br /&gt;
* Andrei Sabelfeld, well-known security researcher from Chalmers&lt;br /&gt;
* Michael Anderberg, Chief Security Advisor at Microsoft Sweden&lt;br /&gt;
* Per Mellstrand, software analyst at Sony Ericsson and researcher at Blekinge Institute of Technology&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@omegapoint.se) no later than March 27 to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
We're kicking off!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden in Computer Sweden - 08:44, 19 Dec 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Today the Swedish national IT newspaper 'Computer Sweden' published an article on the new OWASP-Sweden chapter - [http://computersweden.idg.se/2.2683/1.137387 ''Mecka för säker programmering till Sverige''], or ''A Mecka for Secure Programming Reaches Sweden'' in English. While OWASP is more than a programmer's guide, Mattias Bergling and I are very happy to get the news out to a large part of Sweden's IT industry.&lt;br /&gt;
&lt;br /&gt;
'''To become a member of Owasp-Sweden just join the [http://lists.owasp.org/mailman/listinfo/owasp-sweden mailing list].'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden opens! - 22:25, 01 Oct 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Finally, Sweden has joined the OWASP movement and John Wilander, the local chapter leader, welcomes members to the Stockholm-based OWASP-Sweden. Please, join our mailing list. Plans for meetings and seminars will be made.&lt;br /&gt;
&lt;br /&gt;
Are you interested in helping out? Do you have ideas for great invited speakers or workshop meetings? Feel free to contact the chapter.&lt;br /&gt;
[[Category:Sweden]] [[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Sweden&amp;diff=174528</id>
		<title>Sweden</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Sweden&amp;diff=174528"/>
				<updated>2014-05-08T09:26:23Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Sweden|extra=The chapter co-leaders are [mailto:Mattias.Bergling@owasp.org Mattias Bergling] and [mailto:Robert.Malmgren@owasp.org Robert Malmgren]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
&lt;br /&gt;
== The OWASP Sweden blog ==&lt;br /&gt;
&lt;br /&gt;
For lengthy news and event reports please visit the [http://owaspsweden.blogspot.com/ OWASP Sweden blog] (in Swedish).&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Stockholm, November 20, 2012: OWASP Top 10 for JavaScript + RESTful Security'''&lt;br /&gt;
&lt;br /&gt;
Welcome to an OWASP Sweden seminar November 20, with Erlend Oftedal. Book your seat at [https://oftedal.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Stockholm, May 14, 2012: Secure Mashups, IT Sec in Cars, Buffer Overflow Prevention, &amp;quot;How We Won the Deutche Post Security Cup&amp;quot;, and Multi-Step, Semi-Blind CSRF'''&lt;br /&gt;
&lt;br /&gt;
Welcome to an OWASP Sweden seminar May 14, with Jonas Magazinius, Mattias Jidhage, and John Wilander. Book your seat at [https://14maj2012.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
 '''Slides from the OWASP Sweden Meeting, Stockholm, March 20, 2012'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/6/60/Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip Here are the slides (.ppt.zip)] from Jim Manico's presentation on &amp;quot;Web Application Access Control Design Excellence&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Stockholm, March 20, 2012: &amp;quot;Web Application Access Control Design Excellence&amp;quot;'''&lt;br /&gt;
&lt;br /&gt;
Welcome to an OWASP Sweden seminar March 20, with Jim Manico. Book your seat at [https://owaspsweden200312.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
This event will be in English.&lt;br /&gt;
&lt;br /&gt;
Sponsors for this event are:&lt;br /&gt;
* F5 who is sponsoring for Jim's travel and hotel&lt;br /&gt;
* .SE sponsoring with the venue&lt;br /&gt;
* Cybercom who will supply you with beverage and snacks during the evening&lt;br /&gt;
&lt;br /&gt;
The Speaker&lt;br /&gt;
Jim Manico is a profile in the OWASP community working with the OWASP podcasts and ESAPI amongst other things. During march he is doing a nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Stockholm on March 20.&lt;br /&gt;
Read more on the OWASP webpage https://www.owasp.org/index.php/User:Jmanico&lt;br /&gt;
&lt;br /&gt;
Abstract for Jim´s talk:&lt;br /&gt;
&lt;br /&gt;
'''Web Application Access Control Design Excellence'''&lt;br /&gt;
&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms. In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden SSL Day, Stockholm, November 23 2011'''&lt;br /&gt;
OWASP Sweden, Stockholm branch is happy to announce a full-day on the topic of SSL in cooperation with Internetdagarna&lt;br /&gt;
http://www.internetdagarna.se/ind11/program/seminarium/92&lt;br /&gt;
&lt;br /&gt;
The speakers are&lt;br /&gt;
* Jakob Schlyter, Kirei&lt;br /&gt;
* John Wilander, OWASP Sweden and Handelsbanken&lt;br /&gt;
* Andreas Jonson, Romab&lt;br /&gt;
* Henrich Pöhls, University of Passau&lt;br /&gt;
* Robert Malmgren, OWASP Sweden and Romab&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting March 7 2011, &amp;quot;Security impact of SVG&amp;quot; + &amp;quot;&amp;quot;ECMA Script 5, a frozen DOM and the eradication of XSS'''&lt;br /&gt;
Mario Heiderich works as a researcher for the Ruhr-University in Bochum, Germany and currently focuses on HTML5, SVG security and security implications of the ES5 specification draft while finishing his PhD thesis.&lt;br /&gt;
&lt;br /&gt;
We're very happy to invite Mario to OWASP Sweden in March. His two talks will be given in English at Royal Institute of Technology (KTH).&lt;br /&gt;
&lt;br /&gt;
Get your ticket now at [http://marioheiderich.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mario's slides:&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Mario_Heiderich_OWASP_Sweden_The_image_that_called_me.pdf‎]] &amp;quot;The Image That Called Me&amp;quot; on SVG security&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Mario_Heiderich_OWASP_Sweden_Locking_the_throneroom.pdf‎]] &amp;quot;Locking the Throneroom&amp;quot; on locking the DOM to eradicate XSS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Jan 31 2011, &amp;quot;HTTP-säkerhet&amp;quot;'''&lt;br /&gt;
Daniel Stenberg, Martin Holst Swende, and John Wilander will give talks for OWASP Sweden on Jan 31, 5:30 pm - 21 pm. The topics are Websockets, the new Cookie RFC, Content Security Policy, HTTP Strict Transport Security, and X-Frame-Options. We will be in lecture hall &amp;quot;New York&amp;quot;, World Trade Center, Stockholm ([http://www.hitta.se/SearchMixed.aspx?vad=world%20trade%20center&amp;amp;var=stockholm map]).&lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers.&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden reaches 500 members ... and gets three leaders'''&lt;br /&gt;
OWASP Sweden now has a stunning 500 members on the mailing list. From now the chapter will be lead by three co-leaders: John Wilander, Mattias Bergling, and Robert Malmgren.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden invites Samy Kamkar, October 4, 2010'''&lt;br /&gt;
Samy Kamkar, famous for the [http://en.wikipedia.org/wiki/Samy_(XSS) Samy XSS attack on MySpace] in 2005 will be giving a talk for OWASP Sweden on October 4, 5:30 pm - 22 pm. We will be in Ljusgården, Årstaängsvägen 19, Marievik/Liljeholmen, Stockholm ([http://www.hitta.se/LargeMap.aspx?var=%c5rsta%e4ngsv%e4gen+19%2c+Liljeholmen%2fMarievik%2c+Stockholm map]).&lt;br /&gt;
&lt;br /&gt;
Nexus Safe and Data@UrService are sponsors and there will be lighter food and beers.&lt;br /&gt;
&lt;br /&gt;
[[Media:OWASP_Sweden_Samy_Kamkar_oktober_2010.pdf]]&lt;br /&gt;
&lt;br /&gt;
Go to [http://samykamkar.eventbrite.com/ EventBrite] and register for free now!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden + FOSS Sthlm &amp;quot;Community Hack&amp;quot; September 4-5 2010'''&lt;br /&gt;
The first weekend of September OWASP Sweden together with FOSS Sthlm invite our members to Community Hack II in Stockholm. A full weekend of hacking on open projects, testing new security hacks, trying out tools (for instance the favorite OWASP tool you've always wanted to learn), or writing new, open guidelines.&lt;br /&gt;
&lt;br /&gt;
Go to [http://communityhack2.eventbrite.com/ EventBrite] and register for free now!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP AppSec Research 2010 in Stockholm, June 21-24 2010'''&lt;br /&gt;
June 21-24, 2010 appsec people will meet in beautiful Stockholm, Sweden. The OWASP chapters in Sweden, Norway, and Denmark together with Stockholm University host the [http://www.owasp.org/index.php/OWASP_AppSec_Research_2010_-_Stockholm,_Sweden OWASP AppSec Research 2010].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting January 21st 2010 -- The Big Protocols'''&lt;br /&gt;
Stiftelsen för Internetinfrastruktur (.SE) and Swedish Network Users' Society (SNUS) invite us to three seminars on the big protocols: BGP, DNSSEC, and SSL/TLS.&lt;br /&gt;
&lt;br /&gt;
Program and invitation (in Swedish): [[File:OWASP_Sweden_-_De_stora_protokollen_2010-01-21.pdf]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting December 2nd 2009 -- OWASP Top 10 2010 (rc1)'''&lt;br /&gt;
Omegapoint invites us to discuss the release candidate of OWASP Top 10 2010 that was presented at OWASP AppSec DC November 13th. The invitation in Swedish is found [[File:OWASP_Sweden_Top_10_december_2009.pdf | here]]. &lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@owasp.org) no later than November 23rd to say you're coming.''' Seats usually fill up fast.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP AppSec Research 2010, June 21-24 in Stockholm, Sweden'''&lt;br /&gt;
OWASP Sweden, Norway, and Denmark invite you to OWASP AppSec Research 2010, June 21-24 in Stockholm. Read more on the [https://www.owasp.org/index.php/OWASP_AppSec_Research_2010_-_Stockholm%2C_Sweden conference wiki page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting April 28th 2009 -- Code Analysis and Review'''&lt;br /&gt;
&lt;br /&gt;
The second chapter meeting of 2009 will be held on Tuesday April 28th at Clarion Hotel Stockholm. The focus is code analysis and code review. Fortify sponsors the event and welcome the chapter members to refreshments, starting at 17.30.&lt;br /&gt;
&lt;br /&gt;
The program:&lt;br /&gt;
&lt;br /&gt;
* Fredrik Möller (Fortify) will biefly present Fortify and their support of OWASP&lt;br /&gt;
* David Anumudu (Fortify) will present and do a live demo of Fortify Solution&lt;br /&gt;
* James Dickson (Simovits Consulting) will give a talk on code review&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@omegapoint.se) no later than April 23rd to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting March 26th 2009 -- XSS &amp;amp; CSRF'''&lt;br /&gt;
&lt;br /&gt;
The first meeting of 2009 will be held Thursday March 26th at LabCenter, Oxtorgsgränd 2, Stockholm. The focus is cross-site scripting and cross-site request forgery, attacks and countermeasures. Inspect it and LabCenter sponsor the event and welcome the chapter members to refreshments, starting at 17.00.&lt;br /&gt;
&lt;br /&gt;
The program:&lt;br /&gt;
&lt;br /&gt;
* Hasain Alshakarti, TrueSec: &amp;quot;XSS &amp;amp; CSRF -- A Deadly Cocktail&amp;quot;&lt;br /&gt;
* Sergio Molero, Concrete IT: &amp;quot;Skydd mot XSS och CSRF&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Mattias Bergling (mattias.bergling@inspectit.se) no later than March 23rd to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting November 19th 2008 -- PCI DSS'''&lt;br /&gt;
&lt;br /&gt;
The next chapter meeting is Wednesday November 19th. The focus of the seminars is on PCI-DSS, i.e. security in payment card handling on the Internet. &lt;br /&gt;
The program:&lt;br /&gt;
* Mats Henriksson, Pan Nordic Card Assoc: &amp;quot;PCI DSS - Tre goda anledningar&amp;quot;&lt;br /&gt;
* Pål Göran Stensson, Defensor Sverige AB: &amp;quot;PCI DSS - Externa krav och konsulten&amp;quot;&lt;br /&gt;
* Bengt Berg, Cybercom Sweden East AB: &amp;quot;Olika angreppssätt på PCI DSS&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''The meeting is fully booked. But do send an email to John Wilander (john.wilander@omegapoint.se) to say you're interested and we'll let you know if seats become available.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Hosts the OWASP AppSec Europe Conference 2010'''&lt;br /&gt;
&lt;br /&gt;
We're hosting the European OWASP AppSec conference in 2010! Please read the [http://www.owasp.org/index.php/OWASP_AppSec_Europe_2010_-_Sweden announcement].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting October 6th 2008 -- Security in the Open Source Process'''&lt;br /&gt;
&lt;br /&gt;
The next chapter meeting is Monday October 6th at Clarion Hotel Stockholm (Skanstull). The focus of the seminars will be on &amp;quot;Security in the Open Source Process&amp;quot;. Refreshments will be served from 16:30 and the seminars will commence at 17:30. Except for a closing panel discussion the program contains the following:&lt;br /&gt;
&lt;br /&gt;
* Simon Josefsson, SJD: ”Anekdoter och lärdomar från granskning av säkerhetsprogram”&lt;br /&gt;
* Daniel Stenberg, daniel.haxx.se: ”Säker kod och utveckling i cURL-projektet”&lt;br /&gt;
* Anders Karlsson, MySQL och Sun Microsystems: ”MySQL: Säkerhet i ett kommersiellt open source-projekt”&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Robert Malmgren (anmalan@romab.com) no later than September 29th to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting May 27th 2008 - SQL Injection, Web Scarab'''&lt;br /&gt;
&lt;br /&gt;
OWASP-Sweden welcomes its members to the next chapter meeting - Tuesday May 27th at Clarion Hotel Stockholm. Refreshments will be served from 17:00, demos will be shown from 17:30, and the seminars will commence at 18:00. The main attractions are:&lt;br /&gt;
 &lt;br /&gt;
* Patrik Karlson, Inspect it: &amp;quot;SQL injection, identifiering och utnyttjande&amp;quot;&lt;br /&gt;
* Johannes Gumbel, TrueSec: &amp;quot;WebScarab—funktioner, fördelar och nackdelar&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Mattias Bergling (mattias.bergling@inspectit.se) no later than May 21st to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Kick-Off Meeting for OWASP-Sweden April 1st 2008'''&lt;br /&gt;
&lt;br /&gt;
The OWASP-Sweden kick-off will be held at WTC in Stockholm on April 1st. Yeah, it's April Fool's Day but we go under the tagline &amp;quot;Application Security is Not a Joke&amp;quot;. The presentation program includes:&lt;br /&gt;
&lt;br /&gt;
* Andrei Sabelfeld, well-known security researcher from Chalmers&lt;br /&gt;
* Michael Anderberg, Chief Security Advisor at Microsoft Sweden&lt;br /&gt;
* Per Mellstrand, software analyst at Sony Ericsson and researcher at Blekinge Institute of Technology&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@omegapoint.se) no later than March 27 to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
We're kicking off!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden in Computer Sweden - 08:44, 19 Dec 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Today the Swedish national IT newspaper 'Computer Sweden' published an article on the new OWASP-Sweden chapter - [http://computersweden.idg.se/2.2683/1.137387 ''Mecka för säker programmering till Sverige''], or ''A Mecka for Secure Programming Reaches Sweden'' in English. While OWASP is more than a programmer's guide, Mattias Bergling and I are very happy to get the news out to a large part of Sweden's IT industry.&lt;br /&gt;
&lt;br /&gt;
'''To become a member of Owasp-Sweden just join the [http://lists.owasp.org/mailman/listinfo/owasp-sweden mailing list].'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden opens! - 22:25, 01 Oct 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Finally, Sweden has joined the OWASP movement and John Wilander, the local chapter leader, welcomes members to the Stockholm-based OWASP-Sweden. Please, join our mailing list. Plans for meetings and seminars will be made.&lt;br /&gt;
&lt;br /&gt;
Are you interested in helping out? Do you have ideas for great invited speakers or workshop meetings? Feel free to contact the chapter.&lt;br /&gt;
[[Category:Sweden]] [[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Sweden&amp;diff=174527</id>
		<title>Sweden</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Sweden&amp;diff=174527"/>
				<updated>2014-05-08T09:26:05Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Remover myself as chapter co-leader. I stepped down May 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Sweden|extra=The chapter co-leaders are [mailto:Mattias.Bergling@owasp.org Mattias Bergling], and [mailto:Robert.Malmgren@owasp.org Robert Malmgren]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
&lt;br /&gt;
== The OWASP Sweden blog ==&lt;br /&gt;
&lt;br /&gt;
For lengthy news and event reports please visit the [http://owaspsweden.blogspot.com/ OWASP Sweden blog] (in Swedish).&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Stockholm, November 20, 2012: OWASP Top 10 for JavaScript + RESTful Security'''&lt;br /&gt;
&lt;br /&gt;
Welcome to an OWASP Sweden seminar November 20, with Erlend Oftedal. Book your seat at [https://oftedal.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Stockholm, May 14, 2012: Secure Mashups, IT Sec in Cars, Buffer Overflow Prevention, &amp;quot;How We Won the Deutche Post Security Cup&amp;quot;, and Multi-Step, Semi-Blind CSRF'''&lt;br /&gt;
&lt;br /&gt;
Welcome to an OWASP Sweden seminar May 14, with Jonas Magazinius, Mattias Jidhage, and John Wilander. Book your seat at [https://14maj2012.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
 '''Slides from the OWASP Sweden Meeting, Stockholm, March 20, 2012'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/6/60/Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip Here are the slides (.ppt.zip)] from Jim Manico's presentation on &amp;quot;Web Application Access Control Design Excellence&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Stockholm, March 20, 2012: &amp;quot;Web Application Access Control Design Excellence&amp;quot;'''&lt;br /&gt;
&lt;br /&gt;
Welcome to an OWASP Sweden seminar March 20, with Jim Manico. Book your seat at [https://owaspsweden200312.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
This event will be in English.&lt;br /&gt;
&lt;br /&gt;
Sponsors for this event are:&lt;br /&gt;
* F5 who is sponsoring for Jim's travel and hotel&lt;br /&gt;
* .SE sponsoring with the venue&lt;br /&gt;
* Cybercom who will supply you with beverage and snacks during the evening&lt;br /&gt;
&lt;br /&gt;
The Speaker&lt;br /&gt;
Jim Manico is a profile in the OWASP community working with the OWASP podcasts and ESAPI amongst other things. During march he is doing a nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Stockholm on March 20.&lt;br /&gt;
Read more on the OWASP webpage https://www.owasp.org/index.php/User:Jmanico&lt;br /&gt;
&lt;br /&gt;
Abstract for Jim´s talk:&lt;br /&gt;
&lt;br /&gt;
'''Web Application Access Control Design Excellence'''&lt;br /&gt;
&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms. In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden SSL Day, Stockholm, November 23 2011'''&lt;br /&gt;
OWASP Sweden, Stockholm branch is happy to announce a full-day on the topic of SSL in cooperation with Internetdagarna&lt;br /&gt;
http://www.internetdagarna.se/ind11/program/seminarium/92&lt;br /&gt;
&lt;br /&gt;
The speakers are&lt;br /&gt;
* Jakob Schlyter, Kirei&lt;br /&gt;
* John Wilander, OWASP Sweden and Handelsbanken&lt;br /&gt;
* Andreas Jonson, Romab&lt;br /&gt;
* Henrich Pöhls, University of Passau&lt;br /&gt;
* Robert Malmgren, OWASP Sweden and Romab&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting March 7 2011, &amp;quot;Security impact of SVG&amp;quot; + &amp;quot;&amp;quot;ECMA Script 5, a frozen DOM and the eradication of XSS'''&lt;br /&gt;
Mario Heiderich works as a researcher for the Ruhr-University in Bochum, Germany and currently focuses on HTML5, SVG security and security implications of the ES5 specification draft while finishing his PhD thesis.&lt;br /&gt;
&lt;br /&gt;
We're very happy to invite Mario to OWASP Sweden in March. His two talks will be given in English at Royal Institute of Technology (KTH).&lt;br /&gt;
&lt;br /&gt;
Get your ticket now at [http://marioheiderich.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mario's slides:&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Mario_Heiderich_OWASP_Sweden_The_image_that_called_me.pdf‎]] &amp;quot;The Image That Called Me&amp;quot; on SVG security&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Mario_Heiderich_OWASP_Sweden_Locking_the_throneroom.pdf‎]] &amp;quot;Locking the Throneroom&amp;quot; on locking the DOM to eradicate XSS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Jan 31 2011, &amp;quot;HTTP-säkerhet&amp;quot;'''&lt;br /&gt;
Daniel Stenberg, Martin Holst Swende, and John Wilander will give talks for OWASP Sweden on Jan 31, 5:30 pm - 21 pm. The topics are Websockets, the new Cookie RFC, Content Security Policy, HTTP Strict Transport Security, and X-Frame-Options. We will be in lecture hall &amp;quot;New York&amp;quot;, World Trade Center, Stockholm ([http://www.hitta.se/SearchMixed.aspx?vad=world%20trade%20center&amp;amp;var=stockholm map]).&lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers.&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden reaches 500 members ... and gets three leaders'''&lt;br /&gt;
OWASP Sweden now has a stunning 500 members on the mailing list. From now the chapter will be lead by three co-leaders: John Wilander, Mattias Bergling, and Robert Malmgren.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden invites Samy Kamkar, October 4, 2010'''&lt;br /&gt;
Samy Kamkar, famous for the [http://en.wikipedia.org/wiki/Samy_(XSS) Samy XSS attack on MySpace] in 2005 will be giving a talk for OWASP Sweden on October 4, 5:30 pm - 22 pm. We will be in Ljusgården, Årstaängsvägen 19, Marievik/Liljeholmen, Stockholm ([http://www.hitta.se/LargeMap.aspx?var=%c5rsta%e4ngsv%e4gen+19%2c+Liljeholmen%2fMarievik%2c+Stockholm map]).&lt;br /&gt;
&lt;br /&gt;
Nexus Safe and Data@UrService are sponsors and there will be lighter food and beers.&lt;br /&gt;
&lt;br /&gt;
[[Media:OWASP_Sweden_Samy_Kamkar_oktober_2010.pdf]]&lt;br /&gt;
&lt;br /&gt;
Go to [http://samykamkar.eventbrite.com/ EventBrite] and register for free now!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden + FOSS Sthlm &amp;quot;Community Hack&amp;quot; September 4-5 2010'''&lt;br /&gt;
The first weekend of September OWASP Sweden together with FOSS Sthlm invite our members to Community Hack II in Stockholm. A full weekend of hacking on open projects, testing new security hacks, trying out tools (for instance the favorite OWASP tool you've always wanted to learn), or writing new, open guidelines.&lt;br /&gt;
&lt;br /&gt;
Go to [http://communityhack2.eventbrite.com/ EventBrite] and register for free now!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP AppSec Research 2010 in Stockholm, June 21-24 2010'''&lt;br /&gt;
June 21-24, 2010 appsec people will meet in beautiful Stockholm, Sweden. The OWASP chapters in Sweden, Norway, and Denmark together with Stockholm University host the [http://www.owasp.org/index.php/OWASP_AppSec_Research_2010_-_Stockholm,_Sweden OWASP AppSec Research 2010].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting January 21st 2010 -- The Big Protocols'''&lt;br /&gt;
Stiftelsen för Internetinfrastruktur (.SE) and Swedish Network Users' Society (SNUS) invite us to three seminars on the big protocols: BGP, DNSSEC, and SSL/TLS.&lt;br /&gt;
&lt;br /&gt;
Program and invitation (in Swedish): [[File:OWASP_Sweden_-_De_stora_protokollen_2010-01-21.pdf]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting December 2nd 2009 -- OWASP Top 10 2010 (rc1)'''&lt;br /&gt;
Omegapoint invites us to discuss the release candidate of OWASP Top 10 2010 that was presented at OWASP AppSec DC November 13th. The invitation in Swedish is found [[File:OWASP_Sweden_Top_10_december_2009.pdf | here]]. &lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@owasp.org) no later than November 23rd to say you're coming.''' Seats usually fill up fast.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP AppSec Research 2010, June 21-24 in Stockholm, Sweden'''&lt;br /&gt;
OWASP Sweden, Norway, and Denmark invite you to OWASP AppSec Research 2010, June 21-24 in Stockholm. Read more on the [https://www.owasp.org/index.php/OWASP_AppSec_Research_2010_-_Stockholm%2C_Sweden conference wiki page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting April 28th 2009 -- Code Analysis and Review'''&lt;br /&gt;
&lt;br /&gt;
The second chapter meeting of 2009 will be held on Tuesday April 28th at Clarion Hotel Stockholm. The focus is code analysis and code review. Fortify sponsors the event and welcome the chapter members to refreshments, starting at 17.30.&lt;br /&gt;
&lt;br /&gt;
The program:&lt;br /&gt;
&lt;br /&gt;
* Fredrik Möller (Fortify) will biefly present Fortify and their support of OWASP&lt;br /&gt;
* David Anumudu (Fortify) will present and do a live demo of Fortify Solution&lt;br /&gt;
* James Dickson (Simovits Consulting) will give a talk on code review&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@omegapoint.se) no later than April 23rd to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting March 26th 2009 -- XSS &amp;amp; CSRF'''&lt;br /&gt;
&lt;br /&gt;
The first meeting of 2009 will be held Thursday March 26th at LabCenter, Oxtorgsgränd 2, Stockholm. The focus is cross-site scripting and cross-site request forgery, attacks and countermeasures. Inspect it and LabCenter sponsor the event and welcome the chapter members to refreshments, starting at 17.00.&lt;br /&gt;
&lt;br /&gt;
The program:&lt;br /&gt;
&lt;br /&gt;
* Hasain Alshakarti, TrueSec: &amp;quot;XSS &amp;amp; CSRF -- A Deadly Cocktail&amp;quot;&lt;br /&gt;
* Sergio Molero, Concrete IT: &amp;quot;Skydd mot XSS och CSRF&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Mattias Bergling (mattias.bergling@inspectit.se) no later than March 23rd to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting November 19th 2008 -- PCI DSS'''&lt;br /&gt;
&lt;br /&gt;
The next chapter meeting is Wednesday November 19th. The focus of the seminars is on PCI-DSS, i.e. security in payment card handling on the Internet. &lt;br /&gt;
The program:&lt;br /&gt;
* Mats Henriksson, Pan Nordic Card Assoc: &amp;quot;PCI DSS - Tre goda anledningar&amp;quot;&lt;br /&gt;
* Pål Göran Stensson, Defensor Sverige AB: &amp;quot;PCI DSS - Externa krav och konsulten&amp;quot;&lt;br /&gt;
* Bengt Berg, Cybercom Sweden East AB: &amp;quot;Olika angreppssätt på PCI DSS&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''The meeting is fully booked. But do send an email to John Wilander (john.wilander@omegapoint.se) to say you're interested and we'll let you know if seats become available.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Hosts the OWASP AppSec Europe Conference 2010'''&lt;br /&gt;
&lt;br /&gt;
We're hosting the European OWASP AppSec conference in 2010! Please read the [http://www.owasp.org/index.php/OWASP_AppSec_Europe_2010_-_Sweden announcement].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting October 6th 2008 -- Security in the Open Source Process'''&lt;br /&gt;
&lt;br /&gt;
The next chapter meeting is Monday October 6th at Clarion Hotel Stockholm (Skanstull). The focus of the seminars will be on &amp;quot;Security in the Open Source Process&amp;quot;. Refreshments will be served from 16:30 and the seminars will commence at 17:30. Except for a closing panel discussion the program contains the following:&lt;br /&gt;
&lt;br /&gt;
* Simon Josefsson, SJD: ”Anekdoter och lärdomar från granskning av säkerhetsprogram”&lt;br /&gt;
* Daniel Stenberg, daniel.haxx.se: ”Säker kod och utveckling i cURL-projektet”&lt;br /&gt;
* Anders Karlsson, MySQL och Sun Microsystems: ”MySQL: Säkerhet i ett kommersiellt open source-projekt”&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Robert Malmgren (anmalan@romab.com) no later than September 29th to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting May 27th 2008 - SQL Injection, Web Scarab'''&lt;br /&gt;
&lt;br /&gt;
OWASP-Sweden welcomes its members to the next chapter meeting - Tuesday May 27th at Clarion Hotel Stockholm. Refreshments will be served from 17:00, demos will be shown from 17:30, and the seminars will commence at 18:00. The main attractions are:&lt;br /&gt;
 &lt;br /&gt;
* Patrik Karlson, Inspect it: &amp;quot;SQL injection, identifiering och utnyttjande&amp;quot;&lt;br /&gt;
* Johannes Gumbel, TrueSec: &amp;quot;WebScarab—funktioner, fördelar och nackdelar&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Mattias Bergling (mattias.bergling@inspectit.se) no later than May 21st to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Kick-Off Meeting for OWASP-Sweden April 1st 2008'''&lt;br /&gt;
&lt;br /&gt;
The OWASP-Sweden kick-off will be held at WTC in Stockholm on April 1st. Yeah, it's April Fool's Day but we go under the tagline &amp;quot;Application Security is Not a Joke&amp;quot;. The presentation program includes:&lt;br /&gt;
&lt;br /&gt;
* Andrei Sabelfeld, well-known security researcher from Chalmers&lt;br /&gt;
* Michael Anderberg, Chief Security Advisor at Microsoft Sweden&lt;br /&gt;
* Per Mellstrand, software analyst at Sony Ericsson and researcher at Blekinge Institute of Technology&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@omegapoint.se) no later than March 27 to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
We're kicking off!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden in Computer Sweden - 08:44, 19 Dec 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Today the Swedish national IT newspaper 'Computer Sweden' published an article on the new OWASP-Sweden chapter - [http://computersweden.idg.se/2.2683/1.137387 ''Mecka för säker programmering till Sverige''], or ''A Mecka for Secure Programming Reaches Sweden'' in English. While OWASP is more than a programmer's guide, Mattias Bergling and I are very happy to get the news out to a large part of Sweden's IT industry.&lt;br /&gt;
&lt;br /&gt;
'''To become a member of Owasp-Sweden just join the [http://lists.owasp.org/mailman/listinfo/owasp-sweden mailing list].'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden opens! - 22:25, 01 Oct 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Finally, Sweden has joined the OWASP movement and John Wilander, the local chapter leader, welcomes members to the Stockholm-based OWASP-Sweden. Please, join our mailing list. Plans for meetings and seminars will be made.&lt;br /&gt;
&lt;br /&gt;
Are you interested in helping out? Do you have ideas for great invited speakers or workshop meetings? Feel free to contact the chapter.&lt;br /&gt;
[[Category:Sweden]] [[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:John.wilander&amp;diff=165378</id>
		<title>User:John.wilander</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:John.wilander&amp;diff=165378"/>
				<updated>2014-01-05T14:48:41Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:John_Wilander_090626-346_(for_web).jpg‎|John Wilander]]&lt;br /&gt;
&lt;br /&gt;
John Wilander is an application security researcher with passion for building software and proactive measures. He is a Product Security Researcher at an American corporation in California. JavaScript and Java are his languages of choice, with Objective-C as runner-up.&lt;br /&gt;
&lt;br /&gt;
After his Master's degree in Computer Science and Engineering from Linköping University (Sweden) and Nanyang Technological University (Singapore) he pursued a PhD in application security and defended his thesis in April 2013. John's research publications can be found [http://johnwilander.se/#Research here].&lt;br /&gt;
&lt;br /&gt;
John started the Swedish OWASP Chapter in 2007. In 2010 he chaired the first OWASP AppSec Research conference – [http://www.owasp.org/index.php?title=OWASP_AppSec_Research_2010_-_Stockholm,_Sweden OWASP AppSec Research 2010] – and managed to bring together appsec experts from industry and academia. Less than a year later he hosted the [https://www.owasp.org/index.php/Category:Summit_2011_Browser_Security_Track Browser Security Sessions] at the Global OWASP Summit in Portugal. He also co-founded the [https://www.owasp.org/index.php/Builders OWASP Builders] initiative and served on the Global Conferences Committee for two years. His most recent contribution is the [http://1-liner.org/ OWASP 1-Liner project] which made him one of the few who has lead a chapter, lead a project, and hosted a global AppSec conference.&lt;br /&gt;
&lt;br /&gt;
For more detailed information, please see his public [http://www.linkedin.com/in/johnwilander LinkedIn page].&lt;br /&gt;
&lt;br /&gt;
* To see John's wiki contributions, [[:Special:Contributions/John.wilander|click here]]&lt;br /&gt;
* His [mailto:john.wilander@owasp.org email address]&lt;br /&gt;
* [https://twitter.com/johnwilander @johnwilander]&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:John.wilander&amp;diff=157439</id>
		<title>User:John.wilander</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:John.wilander&amp;diff=157439"/>
				<updated>2013-08-27T19:56:52Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Updated most of the info&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:John_Wilander_090626-346_(for_web).jpg‎|John Wilander]]&lt;br /&gt;
&lt;br /&gt;
John Wilander is an application security researcher with passion for building software and proactive measures. He is a Product Security Researcher at Apple. JavaScript and Java are his languages of choice, with Objective-C as runner-up.&lt;br /&gt;
&lt;br /&gt;
After his Master's degree in Computer Science and Engineering from Linköping University (Sweden) and Nanyang Technological University (Singapore) he pursued a PhD in application security and defended his thesis in April 2013. John's research publications can be found [http://johnwilander.se/#Research here].&lt;br /&gt;
&lt;br /&gt;
John started the Swedish OWASP Chapter in 2007. In 2010 he chaired the first OWASP AppSec Research conference – [http://www.owasp.org/index.php?title=OWASP_AppSec_Research_2010_-_Stockholm,_Sweden OWASP AppSec Research 2010] – and managed to bring together appsec experts from industry and academia. Less than a year later he hosted the [https://www.owasp.org/index.php/Category:Summit_2011_Browser_Security_Track Browser Security Sessions] at the Global OWASP Summit in Portugal. He also co-founded the [https://www.owasp.org/index.php/Builders OWASP Builders] initiative and served on the Global Conferences Committee for two years. His most recent contribution is the [http://1-liner.org/ OWASP 1-Liner project] which made him one of the few who has lead a chapter, lead a project, and hosted a global AppSec conference.&lt;br /&gt;
&lt;br /&gt;
For more detailed information, please see his public [http://www.linkedin.com/in/johnwilander LinkedIn page].&lt;br /&gt;
&lt;br /&gt;
* To see John's wiki contributions, [[:Special:Contributions/John.wilander|click here]]&lt;br /&gt;
* His [mailto:john.wilander@owasp.org email address]&lt;br /&gt;
* [https://twitter.com/johnwilander @johnwilander]&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Sweden&amp;diff=138126</id>
		<title>Sweden</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Sweden&amp;diff=138126"/>
				<updated>2012-10-24T20:03:40Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Added Nov 20 event&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Sweden|extra=The chapter co-leaders are [mailto:John.Wilander@owasp.org John Wilander], [mailto:Mattias.Bergling@owasp.org Mattias Bergling], and [mailto:Robert.Malmgren@owasp.org Robert Malmgren]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
&lt;br /&gt;
== The OWASP Sweden blog ==&lt;br /&gt;
&lt;br /&gt;
For lengthy news and event reports please visit the [http://owaspsweden.blogspot.com/ OWASP Sweden blog] (in Swedish).&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Stockholm, November 20, 2012: OWASP Top 10 for JavaScript + RESTful Security'''&lt;br /&gt;
&lt;br /&gt;
Welcome to an OWASP Sweden seminar November 20, with Erlend Oftedal. Book your seat at [https://oftedal.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Stockholm, May 14, 2012: Secure Mashups, IT Sec in Cars, Buffer Overflow Prevention, &amp;quot;How We Won the Deutche Post Security Cup&amp;quot;, and Multi-Step, Semi-Blind CSRF'''&lt;br /&gt;
&lt;br /&gt;
Welcome to an OWASP Sweden seminar May 14, with Jonas Magazinius, Mattias Jidhage, and John Wilander. Book your seat at [https://14maj2012.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
 '''Slides from the OWASP Sweden Meeting, Stockholm, March 20, 2012'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/6/60/Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip Here are the slides (.ppt.zip)] from Jim Manico's presentation on &amp;quot;Web Application Access Control Design Excellence&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Stockholm, March 20, 2012: &amp;quot;Web Application Access Control Design Excellence&amp;quot;'''&lt;br /&gt;
&lt;br /&gt;
Welcome to an OWASP Sweden seminar March 20, with Jim Manico. Book your seat at [https://owaspsweden200312.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
This event will be in English.&lt;br /&gt;
&lt;br /&gt;
Sponsors for this event are:&lt;br /&gt;
* F5 who is sponsoring for Jim's travel and hotel&lt;br /&gt;
* .SE sponsoring with the venue&lt;br /&gt;
* Cybercom who will supply you with beverage and snacks during the evening&lt;br /&gt;
&lt;br /&gt;
The Speaker&lt;br /&gt;
Jim Manico is a profile in the OWASP community working with the OWASP podcasts and ESAPI amongst other things. During march he is doing a nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Stockholm on March 20.&lt;br /&gt;
Read more on the OWASP webpage https://www.owasp.org/index.php/User:Jmanico&lt;br /&gt;
&lt;br /&gt;
Abstract for Jim´s talk:&lt;br /&gt;
&lt;br /&gt;
'''Web Application Access Control Design Excellence'''&lt;br /&gt;
&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms. In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden SSL Day, Stockholm, November 23 2011'''&lt;br /&gt;
OWASP Sweden, Stockholm branch is happy to announce a full-day on the topic of SSL in cooperation with Internetdagarna&lt;br /&gt;
http://www.internetdagarna.se/ind11/program/seminarium/92&lt;br /&gt;
&lt;br /&gt;
The speakers are&lt;br /&gt;
* Jakob Schlyter, Kirei&lt;br /&gt;
* John Wilander, OWASP Sweden and Handelsbanken&lt;br /&gt;
* Andreas Jonson, Romab&lt;br /&gt;
* Henrich Pöhls, University of Passau&lt;br /&gt;
* Robert Malmgren, OWASP Sweden and Romab&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting March 7 2011, &amp;quot;Security impact of SVG&amp;quot; + &amp;quot;&amp;quot;ECMA Script 5, a frozen DOM and the eradication of XSS'''&lt;br /&gt;
Mario Heiderich works as a researcher for the Ruhr-University in Bochum, Germany and currently focuses on HTML5, SVG security and security implications of the ES5 specification draft while finishing his PhD thesis.&lt;br /&gt;
&lt;br /&gt;
We're very happy to invite Mario to OWASP Sweden in March. His two talks will be given in English at Royal Institute of Technology (KTH).&lt;br /&gt;
&lt;br /&gt;
Get your ticket now at [http://marioheiderich.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mario's slides:&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Mario_Heiderich_OWASP_Sweden_The_image_that_called_me.pdf‎]] &amp;quot;The Image That Called Me&amp;quot; on SVG security&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Mario_Heiderich_OWASP_Sweden_Locking_the_throneroom.pdf‎]] &amp;quot;Locking the Throneroom&amp;quot; on locking the DOM to eradicate XSS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Jan 31 2011, &amp;quot;HTTP-säkerhet&amp;quot;'''&lt;br /&gt;
Daniel Stenberg, Martin Holst Swende, and John Wilander will give talks for OWASP Sweden on Jan 31, 5:30 pm - 21 pm. The topics are Websockets, the new Cookie RFC, Content Security Policy, HTTP Strict Transport Security, and X-Frame-Options. We will be in lecture hall &amp;quot;New York&amp;quot;, World Trade Center, Stockholm ([http://www.hitta.se/SearchMixed.aspx?vad=world%20trade%20center&amp;amp;var=stockholm map]).&lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers.&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden reaches 500 members ... and gets three leaders'''&lt;br /&gt;
OWASP Sweden now has a stunning 500 members on the mailing list. From now the chapter will be lead by three co-leaders: John Wilander, Mattias Bergling, and Robert Malmgren.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden invites Samy Kamkar, October 4, 2010'''&lt;br /&gt;
Samy Kamkar, famous for the [http://en.wikipedia.org/wiki/Samy_(XSS) Samy XSS attack on MySpace] in 2005 will be giving a talk for OWASP Sweden on October 4, 5:30 pm - 22 pm. We will be in Ljusgården, Årstaängsvägen 19, Marievik/Liljeholmen, Stockholm ([http://www.hitta.se/LargeMap.aspx?var=%c5rsta%e4ngsv%e4gen+19%2c+Liljeholmen%2fMarievik%2c+Stockholm map]).&lt;br /&gt;
&lt;br /&gt;
Nexus Safe and Data@UrService are sponsors and there will be lighter food and beers.&lt;br /&gt;
&lt;br /&gt;
[[Media:OWASP_Sweden_Samy_Kamkar_oktober_2010.pdf]]&lt;br /&gt;
&lt;br /&gt;
Go to [http://samykamkar.eventbrite.com/ EventBrite] and register for free now!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden + FOSS Sthlm &amp;quot;Community Hack&amp;quot; September 4-5 2010'''&lt;br /&gt;
The first weekend of September OWASP Sweden together with FOSS Sthlm invite our members to Community Hack II in Stockholm. A full weekend of hacking on open projects, testing new security hacks, trying out tools (for instance the favorite OWASP tool you've always wanted to learn), or writing new, open guidelines.&lt;br /&gt;
&lt;br /&gt;
Go to [http://communityhack2.eventbrite.com/ EventBrite] and register for free now!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP AppSec Research 2010 in Stockholm, June 21-24 2010'''&lt;br /&gt;
June 21-24, 2010 appsec people will meet in beautiful Stockholm, Sweden. The OWASP chapters in Sweden, Norway, and Denmark together with Stockholm University host the [http://www.owasp.org/index.php/OWASP_AppSec_Research_2010_-_Stockholm,_Sweden OWASP AppSec Research 2010].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting January 21st 2010 -- The Big Protocols'''&lt;br /&gt;
Stiftelsen för Internetinfrastruktur (.SE) and Swedish Network Users' Society (SNUS) invite us to three seminars on the big protocols: BGP, DNSSEC, and SSL/TLS.&lt;br /&gt;
&lt;br /&gt;
Program and invitation (in Swedish): [[File:OWASP_Sweden_-_De_stora_protokollen_2010-01-21.pdf]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting December 2nd 2009 -- OWASP Top 10 2010 (rc1)'''&lt;br /&gt;
Omegapoint invites us to discuss the release candidate of OWASP Top 10 2010 that was presented at OWASP AppSec DC November 13th. The invitation in Swedish is found [[File:OWASP_Sweden_Top_10_december_2009.pdf | here]]. &lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@owasp.org) no later than November 23rd to say you're coming.''' Seats usually fill up fast.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP AppSec Research 2010, June 21-24 in Stockholm, Sweden'''&lt;br /&gt;
OWASP Sweden, Norway, and Denmark invite you to OWASP AppSec Research 2010, June 21-24 in Stockholm. Read more on the [https://www.owasp.org/index.php/OWASP_AppSec_Research_2010_-_Stockholm%2C_Sweden conference wiki page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting April 28th 2009 -- Code Analysis and Review'''&lt;br /&gt;
&lt;br /&gt;
The second chapter meeting of 2009 will be held on Tuesday April 28th at Clarion Hotel Stockholm. The focus is code analysis and code review. Fortify sponsors the event and welcome the chapter members to refreshments, starting at 17.30.&lt;br /&gt;
&lt;br /&gt;
The program:&lt;br /&gt;
&lt;br /&gt;
* Fredrik Möller (Fortify) will biefly present Fortify and their support of OWASP&lt;br /&gt;
* David Anumudu (Fortify) will present and do a live demo of Fortify Solution&lt;br /&gt;
* James Dickson (Simovits Consulting) will give a talk on code review&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@omegapoint.se) no later than April 23rd to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting March 26th 2009 -- XSS &amp;amp; CSRF'''&lt;br /&gt;
&lt;br /&gt;
The first meeting of 2009 will be held Thursday March 26th at LabCenter, Oxtorgsgränd 2, Stockholm. The focus is cross-site scripting and cross-site request forgery, attacks and countermeasures. Inspect it and LabCenter sponsor the event and welcome the chapter members to refreshments, starting at 17.00.&lt;br /&gt;
&lt;br /&gt;
The program:&lt;br /&gt;
&lt;br /&gt;
* Hasain Alshakarti, TrueSec: &amp;quot;XSS &amp;amp; CSRF -- A Deadly Cocktail&amp;quot;&lt;br /&gt;
* Sergio Molero, Concrete IT: &amp;quot;Skydd mot XSS och CSRF&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Mattias Bergling (mattias.bergling@inspectit.se) no later than March 23rd to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting November 19th 2008 -- PCI DSS'''&lt;br /&gt;
&lt;br /&gt;
The next chapter meeting is Wednesday November 19th. The focus of the seminars is on PCI-DSS, i.e. security in payment card handling on the Internet. &lt;br /&gt;
The program:&lt;br /&gt;
* Mats Henriksson, Pan Nordic Card Assoc: &amp;quot;PCI DSS - Tre goda anledningar&amp;quot;&lt;br /&gt;
* Pål Göran Stensson, Defensor Sverige AB: &amp;quot;PCI DSS - Externa krav och konsulten&amp;quot;&lt;br /&gt;
* Bengt Berg, Cybercom Sweden East AB: &amp;quot;Olika angreppssätt på PCI DSS&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''The meeting is fully booked. But do send an email to John Wilander (john.wilander@omegapoint.se) to say you're interested and we'll let you know if seats become available.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Hosts the OWASP AppSec Europe Conference 2010'''&lt;br /&gt;
&lt;br /&gt;
We're hosting the European OWASP AppSec conference in 2010! Please read the [http://www.owasp.org/index.php/OWASP_AppSec_Europe_2010_-_Sweden announcement].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting October 6th 2008 -- Security in the Open Source Process'''&lt;br /&gt;
&lt;br /&gt;
The next chapter meeting is Monday October 6th at Clarion Hotel Stockholm (Skanstull). The focus of the seminars will be on &amp;quot;Security in the Open Source Process&amp;quot;. Refreshments will be served from 16:30 and the seminars will commence at 17:30. Except for a closing panel discussion the program contains the following:&lt;br /&gt;
&lt;br /&gt;
* Simon Josefsson, SJD: ”Anekdoter och lärdomar från granskning av säkerhetsprogram”&lt;br /&gt;
* Daniel Stenberg, daniel.haxx.se: ”Säker kod och utveckling i cURL-projektet”&lt;br /&gt;
* Anders Karlsson, MySQL och Sun Microsystems: ”MySQL: Säkerhet i ett kommersiellt open source-projekt”&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Robert Malmgren (anmalan@romab.com) no later than September 29th to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting May 27th 2008 - SQL Injection, Web Scarab'''&lt;br /&gt;
&lt;br /&gt;
OWASP-Sweden welcomes its members to the next chapter meeting - Tuesday May 27th at Clarion Hotel Stockholm. Refreshments will be served from 17:00, demos will be shown from 17:30, and the seminars will commence at 18:00. The main attractions are:&lt;br /&gt;
 &lt;br /&gt;
* Patrik Karlson, Inspect it: &amp;quot;SQL injection, identifiering och utnyttjande&amp;quot;&lt;br /&gt;
* Johannes Gumbel, TrueSec: &amp;quot;WebScarab—funktioner, fördelar och nackdelar&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Mattias Bergling (mattias.bergling@inspectit.se) no later than May 21st to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Kick-Off Meeting for OWASP-Sweden April 1st 2008'''&lt;br /&gt;
&lt;br /&gt;
The OWASP-Sweden kick-off will be held at WTC in Stockholm on April 1st. Yeah, it's April Fool's Day but we go under the tagline &amp;quot;Application Security is Not a Joke&amp;quot;. The presentation program includes:&lt;br /&gt;
&lt;br /&gt;
* Andrei Sabelfeld, well-known security researcher from Chalmers&lt;br /&gt;
* Michael Anderberg, Chief Security Advisor at Microsoft Sweden&lt;br /&gt;
* Per Mellstrand, software analyst at Sony Ericsson and researcher at Blekinge Institute of Technology&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@omegapoint.se) no later than March 27 to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
We're kicking off!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden in Computer Sweden - 08:44, 19 Dec 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Today the Swedish national IT newspaper 'Computer Sweden' published an article on the new OWASP-Sweden chapter - [http://computersweden.idg.se/2.2683/1.137387 ''Mecka för säker programmering till Sverige''], or ''A Mecka for Secure Programming Reaches Sweden'' in English. While OWASP is more than a programmer's guide, Mattias Bergling and I are very happy to get the news out to a large part of Sweden's IT industry.&lt;br /&gt;
&lt;br /&gt;
'''To become a member of Owasp-Sweden just join the [http://lists.owasp.org/mailman/listinfo/owasp-sweden mailing list].'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden opens! - 22:25, 01 Oct 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Finally, Sweden has joined the OWASP movement and John Wilander, the local chapter leader, welcomes members to the Stockholm-based OWASP-Sweden. Please, join our mailing list. Plans for meetings and seminars will be made.&lt;br /&gt;
&lt;br /&gt;
Are you interested in helping out? Do you have ideas for great invited speakers or workshop meetings? Feel free to contact the chapter.&lt;br /&gt;
[[Category:Sweden]]&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_1-Liner&amp;diff=132919</id>
		<title>OWASP 1-Liner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_1-Liner&amp;diff=132919"/>
				<updated>2012-07-12T07:41:46Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Added link to GitHub and did some description updates.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Project About&lt;br /&gt;
| project_name = OWASP 1-Liner&lt;br /&gt;
| project_home_page = [https://github.com/johnwilander/owasp-1-liner GitHub]&lt;br /&gt;
| project_description =OWASP 1-Liner is a deliberately vulnerable Java- and JavaScript-based chat application intended for demos (talks, tutorials, proof-of-concepts) and possibly training in application security. The application has two parts – local.1-liner.org/vulnerable and local.1-liner.org/securish – to allow for demos of both attacks and countermeasures.&lt;br /&gt;
| project_license = Creative Commons Attribution ShareAlike 3.0&lt;br /&gt;
| leader_name1 = John Wilander&lt;br /&gt;
| leader_email[1-10] = john.wilander@owasp.org&lt;br /&gt;
| leader_username1 = john.wilander&lt;br /&gt;
| contributor_name[1-10] = &lt;br /&gt;
| contributor_email[1-10] = &lt;br /&gt;
| contributor_username[1-10] = &lt;br /&gt;
| pamphlet_link = &lt;br /&gt;
| presentation_link =&lt;br /&gt;
| mailing_list_name = owasp_1_liner@lists.owasp.org &lt;br /&gt;
| project_road_map = The application has been used for two years before public release. Officially released at OWASP AppSec Research 2012. The roadmap is to continue adding demos just like before. Hopefully the community will like it and start adding demos too.&lt;br /&gt;
| links_url[1-10] = &lt;br /&gt;
| links_name[1-10] = &lt;br /&gt;
| release_1 = [https://github.com/johnwilander/owasp-1-liner]&lt;br /&gt;
| release_2 = &lt;br /&gt;
| release_3 =&lt;br /&gt;
| release_4 =&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Sweden&amp;diff=128527</id>
		<title>Sweden</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Sweden&amp;diff=128527"/>
				<updated>2012-04-24T08:53:03Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: /* Local News */ Added May 14 event&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Sweden|extra=The chapter co-leaders are [mailto:John.Wilander@owasp.org John Wilander], [mailto:Mattias.Bergling@owasp.org Mattias Bergling], and [mailto:Robert.Malmgren@owasp.org Robert Malmgren]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
&lt;br /&gt;
== The OWASP Sweden blog ==&lt;br /&gt;
&lt;br /&gt;
For lengthy news and event reports please visit the [http://owaspsweden.blogspot.com/ OWASP Sweden blog] (in Swedish).&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Stockholm, May 14, 2012: Secure Mashups, IT Sec in Cars, Buffer Overflow Prevention, &amp;quot;How We Won the Deutche Post Security Cup&amp;quot;, and Multi-Step, Semi-Blind CSRF'''&lt;br /&gt;
&lt;br /&gt;
Welcome to an OWASP Sweden seminar May 14, with Jonas Magazinius, Mattias Jidhage, and John Wilander. Book your seat at [https://14maj2012.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
 '''Slides from the OWASP Sweden Meeting, Stockholm, March 20, 2012'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/6/60/Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip Here are the slides (.ppt.zip)] from Jim Manico's presentation on &amp;quot;Web Application Access Control Design Excellence&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Stockholm, March 20, 2012: &amp;quot;Web Application Access Control Design Excellence&amp;quot;'''&lt;br /&gt;
&lt;br /&gt;
Welcome to an OWASP Sweden seminar March 20, with Jim Manico. Book your seat at [https://owaspsweden200312.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
This event will be in English.&lt;br /&gt;
&lt;br /&gt;
Sponsors for this event are:&lt;br /&gt;
* F5 who is sponsoring for Jim's travel and hotel&lt;br /&gt;
* .SE sponsoring with the venue&lt;br /&gt;
* Cybercom who will supply you with beverage and snacks during the evening&lt;br /&gt;
&lt;br /&gt;
The Speaker&lt;br /&gt;
Jim Manico is a profile in the OWASP community working with the OWASP podcasts and ESAPI amongst other things. During march he is doing a nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Stockholm on March 20.&lt;br /&gt;
Read more on the OWASP webpage https://www.owasp.org/index.php/User:Jmanico&lt;br /&gt;
&lt;br /&gt;
Abstract for Jim´s talk:&lt;br /&gt;
&lt;br /&gt;
'''Web Application Access Control Design Excellence'''&lt;br /&gt;
&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms. In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden SSL Day, Stockholm, November 23 2011'''&lt;br /&gt;
OWASP Sweden, Stockholm branch is happy to announce a full-day on the topic of SSL in cooperation with Internetdagarna&lt;br /&gt;
http://www.internetdagarna.se/ind11/program/seminarium/92&lt;br /&gt;
&lt;br /&gt;
The speakers are&lt;br /&gt;
* Jakob Schlyter, Kirei&lt;br /&gt;
* John Wilander, OWASP Sweden and Handelsbanken&lt;br /&gt;
* Andreas Jonson, Romab&lt;br /&gt;
* Henrich Pöhls, University of Passau&lt;br /&gt;
* Robert Malmgren, OWASP Sweden and Romab&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting March 7 2011, &amp;quot;Security impact of SVG&amp;quot; + &amp;quot;&amp;quot;ECMA Script 5, a frozen DOM and the eradication of XSS'''&lt;br /&gt;
Mario Heiderich works as a researcher for the Ruhr-University in Bochum, Germany and currently focuses on HTML5, SVG security and security implications of the ES5 specification draft while finishing his PhD thesis.&lt;br /&gt;
&lt;br /&gt;
We're very happy to invite Mario to OWASP Sweden in March. His two talks will be given in English at Royal Institute of Technology (KTH).&lt;br /&gt;
&lt;br /&gt;
Get your ticket now at [http://marioheiderich.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mario's slides:&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Mario_Heiderich_OWASP_Sweden_The_image_that_called_me.pdf‎]] &amp;quot;The Image That Called Me&amp;quot; on SVG security&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Mario_Heiderich_OWASP_Sweden_Locking_the_throneroom.pdf‎]] &amp;quot;Locking the Throneroom&amp;quot; on locking the DOM to eradicate XSS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Jan 31 2011, &amp;quot;HTTP-säkerhet&amp;quot;'''&lt;br /&gt;
Daniel Stenberg, Martin Holst Swende, and John Wilander will give talks for OWASP Sweden on Jan 31, 5:30 pm - 21 pm. The topics are Websockets, the new Cookie RFC, Content Security Policy, HTTP Strict Transport Security, and X-Frame-Options. We will be in lecture hall &amp;quot;New York&amp;quot;, World Trade Center, Stockholm ([http://www.hitta.se/SearchMixed.aspx?vad=world%20trade%20center&amp;amp;var=stockholm map]).&lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers.&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden reaches 500 members ... and gets three leaders'''&lt;br /&gt;
OWASP Sweden now has a stunning 500 members on the mailing list. From now the chapter will be lead by three co-leaders: John Wilander, Mattias Bergling, and Robert Malmgren.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden invites Samy Kamkar, October 4, 2010'''&lt;br /&gt;
Samy Kamkar, famous for the [http://en.wikipedia.org/wiki/Samy_(XSS) Samy XSS attack on MySpace] in 2005 will be giving a talk for OWASP Sweden on October 4, 5:30 pm - 22 pm. We will be in Ljusgården, Årstaängsvägen 19, Marievik/Liljeholmen, Stockholm ([http://www.hitta.se/LargeMap.aspx?var=%c5rsta%e4ngsv%e4gen+19%2c+Liljeholmen%2fMarievik%2c+Stockholm map]).&lt;br /&gt;
&lt;br /&gt;
Nexus Safe and Data@UrService are sponsors and there will be lighter food and beers.&lt;br /&gt;
&lt;br /&gt;
[[Media:OWASP_Sweden_Samy_Kamkar_oktober_2010.pdf]]&lt;br /&gt;
&lt;br /&gt;
Go to [http://samykamkar.eventbrite.com/ EventBrite] and register for free now!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden + FOSS Sthlm &amp;quot;Community Hack&amp;quot; September 4-5 2010'''&lt;br /&gt;
The first weekend of September OWASP Sweden together with FOSS Sthlm invite our members to Community Hack II in Stockholm. A full weekend of hacking on open projects, testing new security hacks, trying out tools (for instance the favorite OWASP tool you've always wanted to learn), or writing new, open guidelines.&lt;br /&gt;
&lt;br /&gt;
Go to [http://communityhack2.eventbrite.com/ EventBrite] and register for free now!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP AppSec Research 2010 in Stockholm, June 21-24 2010'''&lt;br /&gt;
June 21-24, 2010 appsec people will meet in beautiful Stockholm, Sweden. The OWASP chapters in Sweden, Norway, and Denmark together with Stockholm University host the [http://www.owasp.org/index.php/OWASP_AppSec_Research_2010_-_Stockholm,_Sweden OWASP AppSec Research 2010].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting January 21st 2010 -- The Big Protocols'''&lt;br /&gt;
Stiftelsen för Internetinfrastruktur (.SE) and Swedish Network Users' Society (SNUS) invite us to three seminars on the big protocols: BGP, DNSSEC, and SSL/TLS.&lt;br /&gt;
&lt;br /&gt;
Program and invitation (in Swedish): [[File:OWASP_Sweden_-_De_stora_protokollen_2010-01-21.pdf]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting December 2nd 2009 -- OWASP Top 10 2010 (rc1)'''&lt;br /&gt;
Omegapoint invites us to discuss the release candidate of OWASP Top 10 2010 that was presented at OWASP AppSec DC November 13th. The invitation in Swedish is found [[File:OWASP_Sweden_Top_10_december_2009.pdf | here]]. &lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@owasp.org) no later than November 23rd to say you're coming.''' Seats usually fill up fast.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP AppSec Research 2010, June 21-24 in Stockholm, Sweden'''&lt;br /&gt;
OWASP Sweden, Norway, and Denmark invite you to OWASP AppSec Research 2010, June 21-24 in Stockholm. Read more on the [https://www.owasp.org/index.php/OWASP_AppSec_Research_2010_-_Stockholm%2C_Sweden conference wiki page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting April 28th 2009 -- Code Analysis and Review'''&lt;br /&gt;
&lt;br /&gt;
The second chapter meeting of 2009 will be held on Tuesday April 28th at Clarion Hotel Stockholm. The focus is code analysis and code review. Fortify sponsors the event and welcome the chapter members to refreshments, starting at 17.30.&lt;br /&gt;
&lt;br /&gt;
The program:&lt;br /&gt;
&lt;br /&gt;
* Fredrik Möller (Fortify) will biefly present Fortify and their support of OWASP&lt;br /&gt;
* David Anumudu (Fortify) will present and do a live demo of Fortify Solution&lt;br /&gt;
* James Dickson (Simovits Consulting) will give a talk on code review&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@omegapoint.se) no later than April 23rd to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting March 26th 2009 -- XSS &amp;amp; CSRF'''&lt;br /&gt;
&lt;br /&gt;
The first meeting of 2009 will be held Thursday March 26th at LabCenter, Oxtorgsgränd 2, Stockholm. The focus is cross-site scripting and cross-site request forgery, attacks and countermeasures. Inspect it and LabCenter sponsor the event and welcome the chapter members to refreshments, starting at 17.00.&lt;br /&gt;
&lt;br /&gt;
The program:&lt;br /&gt;
&lt;br /&gt;
* Hasain Alshakarti, TrueSec: &amp;quot;XSS &amp;amp; CSRF -- A Deadly Cocktail&amp;quot;&lt;br /&gt;
* Sergio Molero, Concrete IT: &amp;quot;Skydd mot XSS och CSRF&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Mattias Bergling (mattias.bergling@inspectit.se) no later than March 23rd to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting November 19th 2008 -- PCI DSS'''&lt;br /&gt;
&lt;br /&gt;
The next chapter meeting is Wednesday November 19th. The focus of the seminars is on PCI-DSS, i.e. security in payment card handling on the Internet. &lt;br /&gt;
The program:&lt;br /&gt;
* Mats Henriksson, Pan Nordic Card Assoc: &amp;quot;PCI DSS - Tre goda anledningar&amp;quot;&lt;br /&gt;
* Pål Göran Stensson, Defensor Sverige AB: &amp;quot;PCI DSS - Externa krav och konsulten&amp;quot;&lt;br /&gt;
* Bengt Berg, Cybercom Sweden East AB: &amp;quot;Olika angreppssätt på PCI DSS&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''The meeting is fully booked. But do send an email to John Wilander (john.wilander@omegapoint.se) to say you're interested and we'll let you know if seats become available.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Hosts the OWASP AppSec Europe Conference 2010'''&lt;br /&gt;
&lt;br /&gt;
We're hosting the European OWASP AppSec conference in 2010! Please read the [http://www.owasp.org/index.php/OWASP_AppSec_Europe_2010_-_Sweden announcement].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting October 6th 2008 -- Security in the Open Source Process'''&lt;br /&gt;
&lt;br /&gt;
The next chapter meeting is Monday October 6th at Clarion Hotel Stockholm (Skanstull). The focus of the seminars will be on &amp;quot;Security in the Open Source Process&amp;quot;. Refreshments will be served from 16:30 and the seminars will commence at 17:30. Except for a closing panel discussion the program contains the following:&lt;br /&gt;
&lt;br /&gt;
* Simon Josefsson, SJD: ”Anekdoter och lärdomar från granskning av säkerhetsprogram”&lt;br /&gt;
* Daniel Stenberg, daniel.haxx.se: ”Säker kod och utveckling i cURL-projektet”&lt;br /&gt;
* Anders Karlsson, MySQL och Sun Microsystems: ”MySQL: Säkerhet i ett kommersiellt open source-projekt”&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Robert Malmgren (anmalan@romab.com) no later than September 29th to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting May 27th 2008 - SQL Injection, Web Scarab'''&lt;br /&gt;
&lt;br /&gt;
OWASP-Sweden welcomes its members to the next chapter meeting - Tuesday May 27th at Clarion Hotel Stockholm. Refreshments will be served from 17:00, demos will be shown from 17:30, and the seminars will commence at 18:00. The main attractions are:&lt;br /&gt;
 &lt;br /&gt;
* Patrik Karlson, Inspect it: &amp;quot;SQL injection, identifiering och utnyttjande&amp;quot;&lt;br /&gt;
* Johannes Gumbel, TrueSec: &amp;quot;WebScarab—funktioner, fördelar och nackdelar&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Mattias Bergling (mattias.bergling@inspectit.se) no later than May 21st to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Kick-Off Meeting for OWASP-Sweden April 1st 2008'''&lt;br /&gt;
&lt;br /&gt;
The OWASP-Sweden kick-off will be held at WTC in Stockholm on April 1st. Yeah, it's April Fool's Day but we go under the tagline &amp;quot;Application Security is Not a Joke&amp;quot;. The presentation program includes:&lt;br /&gt;
&lt;br /&gt;
* Andrei Sabelfeld, well-known security researcher from Chalmers&lt;br /&gt;
* Michael Anderberg, Chief Security Advisor at Microsoft Sweden&lt;br /&gt;
* Per Mellstrand, software analyst at Sony Ericsson and researcher at Blekinge Institute of Technology&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@omegapoint.se) no later than March 27 to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
We're kicking off!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden in Computer Sweden - 08:44, 19 Dec 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Today the Swedish national IT newspaper 'Computer Sweden' published an article on the new OWASP-Sweden chapter - [http://computersweden.idg.se/2.2683/1.137387 ''Mecka för säker programmering till Sverige''], or ''A Mecka for Secure Programming Reaches Sweden'' in English. While OWASP is more than a programmer's guide, Mattias Bergling and I are very happy to get the news out to a large part of Sweden's IT industry.&lt;br /&gt;
&lt;br /&gt;
'''To become a member of Owasp-Sweden just join the [http://lists.owasp.org/mailman/listinfo/owasp-sweden mailing list].'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden opens! - 22:25, 01 Oct 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Finally, Sweden has joined the OWASP movement and John Wilander, the local chapter leader, welcomes members to the Stockholm-based OWASP-Sweden. Please, join our mailing list. Plans for meetings and seminars will be made.&lt;br /&gt;
&lt;br /&gt;
Are you interested in helping out? Do you have ideas for great invited speakers or workshop meetings? Feel free to contact the chapter.&lt;br /&gt;
[[Category:Sweden]]&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Sweden&amp;diff=126836</id>
		<title>Sweden</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Sweden&amp;diff=126836"/>
				<updated>2012-03-25T02:19:48Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Added link to Jim's slides&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Sweden|extra=The chapter co-leaders are [mailto:John.Wilander@owasp.org John Wilander], [mailto:Mattias.Bergling@owasp.org Mattias Bergling], and [mailto:Robert.Malmgren@owasp.org Robert Malmgren]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
&lt;br /&gt;
== The OWASP Sweden blog ==&lt;br /&gt;
&lt;br /&gt;
For lengthy news and event reports please visit the [http://owaspsweden.blogspot.com/ OWASP Sweden blog] (in Swedish).&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''Slides from the OWASP Sweden Meeting, Stockholm, March 20, 2012'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/6/60/Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip Here are the slides (.ppt.zip)] from Jim Manico's presentation on &amp;quot;Web Application Access Control Design Excellence&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Stockholm, March 20, 2012: &amp;quot;Web Application Access Control Design Excellence&amp;quot;'''&lt;br /&gt;
&lt;br /&gt;
Welcome to an OWASP Sweden seminar March 20, with Jim Manico. Book your seat at [https://owaspsweden200312.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
This event will be in English.&lt;br /&gt;
&lt;br /&gt;
Sponsors for this event are:&lt;br /&gt;
* F5 who is sponsoring for Jim's travel and hotel&lt;br /&gt;
* .SE sponsoring with the venue&lt;br /&gt;
* Cybercom who will supply you with beverage and snacks during the evening&lt;br /&gt;
&lt;br /&gt;
The Speaker&lt;br /&gt;
Jim Manico is a profile in the OWASP community working with the OWASP podcasts and ESAPI amongst other things. During march he is doing a nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Stockholm on March 20.&lt;br /&gt;
Read more on the OWASP webpage https://www.owasp.org/index.php/User:Jmanico&lt;br /&gt;
&lt;br /&gt;
Abstract for Jim´s talk:&lt;br /&gt;
&lt;br /&gt;
'''Web Application Access Control Design Excellence'''&lt;br /&gt;
&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms. In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden SSL Day, Stockholm, November 23 2011'''&lt;br /&gt;
OWASP Sweden, Stockholm branch is happy to announce a full-day on the topic of SSL in cooperation with Internetdagarna&lt;br /&gt;
http://www.internetdagarna.se/ind11/program/seminarium/92&lt;br /&gt;
&lt;br /&gt;
The speakers are&lt;br /&gt;
* Jakob Schlyter, Kirei&lt;br /&gt;
* John Wilander, OWASP Sweden and Handelsbanken&lt;br /&gt;
* Andreas Jonson, Romab&lt;br /&gt;
* Henrich Pöhls, University of Passau&lt;br /&gt;
* Robert Malmgren, OWASP Sweden and Romab&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting March 7 2011, &amp;quot;Security impact of SVG&amp;quot; + &amp;quot;&amp;quot;ECMA Script 5, a frozen DOM and the eradication of XSS'''&lt;br /&gt;
Mario Heiderich works as a researcher for the Ruhr-University in Bochum, Germany and currently focuses on HTML5, SVG security and security implications of the ES5 specification draft while finishing his PhD thesis.&lt;br /&gt;
&lt;br /&gt;
We're very happy to invite Mario to OWASP Sweden in March. His two talks will be given in English at Royal Institute of Technology (KTH).&lt;br /&gt;
&lt;br /&gt;
Get your ticket now at [http://marioheiderich.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mario's slides:&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Mario_Heiderich_OWASP_Sweden_The_image_that_called_me.pdf‎]] &amp;quot;The Image That Called Me&amp;quot; on SVG security&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Mario_Heiderich_OWASP_Sweden_Locking_the_throneroom.pdf‎]] &amp;quot;Locking the Throneroom&amp;quot; on locking the DOM to eradicate XSS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Jan 31 2011, &amp;quot;HTTP-säkerhet&amp;quot;'''&lt;br /&gt;
Daniel Stenberg, Martin Holst Swende, and John Wilander will give talks for OWASP Sweden on Jan 31, 5:30 pm - 21 pm. The topics are Websockets, the new Cookie RFC, Content Security Policy, HTTP Strict Transport Security, and X-Frame-Options. We will be in lecture hall &amp;quot;New York&amp;quot;, World Trade Center, Stockholm ([http://www.hitta.se/SearchMixed.aspx?vad=world%20trade%20center&amp;amp;var=stockholm map]).&lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers.&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden reaches 500 members ... and gets three leaders'''&lt;br /&gt;
OWASP Sweden now has a stunning 500 members on the mailing list. From now the chapter will be lead by three co-leaders: John Wilander, Mattias Bergling, and Robert Malmgren.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden invites Samy Kamkar, October 4, 2010'''&lt;br /&gt;
Samy Kamkar, famous for the [http://en.wikipedia.org/wiki/Samy_(XSS) Samy XSS attack on MySpace] in 2005 will be giving a talk for OWASP Sweden on October 4, 5:30 pm - 22 pm. We will be in Ljusgården, Årstaängsvägen 19, Marievik/Liljeholmen, Stockholm ([http://www.hitta.se/LargeMap.aspx?var=%c5rsta%e4ngsv%e4gen+19%2c+Liljeholmen%2fMarievik%2c+Stockholm map]).&lt;br /&gt;
&lt;br /&gt;
Nexus Safe and Data@UrService are sponsors and there will be lighter food and beers.&lt;br /&gt;
&lt;br /&gt;
[[Media:OWASP_Sweden_Samy_Kamkar_oktober_2010.pdf]]&lt;br /&gt;
&lt;br /&gt;
Go to [http://samykamkar.eventbrite.com/ EventBrite] and register for free now!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden + FOSS Sthlm &amp;quot;Community Hack&amp;quot; September 4-5 2010'''&lt;br /&gt;
The first weekend of September OWASP Sweden together with FOSS Sthlm invite our members to Community Hack II in Stockholm. A full weekend of hacking on open projects, testing new security hacks, trying out tools (for instance the favorite OWASP tool you've always wanted to learn), or writing new, open guidelines.&lt;br /&gt;
&lt;br /&gt;
Go to [http://communityhack2.eventbrite.com/ EventBrite] and register for free now!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP AppSec Research 2010 in Stockholm, June 21-24 2010'''&lt;br /&gt;
June 21-24, 2010 appsec people will meet in beautiful Stockholm, Sweden. The OWASP chapters in Sweden, Norway, and Denmark together with Stockholm University host the [http://www.owasp.org/index.php/OWASP_AppSec_Research_2010_-_Stockholm,_Sweden OWASP AppSec Research 2010].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting January 21st 2010 -- The Big Protocols'''&lt;br /&gt;
Stiftelsen för Internetinfrastruktur (.SE) and Swedish Network Users' Society (SNUS) invite us to three seminars on the big protocols: BGP, DNSSEC, and SSL/TLS.&lt;br /&gt;
&lt;br /&gt;
Program and invitation (in Swedish): [[File:OWASP_Sweden_-_De_stora_protokollen_2010-01-21.pdf]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting December 2nd 2009 -- OWASP Top 10 2010 (rc1)'''&lt;br /&gt;
Omegapoint invites us to discuss the release candidate of OWASP Top 10 2010 that was presented at OWASP AppSec DC November 13th. The invitation in Swedish is found [[File:OWASP_Sweden_Top_10_december_2009.pdf | here]]. &lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@owasp.org) no later than November 23rd to say you're coming.''' Seats usually fill up fast.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP AppSec Research 2010, June 21-24 in Stockholm, Sweden'''&lt;br /&gt;
OWASP Sweden, Norway, and Denmark invite you to OWASP AppSec Research 2010, June 21-24 in Stockholm. Read more on the [https://www.owasp.org/index.php/OWASP_AppSec_Research_2010_-_Stockholm%2C_Sweden conference wiki page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting April 28th 2009 -- Code Analysis and Review'''&lt;br /&gt;
&lt;br /&gt;
The second chapter meeting of 2009 will be held on Tuesday April 28th at Clarion Hotel Stockholm. The focus is code analysis and code review. Fortify sponsors the event and welcome the chapter members to refreshments, starting at 17.30.&lt;br /&gt;
&lt;br /&gt;
The program:&lt;br /&gt;
&lt;br /&gt;
* Fredrik Möller (Fortify) will biefly present Fortify and their support of OWASP&lt;br /&gt;
* David Anumudu (Fortify) will present and do a live demo of Fortify Solution&lt;br /&gt;
* James Dickson (Simovits Consulting) will give a talk on code review&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@omegapoint.se) no later than April 23rd to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting March 26th 2009 -- XSS &amp;amp; CSRF'''&lt;br /&gt;
&lt;br /&gt;
The first meeting of 2009 will be held Thursday March 26th at LabCenter, Oxtorgsgränd 2, Stockholm. The focus is cross-site scripting and cross-site request forgery, attacks and countermeasures. Inspect it and LabCenter sponsor the event and welcome the chapter members to refreshments, starting at 17.00.&lt;br /&gt;
&lt;br /&gt;
The program:&lt;br /&gt;
&lt;br /&gt;
* Hasain Alshakarti, TrueSec: &amp;quot;XSS &amp;amp; CSRF -- A Deadly Cocktail&amp;quot;&lt;br /&gt;
* Sergio Molero, Concrete IT: &amp;quot;Skydd mot XSS och CSRF&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Mattias Bergling (mattias.bergling@inspectit.se) no later than March 23rd to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting November 19th 2008 -- PCI DSS'''&lt;br /&gt;
&lt;br /&gt;
The next chapter meeting is Wednesday November 19th. The focus of the seminars is on PCI-DSS, i.e. security in payment card handling on the Internet. &lt;br /&gt;
The program:&lt;br /&gt;
* Mats Henriksson, Pan Nordic Card Assoc: &amp;quot;PCI DSS - Tre goda anledningar&amp;quot;&lt;br /&gt;
* Pål Göran Stensson, Defensor Sverige AB: &amp;quot;PCI DSS - Externa krav och konsulten&amp;quot;&lt;br /&gt;
* Bengt Berg, Cybercom Sweden East AB: &amp;quot;Olika angreppssätt på PCI DSS&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''The meeting is fully booked. But do send an email to John Wilander (john.wilander@omegapoint.se) to say you're interested and we'll let you know if seats become available.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Hosts the OWASP AppSec Europe Conference 2010'''&lt;br /&gt;
&lt;br /&gt;
We're hosting the European OWASP AppSec conference in 2010! Please read the [http://www.owasp.org/index.php/OWASP_AppSec_Europe_2010_-_Sweden announcement].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting October 6th 2008 -- Security in the Open Source Process'''&lt;br /&gt;
&lt;br /&gt;
The next chapter meeting is Monday October 6th at Clarion Hotel Stockholm (Skanstull). The focus of the seminars will be on &amp;quot;Security in the Open Source Process&amp;quot;. Refreshments will be served from 16:30 and the seminars will commence at 17:30. Except for a closing panel discussion the program contains the following:&lt;br /&gt;
&lt;br /&gt;
* Simon Josefsson, SJD: ”Anekdoter och lärdomar från granskning av säkerhetsprogram”&lt;br /&gt;
* Daniel Stenberg, daniel.haxx.se: ”Säker kod och utveckling i cURL-projektet”&lt;br /&gt;
* Anders Karlsson, MySQL och Sun Microsystems: ”MySQL: Säkerhet i ett kommersiellt open source-projekt”&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Robert Malmgren (anmalan@romab.com) no later than September 29th to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting May 27th 2008 - SQL Injection, Web Scarab'''&lt;br /&gt;
&lt;br /&gt;
OWASP-Sweden welcomes its members to the next chapter meeting - Tuesday May 27th at Clarion Hotel Stockholm. Refreshments will be served from 17:00, demos will be shown from 17:30, and the seminars will commence at 18:00. The main attractions are:&lt;br /&gt;
 &lt;br /&gt;
* Patrik Karlson, Inspect it: &amp;quot;SQL injection, identifiering och utnyttjande&amp;quot;&lt;br /&gt;
* Johannes Gumbel, TrueSec: &amp;quot;WebScarab—funktioner, fördelar och nackdelar&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Mattias Bergling (mattias.bergling@inspectit.se) no later than May 21st to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Kick-Off Meeting for OWASP-Sweden April 1st 2008'''&lt;br /&gt;
&lt;br /&gt;
The OWASP-Sweden kick-off will be held at WTC in Stockholm on April 1st. Yeah, it's April Fool's Day but we go under the tagline &amp;quot;Application Security is Not a Joke&amp;quot;. The presentation program includes:&lt;br /&gt;
&lt;br /&gt;
* Andrei Sabelfeld, well-known security researcher from Chalmers&lt;br /&gt;
* Michael Anderberg, Chief Security Advisor at Microsoft Sweden&lt;br /&gt;
* Per Mellstrand, software analyst at Sony Ericsson and researcher at Blekinge Institute of Technology&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@omegapoint.se) no later than March 27 to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
We're kicking off!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden in Computer Sweden - 08:44, 19 Dec 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Today the Swedish national IT newspaper 'Computer Sweden' published an article on the new OWASP-Sweden chapter - [http://computersweden.idg.se/2.2683/1.137387 ''Mecka för säker programmering till Sverige''], or ''A Mecka for Secure Programming Reaches Sweden'' in English. While OWASP is more than a programmer's guide, Mattias Bergling and I are very happy to get the news out to a large part of Sweden's IT industry.&lt;br /&gt;
&lt;br /&gt;
'''To become a member of Owasp-Sweden just join the [http://lists.owasp.org/mailman/listinfo/owasp-sweden mailing list].'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden opens! - 22:25, 01 Oct 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Finally, Sweden has joined the OWASP movement and John Wilander, the local chapter leader, welcomes members to the Stockholm-based OWASP-Sweden. Please, join our mailing list. Plans for meetings and seminars will be made.&lt;br /&gt;
&lt;br /&gt;
Are you interested in helping out? Do you have ideas for great invited speakers or workshop meetings? Feel free to contact the chapter.&lt;br /&gt;
[[Category:Sweden]]&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip&amp;diff=126835</id>
		<title>File:Manico Developer Top Ten Core Controls v4.1.ppt.zip</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip&amp;diff=126835"/>
				<updated>2012-03-25T02:15:46Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Jim Manico's presentation slides from his Nordic tour, March 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Jim Manico's presentation slides from his Nordic tour, March 2012.&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:John.wilander&amp;diff=125883</id>
		<title>User:John.wilander</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:John.wilander&amp;diff=125883"/>
				<updated>2012-03-10T14:47:24Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Updated with new employer, recent OWASP activities, and a general brush-up of the text.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:John_Wilander_090626-346_(for_web).jpg‎|John Wilander]]&lt;br /&gt;
&lt;br /&gt;
John Wilander is an application security researcher and consultant. He is a frontend developer at Handelsbanken in Sweden. John typically describes himself as a security focused software developer. JavaScript and Java are his languages of choice.&lt;br /&gt;
&lt;br /&gt;
After his Master's degree in Computer Science and Engineering from Linköping University (Sweden) and Nanyang Technological University (Singapore) he pursued a PhD in application security. Last paper is published so now it's time for dissertation and defense. John's research publications can be found [http://johnwilander.se/#Research here].&lt;br /&gt;
&lt;br /&gt;
John started the Swedish OWASP Chapter in 2007 and has since been leader and co-leader. In 2010 he chaired the most successful OWASP AppSec EU conference so far – [http://www.owasp.org/index.php?title=OWASP_AppSec_Research_2010_-_Stockholm,_Sweden OWASP AppSec Research 2010]. John is listed along with the Swedish chapter as contributors to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10 2010]. In 2011 he hosted the [https://www.owasp.org/index.php/Category:Summit_2011_Browser_Security_Track Browser Security Sessions] at the Global OWASP Summit in Portugal. He also co-founded the [https://www.owasp.org/index.php/Builders OWASP Builders] initiative.&lt;br /&gt;
&lt;br /&gt;
For more detailed information, please see his public [http://www.linkedin.com/in/johnwilander LinkedIn page].&lt;br /&gt;
&lt;br /&gt;
* To see John's wiki contributions, [[:Special:Contributions/John.wilander|click here]]&lt;br /&gt;
* His [mailto:john.wilander@owasp.org email address]&lt;br /&gt;
* [https://twitter.com/johnwilander @johnwilander]&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Builders&amp;diff=125879</id>
		<title>Builders</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Builders&amp;diff=125879"/>
				<updated>2012-03-10T12:09:49Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Added John Wilander, initiator of the OWASP Builders&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== OWASP Builders  ====&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
'''Builders Community''' &lt;br /&gt;
&lt;br /&gt;
A community of security professionals and stakeholders with the common goal of advancing the state of security in the area of application development.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''What Are OWASP Communities?'''&lt;br /&gt;
&lt;br /&gt;
Builders, [http://www.owasp.org/index.php/Breakers Breakers] and [http://www.owasp.org/index.php/Defenders Defenders]; the idea of OWASP Communities is to bring together experts in the area that they are best at with the common goal of advancing the state of application security.  This approach allows similar groups of professionals and experts to tackle security problems with the involvement of the most relevant stakeholders.  The intent is to drive high quality output that is immediately usable by the target audience.  More information about this vision can be found [http://michael-coates.blogspot.com/2011/02/vision-for-owasp.html here].&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:OWASP-vision.jpg]] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== The Community  ====&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; style=&amp;quot;width: 404px; height: 413px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:John_Wilander_090626-346_(for_web).jpg‎|100px]]&amp;lt;br&amp;gt; &lt;br /&gt;
| '''John Wilander''' &amp;lt;br&amp;gt; [https://www.owasp.org/index.php/Global_Conferences_Committee/ Member of the Global Conferences Committee]&amp;lt;br&amp;gt; [https://www.owasp.org/index.php/Sweden OWASP Sweden Chapter Co-Leader] &amp;lt;br&amp;gt; john.wilander@owasp.org &amp;lt;br&amp;gt; http://appsandsecurity.blogspot.com/ &amp;lt;br&amp;gt; [https://twitter.com/johnwilander @johnwilander]&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SimonBennetts-OWASP.jpg]]&amp;lt;br&amp;gt; &lt;br /&gt;
| '''Simon Bennetts''' &amp;lt;br&amp;gt; [[:OWASP Zed Attack Proxy Project|OWASP Zed Attack Proxy Project]] Lead &amp;lt;br&amp;gt; psiinon@owasp.org &amp;lt;br&amp;gt; http://pentest4devs.blogspot.com/ &amp;lt;br&amp;gt; @psiinon&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Your pic; &amp;lt;br&amp;gt;&lt;br /&gt;
| '''Your name'''&amp;lt;br&amp;gt; ''Your company/project'' &amp;lt;br&amp;gt; ''Your email'' &amp;lt;br&amp;gt; ''Your website'' &amp;lt;br&amp;gt; ''Your twitter''&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Your pic; &amp;lt;br&amp;gt;&lt;br /&gt;
| '''Your name'''&amp;lt;br&amp;gt; ''Your company/project'' &amp;lt;br&amp;gt; ''Your email'' &amp;lt;br&amp;gt; ''Your website'' &amp;lt;br&amp;gt; ''Your twitter''&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Want to contribute to the OWASP Builders Community? &amp;lt;br&amp;gt;Add your info and send an email to [mailto:john.wilander@owasp.org john.wilander@owasp.org]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Developer Outreach  ====&lt;br /&gt;
&lt;br /&gt;
Get involved in the Developer Outreach by subscribing to the ...&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/developer-outreach Steering List (low traffic)]&lt;br /&gt;
* [https://groups.google.com/group/owasp-dev-outreach-discuss Google Group (for discussions)]&lt;br /&gt;
&lt;br /&gt;
The first priority of the Builders Community is to reach out to developers and ask what application security is lacking today. An initial lightweight outreach was performed early March 2011.&lt;br /&gt;
&lt;br /&gt;
=== Developers' Security Itches March 2011 ===&lt;br /&gt;
The overall results of the initial outreach can be seen in the diagram below (categorization by John Wilander, full-text available via links below). This is a first glimpse at what developers think are the problems and challenges for application security.&lt;br /&gt;
&lt;br /&gt;
[[Image:Developer_outreach_iteration_1.png]]&lt;br /&gt;
&lt;br /&gt;
Full data searchable via the online database [https://www.grubba.net https://www.grubba.net] (account 'owasp'/'owasp') or available in a .csv file [http://www.owasp.org/images/e/e0/OWASP_Developer_Outreach_Iteration_1.csv.zip here].&lt;br /&gt;
&lt;br /&gt;
=== &amp;quot;Lack of Security in Frameworks&amp;quot; ===&lt;br /&gt;
Here's what the developers said in the number one category &amp;quot;Lack of Security in Frameworks&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
Question: '''What are your security itches?'''&lt;br /&gt;
&lt;br /&gt;
* ''NMP (not my problem), aka should be handled by the used frameworks'' (spring, struts, etc). [Java and C# developer, 5 years of experience]&lt;br /&gt;
* ''The idea that you can tackle all security problems with spring security.''  [Java and C# developer, 5 years of experience]&lt;br /&gt;
* ''I want more/most/all implementation-level security issues taken care of at the language and framework level. There are far too many security problems that are left to developers to understand and take care of.'' [Java and JavaScript developer, 15 years experience]&lt;br /&gt;
* ''Libraries and frameworks have insecure defaults (example: JSP's c:out). Webapp frameworks doesnt keep up with the security landscape, and there are no quick fixes to add security to these. No central place for developers for different languages and frameworks, making it hard to find the good solutions (making people solve the same problems over and over, with different success rate).'' [Java and JavaScript developer, 6 years of experience]&lt;br /&gt;
* ''Things I don't have control over. 3rd party DB drivers, image libraries, all kind of framework.'' [C# and Java developer, 10 years of experience]&lt;br /&gt;
* ''Frameworks missing mechanisms for solving common security problems (CSRF, http-only etc.)'' [Java and Ruby developer, 3 years experience]&lt;br /&gt;
* ''Lack of security support in frameworks.'' [Java developer, 15 years of experience]&lt;br /&gt;
* ''Picking secure components.'' [Java and Scala developer, 8 years of experience]&lt;br /&gt;
* ''Missing a lot of functionality in frameworks for handling common security issues.'' [Java and JavaScript developer, 10 years of experience]&lt;br /&gt;
* ''Secure by default, i e default settings in frameworks would be nice.'' [Java and JavaScript developer, 10 years of experience]&lt;br /&gt;
&lt;br /&gt;
=== &amp;quot;Security Info Hard to Find&amp;quot; ===&lt;br /&gt;
Here's what the developers said in the runner up category &amp;quot;Security Info Hard to Find&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
Question: '''What are your security itches?'''&lt;br /&gt;
&lt;br /&gt;
* ''Security is very seldom covered in the channels developers listen to, e.g. developer conferences.'' [Java and JavaScript developer, 10 years experience]&lt;br /&gt;
* ''Which tools are good enough? Which frameworks are good enough? Can I trust Google when searching for security solutions? How else to ask?'' [Java developer, 12 years experience]&lt;br /&gt;
* ''There are resources for that?'' [C# developer, 10 years experience]&lt;br /&gt;
* ''The security info channels you listen to are too noisy. Hard to know what's a real problem.'' [Java and JavaScript developer, 10 years experience]&lt;br /&gt;
* ''Would like to see a matrix with various frameworks on one axis and security issues such as OWASP Top 10 on the other. Cells contain links to solutions.'' [Java and JavaScript developer, 10 years experience]&lt;br /&gt;
* ''Would like a comparison of what is supported and not in the different web frameworks with regard to security (escaping &amp;amp; encoding, sql-injection, etc).'' [C# and Ruby developer, 3 years experience]&lt;br /&gt;
* ''Can't find resources.'' [PHP developer, 15 years experience]&lt;br /&gt;
* ''Information is hard to find.'' [C# developer, 4 years experience]&lt;br /&gt;
&lt;br /&gt;
==== Official Builder Projects  ====&lt;br /&gt;
&lt;br /&gt;
To be determined &lt;br /&gt;
&lt;br /&gt;
==== All Builder Related Projects ====&lt;br /&gt;
All projects that are related to the OWASP Builders community can be found at the following link: [[:Category:OWASP Builders]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Sweden&amp;diff=125878</id>
		<title>Sweden</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Sweden&amp;diff=125878"/>
				<updated>2012-03-10T12:05:50Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Added Jim Manico's talk March 2012&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Sweden|extra=The chapter co-leaders are [mailto:John.Wilander@owasp.org John Wilander], [mailto:Mattias.Bergling@owasp.org Mattias Bergling], and [mailto:Robert.Malmgren@owasp.org Robert Malmgren]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
&lt;br /&gt;
== The OWASP Sweden blog ==&lt;br /&gt;
&lt;br /&gt;
For lengthy news and event reports please visit the [http://owaspsweden.blogspot.com/ OWASP Sweden blog] (in Swedish).&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Stockholm, March 20, 2012: &amp;quot;Web Application Access Control Design Excellence&amp;quot;'''&lt;br /&gt;
&lt;br /&gt;
Welcome to an OWASP Sweden seminar March 20, with Jim Manico. Book your seat at [https://owaspsweden200312.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
This event will be in English.&lt;br /&gt;
&lt;br /&gt;
Sponsors for this event are:&lt;br /&gt;
* F5 who is sponsoring for Jim's travel and hotel&lt;br /&gt;
* .SE sponsoring with the venue&lt;br /&gt;
* Cybercom who will supply you with beverage and snacks during the evening&lt;br /&gt;
&lt;br /&gt;
The Speaker&lt;br /&gt;
Jim Manico is a profile in the OWASP community working with the OWASP podcasts and ESAPI amongst other things. During march he is doing a nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Stockholm on March 20.&lt;br /&gt;
Read more on the OWASP webpage https://www.owasp.org/index.php/User:Jmanico&lt;br /&gt;
&lt;br /&gt;
Abstract for Jim´s talk:&lt;br /&gt;
&lt;br /&gt;
'''Web Application Access Control Design Excellence'''&lt;br /&gt;
&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms. In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden SSL Day, Stockholm, November 23 2011'''&lt;br /&gt;
OWASP Sweden, Stockholm branch is happy to announce a full-day on the topic of SSL in cooperation with Internetdagarna&lt;br /&gt;
http://www.internetdagarna.se/ind11/program/seminarium/92&lt;br /&gt;
&lt;br /&gt;
The speakers are&lt;br /&gt;
* Jakob Schlyter, Kirei&lt;br /&gt;
* John Wilander, OWASP Sweden and Handelsbanken&lt;br /&gt;
* Andreas Jonson, Romab&lt;br /&gt;
* Henrich Pöhls, University of Passau&lt;br /&gt;
* Robert Malmgren, OWASP Sweden and Romab&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting March 7 2011, &amp;quot;Security impact of SVG&amp;quot; + &amp;quot;&amp;quot;ECMA Script 5, a frozen DOM and the eradication of XSS'''&lt;br /&gt;
Mario Heiderich works as a researcher for the Ruhr-University in Bochum, Germany and currently focuses on HTML5, SVG security and security implications of the ES5 specification draft while finishing his PhD thesis.&lt;br /&gt;
&lt;br /&gt;
We're very happy to invite Mario to OWASP Sweden in March. His two talks will be given in English at Royal Institute of Technology (KTH).&lt;br /&gt;
&lt;br /&gt;
Get your ticket now at [http://marioheiderich.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mario's slides:&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Mario_Heiderich_OWASP_Sweden_The_image_that_called_me.pdf‎]] &amp;quot;The Image That Called Me&amp;quot; on SVG security&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Mario_Heiderich_OWASP_Sweden_Locking_the_throneroom.pdf‎]] &amp;quot;Locking the Throneroom&amp;quot; on locking the DOM to eradicate XSS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Jan 31 2011, &amp;quot;HTTP-säkerhet&amp;quot;'''&lt;br /&gt;
Daniel Stenberg, Martin Holst Swende, and John Wilander will give talks for OWASP Sweden on Jan 31, 5:30 pm - 21 pm. The topics are Websockets, the new Cookie RFC, Content Security Policy, HTTP Strict Transport Security, and X-Frame-Options. We will be in lecture hall &amp;quot;New York&amp;quot;, World Trade Center, Stockholm ([http://www.hitta.se/SearchMixed.aspx?vad=world%20trade%20center&amp;amp;var=stockholm map]).&lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers.&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden reaches 500 members ... and gets three leaders'''&lt;br /&gt;
OWASP Sweden now has a stunning 500 members on the mailing list. From now the chapter will be lead by three co-leaders: John Wilander, Mattias Bergling, and Robert Malmgren.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden invites Samy Kamkar, October 4, 2010'''&lt;br /&gt;
Samy Kamkar, famous for the [http://en.wikipedia.org/wiki/Samy_(XSS) Samy XSS attack on MySpace] in 2005 will be giving a talk for OWASP Sweden on October 4, 5:30 pm - 22 pm. We will be in Ljusgården, Årstaängsvägen 19, Marievik/Liljeholmen, Stockholm ([http://www.hitta.se/LargeMap.aspx?var=%c5rsta%e4ngsv%e4gen+19%2c+Liljeholmen%2fMarievik%2c+Stockholm map]).&lt;br /&gt;
&lt;br /&gt;
Nexus Safe and Data@UrService are sponsors and there will be lighter food and beers.&lt;br /&gt;
&lt;br /&gt;
[[Media:OWASP_Sweden_Samy_Kamkar_oktober_2010.pdf]]&lt;br /&gt;
&lt;br /&gt;
Go to [http://samykamkar.eventbrite.com/ EventBrite] and register for free now!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden + FOSS Sthlm &amp;quot;Community Hack&amp;quot; September 4-5 2010'''&lt;br /&gt;
The first weekend of September OWASP Sweden together with FOSS Sthlm invite our members to Community Hack II in Stockholm. A full weekend of hacking on open projects, testing new security hacks, trying out tools (for instance the favorite OWASP tool you've always wanted to learn), or writing new, open guidelines.&lt;br /&gt;
&lt;br /&gt;
Go to [http://communityhack2.eventbrite.com/ EventBrite] and register for free now!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP AppSec Research 2010 in Stockholm, June 21-24 2010'''&lt;br /&gt;
June 21-24, 2010 appsec people will meet in beautiful Stockholm, Sweden. The OWASP chapters in Sweden, Norway, and Denmark together with Stockholm University host the [http://www.owasp.org/index.php/OWASP_AppSec_Research_2010_-_Stockholm,_Sweden OWASP AppSec Research 2010].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting January 21st 2010 -- The Big Protocols'''&lt;br /&gt;
Stiftelsen för Internetinfrastruktur (.SE) and Swedish Network Users' Society (SNUS) invite us to three seminars on the big protocols: BGP, DNSSEC, and SSL/TLS.&lt;br /&gt;
&lt;br /&gt;
Program and invitation (in Swedish): [[File:OWASP_Sweden_-_De_stora_protokollen_2010-01-21.pdf]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting December 2nd 2009 -- OWASP Top 10 2010 (rc1)'''&lt;br /&gt;
Omegapoint invites us to discuss the release candidate of OWASP Top 10 2010 that was presented at OWASP AppSec DC November 13th. The invitation in Swedish is found [[File:OWASP_Sweden_Top_10_december_2009.pdf | here]]. &lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@owasp.org) no later than November 23rd to say you're coming.''' Seats usually fill up fast.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP AppSec Research 2010, June 21-24 in Stockholm, Sweden'''&lt;br /&gt;
OWASP Sweden, Norway, and Denmark invite you to OWASP AppSec Research 2010, June 21-24 in Stockholm. Read more on the [https://www.owasp.org/index.php/OWASP_AppSec_Research_2010_-_Stockholm%2C_Sweden conference wiki page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting April 28th 2009 -- Code Analysis and Review'''&lt;br /&gt;
&lt;br /&gt;
The second chapter meeting of 2009 will be held on Tuesday April 28th at Clarion Hotel Stockholm. The focus is code analysis and code review. Fortify sponsors the event and welcome the chapter members to refreshments, starting at 17.30.&lt;br /&gt;
&lt;br /&gt;
The program:&lt;br /&gt;
&lt;br /&gt;
* Fredrik Möller (Fortify) will biefly present Fortify and their support of OWASP&lt;br /&gt;
* David Anumudu (Fortify) will present and do a live demo of Fortify Solution&lt;br /&gt;
* James Dickson (Simovits Consulting) will give a talk on code review&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@omegapoint.se) no later than April 23rd to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting March 26th 2009 -- XSS &amp;amp; CSRF'''&lt;br /&gt;
&lt;br /&gt;
The first meeting of 2009 will be held Thursday March 26th at LabCenter, Oxtorgsgränd 2, Stockholm. The focus is cross-site scripting and cross-site request forgery, attacks and countermeasures. Inspect it and LabCenter sponsor the event and welcome the chapter members to refreshments, starting at 17.00.&lt;br /&gt;
&lt;br /&gt;
The program:&lt;br /&gt;
&lt;br /&gt;
* Hasain Alshakarti, TrueSec: &amp;quot;XSS &amp;amp; CSRF -- A Deadly Cocktail&amp;quot;&lt;br /&gt;
* Sergio Molero, Concrete IT: &amp;quot;Skydd mot XSS och CSRF&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Mattias Bergling (mattias.bergling@inspectit.se) no later than March 23rd to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting November 19th 2008 -- PCI DSS'''&lt;br /&gt;
&lt;br /&gt;
The next chapter meeting is Wednesday November 19th. The focus of the seminars is on PCI-DSS, i.e. security in payment card handling on the Internet. &lt;br /&gt;
The program:&lt;br /&gt;
* Mats Henriksson, Pan Nordic Card Assoc: &amp;quot;PCI DSS - Tre goda anledningar&amp;quot;&lt;br /&gt;
* Pål Göran Stensson, Defensor Sverige AB: &amp;quot;PCI DSS - Externa krav och konsulten&amp;quot;&lt;br /&gt;
* Bengt Berg, Cybercom Sweden East AB: &amp;quot;Olika angreppssätt på PCI DSS&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''The meeting is fully booked. But do send an email to John Wilander (john.wilander@omegapoint.se) to say you're interested and we'll let you know if seats become available.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Hosts the OWASP AppSec Europe Conference 2010'''&lt;br /&gt;
&lt;br /&gt;
We're hosting the European OWASP AppSec conference in 2010! Please read the [http://www.owasp.org/index.php/OWASP_AppSec_Europe_2010_-_Sweden announcement].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting October 6th 2008 -- Security in the Open Source Process'''&lt;br /&gt;
&lt;br /&gt;
The next chapter meeting is Monday October 6th at Clarion Hotel Stockholm (Skanstull). The focus of the seminars will be on &amp;quot;Security in the Open Source Process&amp;quot;. Refreshments will be served from 16:30 and the seminars will commence at 17:30. Except for a closing panel discussion the program contains the following:&lt;br /&gt;
&lt;br /&gt;
* Simon Josefsson, SJD: ”Anekdoter och lärdomar från granskning av säkerhetsprogram”&lt;br /&gt;
* Daniel Stenberg, daniel.haxx.se: ”Säker kod och utveckling i cURL-projektet”&lt;br /&gt;
* Anders Karlsson, MySQL och Sun Microsystems: ”MySQL: Säkerhet i ett kommersiellt open source-projekt”&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Robert Malmgren (anmalan@romab.com) no later than September 29th to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting May 27th 2008 - SQL Injection, Web Scarab'''&lt;br /&gt;
&lt;br /&gt;
OWASP-Sweden welcomes its members to the next chapter meeting - Tuesday May 27th at Clarion Hotel Stockholm. Refreshments will be served from 17:00, demos will be shown from 17:30, and the seminars will commence at 18:00. The main attractions are:&lt;br /&gt;
 &lt;br /&gt;
* Patrik Karlson, Inspect it: &amp;quot;SQL injection, identifiering och utnyttjande&amp;quot;&lt;br /&gt;
* Johannes Gumbel, TrueSec: &amp;quot;WebScarab—funktioner, fördelar och nackdelar&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Mattias Bergling (mattias.bergling@inspectit.se) no later than May 21st to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Kick-Off Meeting for OWASP-Sweden April 1st 2008'''&lt;br /&gt;
&lt;br /&gt;
The OWASP-Sweden kick-off will be held at WTC in Stockholm on April 1st. Yeah, it's April Fool's Day but we go under the tagline &amp;quot;Application Security is Not a Joke&amp;quot;. The presentation program includes:&lt;br /&gt;
&lt;br /&gt;
* Andrei Sabelfeld, well-known security researcher from Chalmers&lt;br /&gt;
* Michael Anderberg, Chief Security Advisor at Microsoft Sweden&lt;br /&gt;
* Per Mellstrand, software analyst at Sony Ericsson and researcher at Blekinge Institute of Technology&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@omegapoint.se) no later than March 27 to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
We're kicking off!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden in Computer Sweden - 08:44, 19 Dec 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Today the Swedish national IT newspaper 'Computer Sweden' published an article on the new OWASP-Sweden chapter - [http://computersweden.idg.se/2.2683/1.137387 ''Mecka för säker programmering till Sverige''], or ''A Mecka for Secure Programming Reaches Sweden'' in English. While OWASP is more than a programmer's guide, Mattias Bergling and I are very happy to get the news out to a large part of Sweden's IT industry.&lt;br /&gt;
&lt;br /&gt;
'''To become a member of Owasp-Sweden just join the [http://lists.owasp.org/mailman/listinfo/owasp-sweden mailing list].'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden opens! - 22:25, 01 Oct 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Finally, Sweden has joined the OWASP movement and John Wilander, the local chapter leader, welcomes members to the Stockholm-based OWASP-Sweden. Please, join our mailing list. Plans for meetings and seminars will be made.&lt;br /&gt;
&lt;br /&gt;
Are you interested in helping out? Do you have ideas for great invited speakers or workshop meetings? Feel free to contact the chapter.&lt;br /&gt;
[[Category:Sweden]]&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Sweden&amp;diff=125877</id>
		<title>Sweden</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Sweden&amp;diff=125877"/>
				<updated>2012-03-10T12:00:16Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Added SSL Day 2011&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Sweden|extra=The chapter co-leaders are [mailto:John.Wilander@owasp.org John Wilander], [mailto:Mattias.Bergling@owasp.org Mattias Bergling], and [mailto:Robert.Malmgren@owasp.org Robert Malmgren]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
&lt;br /&gt;
== The OWASP Sweden blog ==&lt;br /&gt;
&lt;br /&gt;
For lengthy news and event reports please visit the [http://owaspsweden.blogspot.com/ OWASP Sweden blog] (in Swedish).&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden SSL Day, Stockholm, November 23 2011'''&lt;br /&gt;
OWASP Sweden, Stockholm branch is happy to announce a full-day on the topic of SSL in cooperation with Internetdagarna&lt;br /&gt;
http://www.internetdagarna.se/ind11/program/seminarium/92&lt;br /&gt;
&lt;br /&gt;
The speakers are&lt;br /&gt;
* Jakob Schlyter, Kirei&lt;br /&gt;
* John Wilander, OWASP Sweden and Handelsbanken&lt;br /&gt;
* Andreas Jonson, Romab&lt;br /&gt;
* Henrich Pöhls, University of Passau&lt;br /&gt;
* Robert Malmgren, OWASP Sweden and Romab&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting March 7 2011, &amp;quot;Security impact of SVG&amp;quot; + &amp;quot;&amp;quot;ECMA Script 5, a frozen DOM and the eradication of XSS'''&lt;br /&gt;
Mario Heiderich works as a researcher for the Ruhr-University in Bochum, Germany and currently focuses on HTML5, SVG security and security implications of the ES5 specification draft while finishing his PhD thesis.&lt;br /&gt;
&lt;br /&gt;
We're very happy to invite Mario to OWASP Sweden in March. His two talks will be given in English at Royal Institute of Technology (KTH).&lt;br /&gt;
&lt;br /&gt;
Get your ticket now at [http://marioheiderich.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mario's slides:&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Mario_Heiderich_OWASP_Sweden_The_image_that_called_me.pdf‎]] &amp;quot;The Image That Called Me&amp;quot; on SVG security&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Mario_Heiderich_OWASP_Sweden_Locking_the_throneroom.pdf‎]] &amp;quot;Locking the Throneroom&amp;quot; on locking the DOM to eradicate XSS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Jan 31 2011, &amp;quot;HTTP-säkerhet&amp;quot;'''&lt;br /&gt;
Daniel Stenberg, Martin Holst Swende, and John Wilander will give talks for OWASP Sweden on Jan 31, 5:30 pm - 21 pm. The topics are Websockets, the new Cookie RFC, Content Security Policy, HTTP Strict Transport Security, and X-Frame-Options. We will be in lecture hall &amp;quot;New York&amp;quot;, World Trade Center, Stockholm ([http://www.hitta.se/SearchMixed.aspx?vad=world%20trade%20center&amp;amp;var=stockholm map]).&lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers.&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden reaches 500 members ... and gets three leaders'''&lt;br /&gt;
OWASP Sweden now has a stunning 500 members on the mailing list. From now the chapter will be lead by three co-leaders: John Wilander, Mattias Bergling, and Robert Malmgren.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden invites Samy Kamkar, October 4, 2010'''&lt;br /&gt;
Samy Kamkar, famous for the [http://en.wikipedia.org/wiki/Samy_(XSS) Samy XSS attack on MySpace] in 2005 will be giving a talk for OWASP Sweden on October 4, 5:30 pm - 22 pm. We will be in Ljusgården, Årstaängsvägen 19, Marievik/Liljeholmen, Stockholm ([http://www.hitta.se/LargeMap.aspx?var=%c5rsta%e4ngsv%e4gen+19%2c+Liljeholmen%2fMarievik%2c+Stockholm map]).&lt;br /&gt;
&lt;br /&gt;
Nexus Safe and Data@UrService are sponsors and there will be lighter food and beers.&lt;br /&gt;
&lt;br /&gt;
[[Media:OWASP_Sweden_Samy_Kamkar_oktober_2010.pdf]]&lt;br /&gt;
&lt;br /&gt;
Go to [http://samykamkar.eventbrite.com/ EventBrite] and register for free now!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden + FOSS Sthlm &amp;quot;Community Hack&amp;quot; September 4-5 2010'''&lt;br /&gt;
The first weekend of September OWASP Sweden together with FOSS Sthlm invite our members to Community Hack II in Stockholm. A full weekend of hacking on open projects, testing new security hacks, trying out tools (for instance the favorite OWASP tool you've always wanted to learn), or writing new, open guidelines.&lt;br /&gt;
&lt;br /&gt;
Go to [http://communityhack2.eventbrite.com/ EventBrite] and register for free now!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP AppSec Research 2010 in Stockholm, June 21-24 2010'''&lt;br /&gt;
June 21-24, 2010 appsec people will meet in beautiful Stockholm, Sweden. The OWASP chapters in Sweden, Norway, and Denmark together with Stockholm University host the [http://www.owasp.org/index.php/OWASP_AppSec_Research_2010_-_Stockholm,_Sweden OWASP AppSec Research 2010].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting January 21st 2010 -- The Big Protocols'''&lt;br /&gt;
Stiftelsen för Internetinfrastruktur (.SE) and Swedish Network Users' Society (SNUS) invite us to three seminars on the big protocols: BGP, DNSSEC, and SSL/TLS.&lt;br /&gt;
&lt;br /&gt;
Program and invitation (in Swedish): [[File:OWASP_Sweden_-_De_stora_protokollen_2010-01-21.pdf]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting December 2nd 2009 -- OWASP Top 10 2010 (rc1)'''&lt;br /&gt;
Omegapoint invites us to discuss the release candidate of OWASP Top 10 2010 that was presented at OWASP AppSec DC November 13th. The invitation in Swedish is found [[File:OWASP_Sweden_Top_10_december_2009.pdf | here]]. &lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@owasp.org) no later than November 23rd to say you're coming.''' Seats usually fill up fast.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP AppSec Research 2010, June 21-24 in Stockholm, Sweden'''&lt;br /&gt;
OWASP Sweden, Norway, and Denmark invite you to OWASP AppSec Research 2010, June 21-24 in Stockholm. Read more on the [https://www.owasp.org/index.php/OWASP_AppSec_Research_2010_-_Stockholm%2C_Sweden conference wiki page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting April 28th 2009 -- Code Analysis and Review'''&lt;br /&gt;
&lt;br /&gt;
The second chapter meeting of 2009 will be held on Tuesday April 28th at Clarion Hotel Stockholm. The focus is code analysis and code review. Fortify sponsors the event and welcome the chapter members to refreshments, starting at 17.30.&lt;br /&gt;
&lt;br /&gt;
The program:&lt;br /&gt;
&lt;br /&gt;
* Fredrik Möller (Fortify) will biefly present Fortify and their support of OWASP&lt;br /&gt;
* David Anumudu (Fortify) will present and do a live demo of Fortify Solution&lt;br /&gt;
* James Dickson (Simovits Consulting) will give a talk on code review&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@omegapoint.se) no later than April 23rd to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting March 26th 2009 -- XSS &amp;amp; CSRF'''&lt;br /&gt;
&lt;br /&gt;
The first meeting of 2009 will be held Thursday March 26th at LabCenter, Oxtorgsgränd 2, Stockholm. The focus is cross-site scripting and cross-site request forgery, attacks and countermeasures. Inspect it and LabCenter sponsor the event and welcome the chapter members to refreshments, starting at 17.00.&lt;br /&gt;
&lt;br /&gt;
The program:&lt;br /&gt;
&lt;br /&gt;
* Hasain Alshakarti, TrueSec: &amp;quot;XSS &amp;amp; CSRF -- A Deadly Cocktail&amp;quot;&lt;br /&gt;
* Sergio Molero, Concrete IT: &amp;quot;Skydd mot XSS och CSRF&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Mattias Bergling (mattias.bergling@inspectit.se) no later than March 23rd to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting November 19th 2008 -- PCI DSS'''&lt;br /&gt;
&lt;br /&gt;
The next chapter meeting is Wednesday November 19th. The focus of the seminars is on PCI-DSS, i.e. security in payment card handling on the Internet. &lt;br /&gt;
The program:&lt;br /&gt;
* Mats Henriksson, Pan Nordic Card Assoc: &amp;quot;PCI DSS - Tre goda anledningar&amp;quot;&lt;br /&gt;
* Pål Göran Stensson, Defensor Sverige AB: &amp;quot;PCI DSS - Externa krav och konsulten&amp;quot;&lt;br /&gt;
* Bengt Berg, Cybercom Sweden East AB: &amp;quot;Olika angreppssätt på PCI DSS&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''The meeting is fully booked. But do send an email to John Wilander (john.wilander@omegapoint.se) to say you're interested and we'll let you know if seats become available.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Hosts the OWASP AppSec Europe Conference 2010'''&lt;br /&gt;
&lt;br /&gt;
We're hosting the European OWASP AppSec conference in 2010! Please read the [http://www.owasp.org/index.php/OWASP_AppSec_Europe_2010_-_Sweden announcement].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting October 6th 2008 -- Security in the Open Source Process'''&lt;br /&gt;
&lt;br /&gt;
The next chapter meeting is Monday October 6th at Clarion Hotel Stockholm (Skanstull). The focus of the seminars will be on &amp;quot;Security in the Open Source Process&amp;quot;. Refreshments will be served from 16:30 and the seminars will commence at 17:30. Except for a closing panel discussion the program contains the following:&lt;br /&gt;
&lt;br /&gt;
* Simon Josefsson, SJD: ”Anekdoter och lärdomar från granskning av säkerhetsprogram”&lt;br /&gt;
* Daniel Stenberg, daniel.haxx.se: ”Säker kod och utveckling i cURL-projektet”&lt;br /&gt;
* Anders Karlsson, MySQL och Sun Microsystems: ”MySQL: Säkerhet i ett kommersiellt open source-projekt”&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Robert Malmgren (anmalan@romab.com) no later than September 29th to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting May 27th 2008 - SQL Injection, Web Scarab'''&lt;br /&gt;
&lt;br /&gt;
OWASP-Sweden welcomes its members to the next chapter meeting - Tuesday May 27th at Clarion Hotel Stockholm. Refreshments will be served from 17:00, demos will be shown from 17:30, and the seminars will commence at 18:00. The main attractions are:&lt;br /&gt;
 &lt;br /&gt;
* Patrik Karlson, Inspect it: &amp;quot;SQL injection, identifiering och utnyttjande&amp;quot;&lt;br /&gt;
* Johannes Gumbel, TrueSec: &amp;quot;WebScarab—funktioner, fördelar och nackdelar&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Mattias Bergling (mattias.bergling@inspectit.se) no later than May 21st to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Kick-Off Meeting for OWASP-Sweden April 1st 2008'''&lt;br /&gt;
&lt;br /&gt;
The OWASP-Sweden kick-off will be held at WTC in Stockholm on April 1st. Yeah, it's April Fool's Day but we go under the tagline &amp;quot;Application Security is Not a Joke&amp;quot;. The presentation program includes:&lt;br /&gt;
&lt;br /&gt;
* Andrei Sabelfeld, well-known security researcher from Chalmers&lt;br /&gt;
* Michael Anderberg, Chief Security Advisor at Microsoft Sweden&lt;br /&gt;
* Per Mellstrand, software analyst at Sony Ericsson and researcher at Blekinge Institute of Technology&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@omegapoint.se) no later than March 27 to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
We're kicking off!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden in Computer Sweden - 08:44, 19 Dec 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Today the Swedish national IT newspaper 'Computer Sweden' published an article on the new OWASP-Sweden chapter - [http://computersweden.idg.se/2.2683/1.137387 ''Mecka för säker programmering till Sverige''], or ''A Mecka for Secure Programming Reaches Sweden'' in English. While OWASP is more than a programmer's guide, Mattias Bergling and I are very happy to get the news out to a large part of Sweden's IT industry.&lt;br /&gt;
&lt;br /&gt;
'''To become a member of Owasp-Sweden just join the [http://lists.owasp.org/mailman/listinfo/owasp-sweden mailing list].'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden opens! - 22:25, 01 Oct 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Finally, Sweden has joined the OWASP movement and John Wilander, the local chapter leader, welcomes members to the Stockholm-based OWASP-Sweden. Please, join our mailing list. Plans for meetings and seminars will be made.&lt;br /&gt;
&lt;br /&gt;
Are you interested in helping out? Do you have ideas for great invited speakers or workshop meetings? Feel free to contact the chapter.&lt;br /&gt;
[[Category:Sweden]]&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:John_Wilander_090626-346_(for_web).jpg&amp;diff=125876</id>
		<title>File:John Wilander 090626-346 (for web).jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:John_Wilander_090626-346_(for_web).jpg&amp;diff=125876"/>
				<updated>2012-03-10T11:45:55Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: uploaded a new version of &amp;amp;quot;File:John Wilander 090626-346 (for web).jpg&amp;amp;quot;: File was gone. Uploaded it again.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Profile picture for John Wilander&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Builders&amp;diff=107750</id>
		<title>Builders</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Builders&amp;diff=107750"/>
				<updated>2011-03-27T23:15:59Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Added category &amp;quot;Security Info Hard to Find&amp;quot;, changed from bold to italics on quotes.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== OWASP Builders  ====&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
'''Builders Community''' &lt;br /&gt;
&lt;br /&gt;
A community of security professionals and stakeholders with the common goal of advancing the state of security in the area of application development.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''What Are OWASP Communities?'''&lt;br /&gt;
&lt;br /&gt;
Builders, Breakers and [http://www.owasp.org/index.php/Defenders Defenders]; the idea of OWASP Communities is to bring together experts in the area that they are best at with the common goal of advancing the state of application security.  This approach allows similar groups of professionals and experts to tackle security problems with the involvement of the most relevant stakeholders.  The intent is to drive high quality output that is immediately usable by the target audience.  More information about this vision can be found [http://michael-coates.blogspot.com/2011/02/vision-for-owasp.html here].&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:OWASP-vision.jpg]] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Want to contribute to the OWASP Builders Community? &amp;lt;br&amp;gt;Add your info and send an email to [mailto:john.wilander@owasp.org john.wilander@owasp.org]&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Developer Outreach  ====&lt;br /&gt;
&lt;br /&gt;
Get involved in the Developer Outreach by subscribing to the ...&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/developer-outreach Steering List (low traffic)]&lt;br /&gt;
* [https://groups.google.com/group/owasp-dev-outreach-discuss Google Group (for discussions)]&lt;br /&gt;
&lt;br /&gt;
The first priority of the Builders Community is to reach out to developers and ask what application security is lacking today. An initial lightweight outreach was performed early March 2011.&lt;br /&gt;
&lt;br /&gt;
=== Developers' Security Itches March 2011 ===&lt;br /&gt;
The overall results of the initial outreach can be seen in the diagram below (categorization by John Wilander, full-text available via links below). This is a first glimpse at what developers think are the problems and challenges for application security.&lt;br /&gt;
&lt;br /&gt;
[[Image:Developer_outreach_iteration_1.png]]&lt;br /&gt;
&lt;br /&gt;
Full data searchable via the online database [https://www.grubba.net https://www.grubba.net] (account 'owasp'/'owasp') or available in a .csv file [http://www.owasp.org/images/e/e0/OWASP_Developer_Outreach_Iteration_1.csv.zip here].&lt;br /&gt;
&lt;br /&gt;
=== &amp;quot;Lack of Security in Frameworks&amp;quot; ===&lt;br /&gt;
Here's what the developers said in the number one category &amp;quot;Lack of Security in Frameworks&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
Question: '''What are your security itches?'''&lt;br /&gt;
&lt;br /&gt;
* ''NMP (not my problem), aka should be handled by the used frameworks'' (spring, struts, etc). [Java and C# developer, 5 years of experience]&lt;br /&gt;
* ''The idea that you can tackle all security problems with spring security.''  [Java and C# developer, 5 years of experience]&lt;br /&gt;
* ''I want more/most/all implementation-level security issues taken care of at the language and framework level. There are far too many security problems that are left to developers to understand and take care of.'' [Java and JavaScript developer, 15 years experience]&lt;br /&gt;
* ''Libraries and frameworks have insecure defaults (example: JSP's c:out). Webapp frameworks doesnt keep up with the security landscape, and there are no quick fixes to add security to these. No central place for developers for different languages and frameworks, making it hard to find the good solutions (making people solve the same problems over and over, with different success rate).'' [Java and JavaScript developer, 6 years of experience]&lt;br /&gt;
* ''Things I don't have control over. 3rd party DB drivers, image libraries, all kind of framework.'' [C# and Java developer, 10 years of experience]&lt;br /&gt;
* ''Frameworks missing mechanisms for solving common security problems (CSRF, http-only etc.)'' [Java and Ruby developer, 3 years experience]&lt;br /&gt;
* ''Lack of security support in frameworks.'' [Java developer, 15 years of experience]&lt;br /&gt;
* ''Picking secure components.'' [Java and Scala developer, 8 years of experience]&lt;br /&gt;
* ''Missing a lot of functionality in frameworks for handling common security issues.'' [Java and JavaScript developer, 10 years of experience]&lt;br /&gt;
* ''Secure by default, i e default settings in frameworks would be nice.'' [Java and JavaScript developer, 10 years of experience]&lt;br /&gt;
&lt;br /&gt;
=== &amp;quot;Security Info Hard to Find&amp;quot; ===&lt;br /&gt;
Here's what the developers said in the runner up category &amp;quot;Security Info Hard to Find&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
Question: '''What are your security itches?'''&lt;br /&gt;
&lt;br /&gt;
* ''Security is very seldom covered in the channels developers listen to, e.g. developer conferences.'' [Java and JavaScript developer, 10 years experience]&lt;br /&gt;
* ''Which tools are good enough? Which frameworks are good enough? Can I trust Google when searching for security solutions? How else to ask?'' [Java developer, 12 years experience]&lt;br /&gt;
* ''There are resources for that?'' [C# developer, 10 years experience]&lt;br /&gt;
* ''The security info channels you listen to are too noisy. Hard to know what's a real problem.'' [Java and JavaScript developer, 10 years experience]&lt;br /&gt;
* ''Would like to see a matrix with various frameworks on one axis and security issues such as OWASP Top 10 on the other. Cells contain links to solutions.'' [Java and JavaScript developer, 10 years experience]&lt;br /&gt;
* ''Would like a comparison of what is supported and not in the different web frameworks with regard to security (escaping &amp;amp; encoding, sql-injection, etc).'' [C# and Ruby developer, 3 years experience]&lt;br /&gt;
* ''Can't find resources.'' [PHP developer, 15 years experience]&lt;br /&gt;
* ''Information is hard to find.'' [C# developer, 4 years experience]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Builders&amp;diff=107749</id>
		<title>Builders</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Builders&amp;diff=107749"/>
				<updated>2011-03-27T22:43:11Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Added link to Defenders page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== OWASP Builders  ====&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
'''Builders Community''' &lt;br /&gt;
&lt;br /&gt;
A community of security professionals and stakeholders with the common goal of advancing the state of security in the area of application development.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''What Are OWASP Communities?'''&lt;br /&gt;
&lt;br /&gt;
Builders, Breakers and [http://www.owasp.org/index.php/Defenders Defenders]; the idea of OWASP Communities is to bring together experts in the area that they are best at with the common goal of advancing the state of application security.  This approach allows similar groups of professionals and experts to tackle security problems with the involvement of the most relevant stakeholders.  The intent is to drive high quality output that is immediately usable by the target audience.  More information about this vision can be found [http://michael-coates.blogspot.com/2011/02/vision-for-owasp.html here].&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:OWASP-vision.jpg]] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Want to contribute to the OWASP Builders Community? &amp;lt;br&amp;gt;Add your info and send an email to [mailto:john.wilander@owasp.org john.wilander@owasp.org]&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Developer Outreach  ====&lt;br /&gt;
&lt;br /&gt;
Get involved in the Developer Outreach by subscribing to the ...&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/developer-outreach Steering List (low traffic)]&lt;br /&gt;
* [https://groups.google.com/group/owasp-dev-outreach-discuss Google Group (for discussions)]&lt;br /&gt;
&lt;br /&gt;
The first priority of the Builders Community is to reach out to developers and ask what application security is lacking today. An initial lightweight outreach was performed early March 2011.&lt;br /&gt;
&lt;br /&gt;
=== Developers' Security Itches March 2011 ===&lt;br /&gt;
The overall results of the initial outreach can be seen in the diagram below (categorization by John Wilander, full-text available via links below). This is a first glimpse at what developers think are the problems and challenges for application security.&lt;br /&gt;
&lt;br /&gt;
[[Image:Developer_outreach_iteration_1.png]]&lt;br /&gt;
&lt;br /&gt;
Full data searchable via the online database [https://www.grubba.net https://www.grubba.net] (account 'owasp'/'owasp') or available in a .csv file [http://www.owasp.org/images/e/e0/OWASP_Developer_Outreach_Iteration_1.csv.zip here].&lt;br /&gt;
&lt;br /&gt;
=== &amp;quot;Lack of Security in Frameworks&amp;quot; ===&lt;br /&gt;
Here's what the developers said in the number one category &amp;quot;Lack of Security in Frameworks&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
Question: '''What are your security itches?'''&lt;br /&gt;
&lt;br /&gt;
* '''NMP (not my problem), aka should be handled by the used frameworks (spring, struts, etc).''' [Java and C# developer, 5 years of experience]&lt;br /&gt;
* '''The idea that you can tackle all security problems with spring security.'''  [Java and C# developer, 5 years of experience]&lt;br /&gt;
* '''I want more/most/all implementation-level security issues taken care of at the language and framework level. There are far too many security problems that are left to developers to understand and take care of.''' [Java and JavaScript developer, 15 years experience]&lt;br /&gt;
* '''Libraries and frameworks has insecure defaults (example: JSP's c:out). Webapp frameworks doesnt keep up with the security landscape, and there are no quick fixes to add security to these. No central place for developers for different languages and frameworks, making it hard to find the good solutions (making people solve the same problems over and over, with different success rate).''' [Java and JavaScript developer, 6 years of experience]&lt;br /&gt;
* '''Things I don't have control over. 3rd party DB drivers, image libraries, all kind of framework.''' [C# and Java developer, 10 years of experience]&lt;br /&gt;
* '''Frameworks missing mechanisms for solving common security problems (CSRF, http-only etc.)''' [Java+Ruby developer, 3 years experience]&lt;br /&gt;
* '''Lack of security support in frameworks.''' [Java developer, 15 years of experience]&lt;br /&gt;
* '''Picking secure components.''' [Java and Scala developer, 8 years of experience]&lt;br /&gt;
* '''Missing a lot of functionality in frameworks for handling common security issues.''' [Java and JavaScript developer, 10 years of experience]&lt;br /&gt;
* '''Secure by default, i e default settings in frameworks would be nice.''' [Java and JavaScript developer, 10 years of experience]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Builders&amp;diff=107748</id>
		<title>Builders</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Builders&amp;diff=107748"/>
				<updated>2011-03-27T22:27:21Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Initial commit including results and links from Developer Outreach, iteration 1&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== OWASP Builders  ====&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
'''Builders Community''' &lt;br /&gt;
&lt;br /&gt;
A community of security professionals and stakeholders with the common goal of advancing the state of security in the area of application development.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''What Are OWASP Communities?'''&lt;br /&gt;
&lt;br /&gt;
Builders, Breakers and [Defenders]; the idea of OWASP Communities is to bring together experts in the area that they are best at with the common goal of advancing the state of application security.  This approach allows similar groups of professionals and experts to tackle security problems with the involvement of the most relevant stakeholders.  The intent is to drive high quality output that is immediately usable by the target audience.  More information about this vision can be found [http://michael-coates.blogspot.com/2011/02/vision-for-owasp.html here].&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:OWASP-vision.jpg]] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Want to contribute to the OWASP Builders Community? &amp;lt;br&amp;gt;Add your info and send an email to [mailto:john.wilander@owasp.org john.wilander@owasp.org]&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Developer Outreach  ====&lt;br /&gt;
&lt;br /&gt;
Get involved in the Developer Outreach by subscribing to the ...&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/developer-outreach Steering List (low traffic)]&lt;br /&gt;
* [https://groups.google.com/group/owasp-dev-outreach-discuss Google Group (for discussions)]&lt;br /&gt;
&lt;br /&gt;
The first priority of the Builders Community is to reach out to developers and ask what application security is lacking today. An initial lightweight outreach was performed early March 2011.&lt;br /&gt;
&lt;br /&gt;
=== Developers' Security Itches March 2011 ===&lt;br /&gt;
The overall results of the initial outreach can be seen in the diagram below (categorization by John Wilander, full-text available via links below). This is a first glimpse at what developers think are the problems and challenges for application security.&lt;br /&gt;
&lt;br /&gt;
[[Image:Developer_outreach_iteration_1.png]]&lt;br /&gt;
&lt;br /&gt;
Full data searchable via the online database [https://www.grubba.net https://www.grubba.net] (account 'owasp'/'owasp') or available in a .csv file [http://www.owasp.org/images/e/e0/OWASP_Developer_Outreach_Iteration_1.csv.zip here].&lt;br /&gt;
&lt;br /&gt;
=== &amp;quot;Lack of Security in Frameworks&amp;quot; ===&lt;br /&gt;
Here's what the developers said in the number one category &amp;quot;Lack of Security in Frameworks&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
Question: '''What are your security itches?'''&lt;br /&gt;
&lt;br /&gt;
* '''NMP (not my problem), aka should be handled by the used frameworks (spring, struts, etc).''' [Java and C# developer, 5 years of experience]&lt;br /&gt;
* '''The idea that you can tackle all security problems with spring security.'''  [Java and C# developer, 5 years of experience]&lt;br /&gt;
* '''I want more/most/all implementation-level security issues taken care of at the language and framework level. There are far too many security problems that are left to developers to understand and take care of.''' [Java and JavaScript developer, 15 years experience]&lt;br /&gt;
* '''Libraries and frameworks has insecure defaults (example: JSP's c:out). Webapp frameworks doesnt keep up with the security landscape, and there are no quick fixes to add security to these. No central place for developers for different languages and frameworks, making it hard to find the good solutions (making people solve the same problems over and over, with different success rate).''' [Java and JavaScript developer, 6 years of experience]&lt;br /&gt;
* '''Things I don't have control over. 3rd party DB drivers, image libraries, all kind of framework.''' [C# and Java developer, 10 years of experience]&lt;br /&gt;
* '''Frameworks missing mechanisms for solving common security problems (CSRF, http-only etc.)''' [Java+Ruby developer, 3 years experience]&lt;br /&gt;
* '''Lack of security support in frameworks.''' [Java developer, 15 years of experience]&lt;br /&gt;
* '''Picking secure components.''' [Java and Scala developer, 8 years of experience]&lt;br /&gt;
* '''Missing a lot of functionality in frameworks for handling common security issues.''' [Java and JavaScript developer, 10 years of experience]&lt;br /&gt;
* '''Secure by default, i e default settings in frameworks would be nice.''' [Java and JavaScript developer, 10 years of experience]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Developer_Outreach_Iteration_1.csv.zip&amp;diff=107747</id>
		<title>File:OWASP Developer Outreach Iteration 1.csv.zip</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Developer_Outreach_Iteration_1.csv.zip&amp;diff=107747"/>
				<updated>2011-03-27T21:57:25Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Comma separated data from Developer Outreach, iteration 1.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Comma separated data from Developer Outreach, iteration 1.&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Developer_outreach_iteration_1.png&amp;diff=107746</id>
		<title>File:Developer outreach iteration 1.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Developer_outreach_iteration_1.png&amp;diff=107746"/>
				<updated>2011-03-27T21:54:25Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: uploaded a new version of &amp;amp;quot;File:Developer outreach iteration 1.png&amp;amp;quot;: Smaller size.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Diagram over categorized developer replies to the initial developer outreach.&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Developer_outreach_iteration_1.png&amp;diff=107745</id>
		<title>File:Developer outreach iteration 1.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Developer_outreach_iteration_1.png&amp;diff=107745"/>
				<updated>2011-03-27T21:53:00Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Diagram over categorized developer replies to the initial developer outreach.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Diagram over categorized developer replies to the initial developer outreach.&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Sweden&amp;diff=106657</id>
		<title>Sweden</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Sweden&amp;diff=106657"/>
				<updated>2011-03-11T13:31:06Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Added links to Mario's two slidesets&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Sweden|extra=The chapter co-leaders are [mailto:John.Wilander@owasp.org John Wilander], [mailto:Mattias.Bergling@owasp.org Mattias Bergling], and [mailto:Robert.Malmgren@owasp.org Robert Malmgren]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Sweden&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
&lt;br /&gt;
== The OWASP Sweden blog ==&lt;br /&gt;
&lt;br /&gt;
For lengthy news and event reports please visit the [http://owaspsweden.blogspot.com/ OWASP Sweden blog] (in Swedish).&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, March 7 2011, &amp;quot;Security impact of SVG&amp;quot; + &amp;quot;&amp;quot;ECMA Script 5, a frozen DOM and the eradication of XSS'''&lt;br /&gt;
Mario Heiderich works as a researcher for the Ruhr-University in Bochum, Germany and currently focuses on HTML5, SVG security and security implications of the ES5 specification draft while finishing his PhD thesis.&lt;br /&gt;
&lt;br /&gt;
We're very happy to invite Mario to OWASP Sweden in March. His two talks will be given in English at Royal Institute of Technology (KTH).&lt;br /&gt;
&lt;br /&gt;
Get your ticket now at [http://marioheiderich.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mario's slides:&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Mario_Heiderich_OWASP_Sweden_The_image_that_called_me.pdf‎]] &amp;quot;The Image That Called Me&amp;quot; on SVG security&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Mario_Heiderich_OWASP_Sweden_Locking_the_throneroom.pdf‎]] &amp;quot;Locking the Throneroom&amp;quot; on locking the DOM to eradicate XSS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Jan 31 2011, &amp;quot;HTTP-säkerhet&amp;quot;'''&lt;br /&gt;
Daniel Stenberg, Martin Holst Swende, and John Wilander will give talks for OWASP Sweden on Jan 31, 5:30 pm - 21 pm. The topics are Websockets, the new Cookie RFC, Content Security Policy, HTTP Strict Transport Security, and X-Frame-Options. We will be in lecture hall &amp;quot;New York&amp;quot;, World Trade Center, Stockholm ([http://www.hitta.se/SearchMixed.aspx?vad=world%20trade%20center&amp;amp;var=stockholm map]).&lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers.&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden reaches 500 members ... and gets three leaders'''&lt;br /&gt;
OWASP Sweden now has a stunning 500 members on the mailing list. From now the chapter will be lead by three co-leaders: John Wilander, Mattias Bergling, and Robert Malmgren.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden invites Samy Kamkar, October 4, 2010'''&lt;br /&gt;
Samy Kamkar, famous for the [http://en.wikipedia.org/wiki/Samy_(XSS) Samy XSS attack on MySpace] in 2005 will be giving a talk for OWASP Sweden on October 4, 5:30 pm - 22 pm. We will be in Ljusgården, Årstaängsvägen 19, Marievik/Liljeholmen, Stockholm ([http://www.hitta.se/LargeMap.aspx?var=%c5rsta%e4ngsv%e4gen+19%2c+Liljeholmen%2fMarievik%2c+Stockholm map]).&lt;br /&gt;
&lt;br /&gt;
Nexus Safe and Data@UrService are sponsors and there will be lighter food and beers.&lt;br /&gt;
&lt;br /&gt;
[[Media:OWASP_Sweden_Samy_Kamkar_oktober_2010.pdf]]&lt;br /&gt;
&lt;br /&gt;
Go to [http://samykamkar.eventbrite.com/ EventBrite] and register for free now!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden + FOSS Sthlm &amp;quot;Community Hack&amp;quot; September 4-5 2010'''&lt;br /&gt;
The first weekend of September OWASP Sweden together with FOSS Sthlm invite our members to Community Hack II in Stockholm. A full weekend of hacking on open projects, testing new security hacks, trying out tools (for instance the favorite OWASP tool you've always wanted to learn), or writing new, open guidelines.&lt;br /&gt;
&lt;br /&gt;
Go to [http://communityhack2.eventbrite.com/ EventBrite] and register for free now!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP AppSec Research 2010 in Stockholm, June 21-24 2010'''&lt;br /&gt;
June 21-24, 2010 appsec people will meet in beautiful Stockholm, Sweden. The OWASP chapters in Sweden, Norway, and Denmark together with Stockholm University host the [http://www.owasp.org/index.php/OWASP_AppSec_Research_2010_-_Stockholm,_Sweden OWASP AppSec Research 2010].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting January 21st 2010 -- The Big Protocols'''&lt;br /&gt;
Stiftelsen för Internetinfrastruktur (.SE) and Swedish Network Users' Society (SNUS) invite us to three seminars on the big protocols: BGP, DNSSEC, and SSL/TLS.&lt;br /&gt;
&lt;br /&gt;
Program and invitation (in Swedish): [[File:OWASP_Sweden_-_De_stora_protokollen_2010-01-21.pdf]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting December 2nd 2009 -- OWASP Top 10 2010 (rc1)'''&lt;br /&gt;
Omegapoint invites us to discuss the release candidate of OWASP Top 10 2010 that was presented at OWASP AppSec DC November 13th. The invitation in Swedish is found [[File:OWASP_Sweden_Top_10_december_2009.pdf | here]]. &lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@owasp.org) no later than November 23rd to say you're coming.''' Seats usually fill up fast.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP AppSec Research 2010, June 21-24 in Stockholm, Sweden'''&lt;br /&gt;
OWASP Sweden, Norway, and Denmark invite you to OWASP AppSec Research 2010, June 21-24 in Stockholm. Read more on the [https://www.owasp.org/index.php/OWASP_AppSec_Research_2010_-_Stockholm%2C_Sweden conference wiki page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting April 28th 2009 -- Code Analysis and Review'''&lt;br /&gt;
&lt;br /&gt;
The second chapter meeting of 2009 will be held on Tuesday April 28th at Clarion Hotel Stockholm. The focus is code analysis and code review. Fortify sponsors the event and welcome the chapter members to refreshments, starting at 17.30.&lt;br /&gt;
&lt;br /&gt;
The program:&lt;br /&gt;
&lt;br /&gt;
* Fredrik Möller (Fortify) will biefly present Fortify and their support of OWASP&lt;br /&gt;
* David Anumudu (Fortify) will present and do a live demo of Fortify Solution&lt;br /&gt;
* James Dickson (Simovits Consulting) will give a talk on code review&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@omegapoint.se) no later than April 23rd to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting March 26th 2009 -- XSS &amp;amp; CSRF'''&lt;br /&gt;
&lt;br /&gt;
The first meeting of 2009 will be held Thursday March 26th at LabCenter, Oxtorgsgränd 2, Stockholm. The focus is cross-site scripting and cross-site request forgery, attacks and countermeasures. Inspect it and LabCenter sponsor the event and welcome the chapter members to refreshments, starting at 17.00.&lt;br /&gt;
&lt;br /&gt;
The program:&lt;br /&gt;
&lt;br /&gt;
* Hasain Alshakarti, TrueSec: &amp;quot;XSS &amp;amp; CSRF -- A Deadly Cocktail&amp;quot;&lt;br /&gt;
* Sergio Molero, Concrete IT: &amp;quot;Skydd mot XSS och CSRF&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Mattias Bergling (mattias.bergling@inspectit.se) no later than March 23rd to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting November 19th 2008 -- PCI DSS'''&lt;br /&gt;
&lt;br /&gt;
The next chapter meeting is Wednesday November 19th. The focus of the seminars is on PCI-DSS, i.e. security in payment card handling on the Internet. &lt;br /&gt;
The program:&lt;br /&gt;
* Mats Henriksson, Pan Nordic Card Assoc: &amp;quot;PCI DSS - Tre goda anledningar&amp;quot;&lt;br /&gt;
* Pål Göran Stensson, Defensor Sverige AB: &amp;quot;PCI DSS - Externa krav och konsulten&amp;quot;&lt;br /&gt;
* Bengt Berg, Cybercom Sweden East AB: &amp;quot;Olika angreppssätt på PCI DSS&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''The meeting is fully booked. But do send an email to John Wilander (john.wilander@omegapoint.se) to say you're interested and we'll let you know if seats become available.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Hosts the OWASP AppSec Europe Conference 2010'''&lt;br /&gt;
&lt;br /&gt;
We're hosting the European OWASP AppSec conference in 2010! Please read the [http://www.owasp.org/index.php/OWASP_AppSec_Europe_2010_-_Sweden announcement].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting October 6th 2008 -- Security in the Open Source Process'''&lt;br /&gt;
&lt;br /&gt;
The next chapter meeting is Monday October 6th at Clarion Hotel Stockholm (Skanstull). The focus of the seminars will be on &amp;quot;Security in the Open Source Process&amp;quot;. Refreshments will be served from 16:30 and the seminars will commence at 17:30. Except for a closing panel discussion the program contains the following:&lt;br /&gt;
&lt;br /&gt;
* Simon Josefsson, SJD: ”Anekdoter och lärdomar från granskning av säkerhetsprogram”&lt;br /&gt;
* Daniel Stenberg, daniel.haxx.se: ”Säker kod och utveckling i cURL-projektet”&lt;br /&gt;
* Anders Karlsson, MySQL och Sun Microsystems: ”MySQL: Säkerhet i ett kommersiellt open source-projekt”&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Robert Malmgren (anmalan@romab.com) no later than September 29th to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting May 27th 2008 - SQL Injection, Web Scarab'''&lt;br /&gt;
&lt;br /&gt;
OWASP-Sweden welcomes its members to the next chapter meeting - Tuesday May 27th at Clarion Hotel Stockholm. Refreshments will be served from 17:00, demos will be shown from 17:30, and the seminars will commence at 18:00. The main attractions are:&lt;br /&gt;
 &lt;br /&gt;
* Patrik Karlson, Inspect it: &amp;quot;SQL injection, identifiering och utnyttjande&amp;quot;&lt;br /&gt;
* Johannes Gumbel, TrueSec: &amp;quot;WebScarab—funktioner, fördelar och nackdelar&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Mattias Bergling (mattias.bergling@inspectit.se) no later than May 21st to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Kick-Off Meeting for OWASP-Sweden April 1st 2008'''&lt;br /&gt;
&lt;br /&gt;
The OWASP-Sweden kick-off will be held at WTC in Stockholm on April 1st. Yeah, it's April Fool's Day but we go under the tagline &amp;quot;Application Security is Not a Joke&amp;quot;. The presentation program includes:&lt;br /&gt;
&lt;br /&gt;
* Andrei Sabelfeld, well-known security researcher from Chalmers&lt;br /&gt;
* Michael Anderberg, Chief Security Advisor at Microsoft Sweden&lt;br /&gt;
* Per Mellstrand, software analyst at Sony Ericsson and researcher at Blekinge Institute of Technology&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@omegapoint.se) no later than March 27 to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
We're kicking off!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden in Computer Sweden - 08:44, 19 Dec 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Today the Swedish national IT newspaper 'Computer Sweden' published an article on the new OWASP-Sweden chapter - [http://computersweden.idg.se/2.2683/1.137387 ''Mecka för säker programmering till Sverige''], or ''A Mecka for Secure Programming Reaches Sweden'' in English. While OWASP is more than a programmer's guide, Mattias Bergling and I are very happy to get the news out to a large part of Sweden's IT industry.&lt;br /&gt;
&lt;br /&gt;
'''To become a member of Owasp-Sweden just join the [http://lists.owasp.org/mailman/listinfo/owasp-sweden mailing list].'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden opens! - 22:25, 01 Oct 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Finally, Sweden has joined the OWASP movement and John Wilander, the local chapter leader, welcomes members to the Stockholm-based OWASP-Sweden. Please, join our mailing list. Plans for meetings and seminars will be made.&lt;br /&gt;
&lt;br /&gt;
Are you interested in helping out? Do you have ideas for great invited speakers or workshop meetings? Feel free to contact the chapter.&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Mario_Heiderich_OWASP_Sweden_Locking_the_throneroom.pdf&amp;diff=106656</id>
		<title>File:Mario Heiderich OWASP Sweden Locking the throneroom.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Mario_Heiderich_OWASP_Sweden_Locking_the_throneroom.pdf&amp;diff=106656"/>
				<updated>2011-03-11T13:26:11Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Mario Heiderich's talk on locking the DOM to eradicate XSS at OWASP Sweden, March 7, 2011.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Mario Heiderich's talk on locking the DOM to eradicate XSS at OWASP Sweden, March 7, 2011.&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Mario_Heiderich_OWASP_Sweden_The_image_that_called_me.pdf&amp;diff=106655</id>
		<title>File:Mario Heiderich OWASP Sweden The image that called me.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Mario_Heiderich_OWASP_Sweden_The_image_that_called_me.pdf&amp;diff=106655"/>
				<updated>2011-03-11T13:24:44Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Mario Heiderich's talk on SVG security at OWASP Sweden March 7, 2011.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Mario Heiderich's talk on SVG security at OWASP Sweden March 7, 2011.&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASPSummit2011EnduserWarningsBrowserSecurityTrack.pdf&amp;diff=105765</id>
		<title>File:OWASPSummit2011EnduserWarningsBrowserSecurityTrack.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASPSummit2011EnduserWarningsBrowserSecurityTrack.pdf&amp;diff=105765"/>
				<updated>2011-02-24T21:49:18Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: uploaded a new version of &amp;amp;quot;File:OWASPSummit2011EnduserWarningsBrowserSecurityTrack.pdf&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASPSummit2011EnduserWarningsBrowserSecurityTrack.pdf&amp;diff=105748</id>
		<title>File:OWASPSummit2011EnduserWarningsBrowserSecurityTrack.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASPSummit2011EnduserWarningsBrowserSecurityTrack.pdf&amp;diff=105748"/>
				<updated>2011-02-24T18:31:05Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: uploaded a new version of &amp;amp;quot;File:OWASPSummit2011EnduserWarningsBrowserSecurityTrack.pdf&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Summit_2011_Browser_Security_Track&amp;diff=105747</id>
		<title>Category:Summit 2011 Browser Security Track</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Summit_2011_Browser_Security_Track&amp;diff=105747"/>
				<updated>2011-02-24T18:29:32Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Added Enduser Warnings notes&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:T._browser_security.jpg]]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Google-groups-logo-1.jpg|link=https://groups.google.com/group/owasp-summit-browsersec]][https://groups.google.com/group/owasp-summit-browsersec Join the Google Group for this track]&amp;lt;br&amp;gt;&lt;br /&gt;
==== About  ====&lt;br /&gt;
The Browser Security track of the OWASP Summit 2011 was an initial community effort to bring together browser vendors, major web app providers, well-known white hat hackers, and OWASP leaders to discuss what can be done to enhance web security through the browser. The track comprised of two half-day day workshops on chosen subtopics (see tabs). We invited some of the world's top experts to maximize the chances of moving forward this important area or application security.&lt;br /&gt;
&lt;br /&gt;
===Session Notes===&lt;br /&gt;
Here are the notes from all the four browser security sessions. Later on we will publish a Browser Security Report building on these sessions.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/6/6d/OWASPSummit2011SiteSecurityPolicyBrowserSecurityTrack.pdf Site Security Policy notes (pdf)]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/0/06/OWASPSummit2011DOMSandboxingBrowserSecurityTrack.pdf DOM Sandboxing notes (pdf)]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/c/cd/OWASPSummit2011HTML5SecurityBrowserSecurityTrack.pdf HTML5 Security notes (pdf)]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/f/f7/OWASPSummit2011EcmaScript5SecurityBrowserSecurityTrack.pdf EcmaScript 5 Security notes (pdf)]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/f/f7/OWASPSummit2011EnduserWarningsBrowserSecurityTrack.pdf Enduser Warnings notes (pdf)]&lt;br /&gt;
&lt;br /&gt;
===Who Participated?===&lt;br /&gt;
The following browser, major web app, and plugin vendors participated in the browser security sessions:&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.google.com/chrome http://www.owasp.org/images/f/f6/Chrome_small.jpg]&lt;br /&gt;
[http://www.mozilla.com/en-US/firefox/ http://www.owasp.org/images/4/47/Firefox_small.jpg]&lt;br /&gt;
[http://ie.microsoft.com/testdrive/info/downloads/Default.html http://www.owasp.org/images/6/62/Internet_explorer_small.jpg]&lt;br /&gt;
[http://www.paypal.com https://www.owasp.org/images/c/c9/Paypal_logo.gif]&lt;br /&gt;
[http://www.adobe.com http://www.owasp.org/images/8/87/Adobe_logo_standard_for_Tasha.jpg]&lt;br /&gt;
&lt;br /&gt;
/John Wilander, Session Chair&lt;br /&gt;
==== DOM Sandboxing ====&lt;br /&gt;
===Virtualization and Sandboxing for Secure Multi-Domain Web Apps===&lt;br /&gt;
&lt;br /&gt;
[[Image:JS_DOM_Box_Jasvir_Gaz.jpg]]&lt;br /&gt;
&lt;br /&gt;
===Co-chair Dr Jasvir Nagra===&lt;br /&gt;
Jasvir Nagra is a researcher and software engineer at Google. He is the designer of [http://code.google.com/p/google-caja/ Caja] - a secure subset of HTML, CSS and JavaScript; co-author of [http://www.amazon.com/Surreptitious-Software-Obfuscation-Watermarking-Tamperproofing/dp/0321549252 Surreptitious Software] - a book on obfuscation, software watermarking and tamper-proofing, contributer to [http://shindig.apache.org/ Shindig] - the reference implementation of OpenSocial.&lt;br /&gt;
&lt;br /&gt;
===Co-chair Gareth Heyes===&lt;br /&gt;
Gareth &amp;quot;Gaz&amp;quot; Heyes calls himself Chief Conspiracy theorist and is affiliated with Microsoft. He is the designer and developer behind [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=JSReg JSReg] – a Javascript sandbox which converts code using regular expressions; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=HTMLReg HTMLReg] &amp;amp; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=CSSReg CSSReg] – converters of malicious HTML/CSS into a safe form of HTML. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
===Subjects and Goals (draft)===&lt;br /&gt;
Goals and issues that need browser vendor cooperation:&lt;br /&gt;
* '''Attenuated versions of existing apis to sandboxed code'''. How should browsers introduce new apis into the sandbox or allow the sandbox to provide attenuated versions of existing apis to sandboxed code? For example, lets say the sandbox wants to provide an attenuated &amp;quot;alert&amp;quot; function to sandboxed code which does something slightly different than the real &amp;quot;alert&amp;quot;. What kind of apis could the browser provide to safely allow such extensions/apis? Do these need to be standardized such that different sandbox vendors can interoperate.&lt;br /&gt;
* '''Client side sandboxed apps maintaining state and authentication'''. For example if a user is created in a sandboxed app how is it determined what that user can do?&lt;br /&gt;
* '''Create a standard for modifying a sandboxed environment'''&lt;br /&gt;
* '''Deprecate and discourage standards''' which ambiently or undeniably pass credentials. &lt;br /&gt;
* '''Adopt a simpler rights amplification api''' like [http://web-send.org/introducer Web Introducer]&lt;br /&gt;
* '''Create a standard for authentication within a sandboxed environment''' (maybe interfacing with existing auth without passing creds like 0Auth works)&lt;br /&gt;
&lt;br /&gt;
===Working Form===&lt;br /&gt;
The working form will most probably be short presentations to frame the topic and then round table discussions. Depending on number of attendees we'll break into groups.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== HTML5 ====&lt;br /&gt;
===HTML5 Security===&lt;br /&gt;
[[Image:Html5_mario_hackvertor.jpg‎‎]]&lt;br /&gt;
&lt;br /&gt;
===Co-chair Mario Heiderich===&lt;br /&gt;
Mario Heiderich works as a researcher for the Ruhr-University in Bochum, Germany and currently focuses on HTML5, SVG security and security implications of the ES5 specification draft. Mario invoked the [http://html5sec.org/ HTML5 security cheat-sheet] and maintains the [http://php-ids.org/ PHPIDS filter rules]. In his spare time he delivers trainings and security consultancy for larger German and international companies. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
===Co-chair Gareth Heyes===&lt;br /&gt;
Gareth &amp;quot;Gaz&amp;quot; Heyes calls himself Chief Conspiracy theorist and is affiliated with Microsoft. He is the designer and developer behind [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=JSReg JSReg] – a Javascript sandbox which converts code using regular expressions; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=HTMLReg HTMLReg] &amp;amp; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=CSSReg CSSReg] – converters of malicious HTML/CSS into a safe form of HTML. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
===Subjects and Goals (draft)===&lt;br /&gt;
* '''Handle autofocus in a unified and secure way'''. Make sure SOP applies for autofocus usage in frame/iframe'd websites. Re-discuss necessity for (future) attributes like this.&lt;br /&gt;
* '''Discuss necessity and capability for the HTML5 form controls'''. Do we need a non-SOP formaction attribute and why? &lt;br /&gt;
* '''Goal I''': Initiate and create documentation and references for developers that address security issues. Html5sec.org is a start but impossible to continue or extend large scale without vendor help&lt;br /&gt;
* '''Goal II''': Discuss and heavily restrict SVG capabilities - especially when deployed in CSS backgrounds and &amp;lt;img&amp;gt; tags. Mainly Opera and Mozilla are addressed here.&lt;br /&gt;
* '''Long Term Goal(s)''': Provide a working and easy to use as well as vendor supported HTML5 compliant filter software such as HTMLPurifier. Browser vendors should participate in creating security software and filters - not undermine them as we could experience in the last decade&lt;br /&gt;
&lt;br /&gt;
==== EcmaScript 5====&lt;br /&gt;
=== EcmaScript 5 Security ===&lt;br /&gt;
&lt;br /&gt;
===Co-chair Mario Heiderich===&lt;br /&gt;
Mario Heiderich works as a researcher for the Ruhr-University in Bochum, Germany and currently focuses on HTML5, SVG security and security implications of the ES5 specification draft. Mario invoked the [http://html5sec.org/ HTML5 security cheat-sheet] and maintains the [http://php-ids.org/ PHPIDS filter rules]. In his spare time he delivers trainings and security consultancy for larger German and international companies. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
===Co-chair 2===&lt;br /&gt;
To be confirmed.&lt;br /&gt;
&lt;br /&gt;
===Subjects and Goals (draft)===&lt;br /&gt;
* '''Fix the problems with Object.defineProperty() and property unsealing / [https://bugzilla.mozilla.org/show_bug.cgi?id=588138 double-freezing]'''. Implement it if not yet done.&lt;br /&gt;
* '''Goal I''': Raise awareness for the power or object freezing in a security context. ES5 can really make a change here.&lt;br /&gt;
* '''Goal II''': Raise awareness in seeing the DOM as the place where XSS attacks actually take place - and where they should be prevented. CSP is a great yet still immature start - but worth discussing and extending. Discuss specification drafts for a secure DOM and easy to configure capability profiles with reasonable and quantitative proofs of concept.&lt;br /&gt;
* '''Long Term Goal''': Discuss the possibility of vendor supported client side security mechanisms. Client side IDS/IPS based on ES5 can be possible - yet have to be designed and specified. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Site Security Policy ====&lt;br /&gt;
There are several initiatives for expressing and enforcing website security policies. [http://tools.ietf.org/html/draft-hodges-strict-transport-sec-02 HTTP Strict Transport Security] for enforced TLS. [https://developer.mozilla.org/en/Introducing_Content_Security_Policy Content Security Policy] for whitelisting resource domains and enforcing file-only JavaScript. [http://blogs.msdn.com/b/ie/archive/2009/01/27/ie8-security-part-vii-clickjacking-defenses.aspx X-Frame-Options] for enforce framing restrictions. Harmonizing these features among browsers is a huge task. Getting developers to adopt and implement is even more challenging. This session will try to address all of these questions as well as the technical alternatives – headers, meta tags, nonces, signatures, html zones, css-like policies, violation events etc.&lt;br /&gt;
&lt;br /&gt;
* Should we have independent, coherent and simple policy mechanisms or a generalized, extensible policy mechanism?&lt;br /&gt;
* Should developers have multiple choices for expressing policies such as headers ''and'' meta tags?&lt;br /&gt;
* Should policies restrict domains, URLs, or elements? What are the consequences?&lt;br /&gt;
* Should one or two browser vendors deploy a policy mechanism in the field, collect experience, and then we set a standard?&lt;br /&gt;
* How do we help developers understand the need for policies and how do we help them write/generate/maintain policies?&lt;br /&gt;
* How important is performance and web 1.0/web 2.0 compliance? How much of the web can we afford to break? 0 %?&lt;br /&gt;
&lt;br /&gt;
===Co-chair Jeff Hodges===&lt;br /&gt;
Jeff Hodges is Distinguished Security Engineer at PayPal, Inc and one of the three original authors of the [http://tools.ietf.org/html/draft-hodges-strict-transport-sec-02 HTTP Strict Transport Security] spec. Check out [http://identitymeme.org/ IdentityMeme.org Jeff's blog].&lt;br /&gt;
&lt;br /&gt;
===Co-chair David Ross===&lt;br /&gt;
David Ross is a Principal Security Software Engineer on the MSRC Engineering team at Microsoft. Prior to joining MSRC Engineering in 2002, David spent his formative years on the Internet Explorer Security Team and wears the battle scars with pride. Check out [http://blogs.msdn.com/dross David’s blog].&lt;br /&gt;
&lt;br /&gt;
===Co-chair Lucas Adamski===&lt;br /&gt;
Lucas Adamski is the Director of Security Engineering at Mozilla Corporation. He specializes in penetration testing, incident response, spec and code reviews, fuzzing, training, security processes and software PLC. Check out [http://blog.mozilla.com/ladamski/ Lucas' blog].&lt;br /&gt;
&lt;br /&gt;
==== Enduser Warnings ====&lt;br /&gt;
===Enduser Warnings===&lt;br /&gt;
[[Image:Three_browsers_user_info.jpg]]&lt;br /&gt;
&lt;br /&gt;
===Subjects and Goals (draft)===&lt;br /&gt;
Clearly there is a need for warnings that users understand and that conveys the right information. Perhaps we can agree on some guidelines or at least exchange lessons learned.&lt;br /&gt;
&lt;br /&gt;
* How should browsers signal invalid SSL certs to the enduser? Are we helping security right now? What to do about 50 % of users clicking through warnings? Mozilla replaces the padlock with a [https://support.mozilla.com/en-US/kb/Site%20Identity%20Button site identity button] i Firefox 4. &amp;quot;Larry&amp;quot; will inform the user of the site's status. Google recently tried out a skull &amp;amp; bones icon for bad certs but moved back to [http://www.google.com/support/chrome/bin/answer.py?hl=en&amp;amp;answer=95617 padlocks] again.&lt;br /&gt;
* How should browsers communicate other kinds of information such as privacy, malware warnings, &amp;quot;not visited before&amp;quot; etc? Forbes had an interesting example of [http://blogs.forbes.com/kashmirhill/2011/01/05/visualizing-better-privacy-policies/?boxes=Homepagechannels how to visualize privacy].&lt;br /&gt;
&lt;br /&gt;
Some additional information, thoughts and discussions on these subjects elsewhere:&lt;br /&gt;
&lt;br /&gt;
* [http://www.freedom-to-tinker.com/blog/sjs/web-browser-security-user-interfaces-hard-get-right-and-increasingly-inconsistent Web Browser Security User Interfaces: Hard to Get Right and Increasingly Inconsistent], Freedom to Tinker, 18 Jan 2011&lt;br /&gt;
* [http://intrepidusgroup.com/insight/2010/04/security-dialogs-and-graphics/ Security Dialogs and Graphics], Insight, 27 Apr 2010&lt;br /&gt;
* [http://www.w3.org/TR/wsc-ui/ Web Security Context: User Interface Guidelines], W3C, 12 Aug 2010&lt;br /&gt;
* [http://www.clerkendweller.com/2009/7/28/Colour-Overload-with-IE8-Tab-Grouping Colour Overload with IE8 Tab Grouping], Clerkendweller, 28 Jul 2009&lt;br /&gt;
* [http://www.usablesecurity.org/emperor/ The Emperor's New Security Indicators: An evaluation of website authentication and the effect of role playing on usability studies], IEEE Symposium on Security and Privacy, May 2007&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Securing Plugins ====&lt;br /&gt;
===Securing Plugins===&lt;br /&gt;
Should browsers ship with default plugins? Should plugins be auto-updated? Can plugins or versions of plugins be blacklisted centrally?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Blacklisting ====&lt;br /&gt;
===Blacklisting===&lt;br /&gt;
Can we cooperate better on blacklisting? Does it work between cultures, i e can we have the same process for reporting throughout the world?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== OS Integration ====&lt;br /&gt;
===OS Integration===&lt;br /&gt;
More and more features in browsers get integrated with the underlying operating system. Processes, fonts, filesystem, 3D graphics. How do we secure this?&lt;br /&gt;
&lt;br /&gt;
==== Sandboxed Browser ====&lt;br /&gt;
=== Sandboxed Tabs/Domains/Browser ===&lt;br /&gt;
Microsoft Research has been doing some groundbreaking work on the [http://research.microsoft.com/apps/pubs/default.aspx?id=79655 Gazelle browser], Chrome uses a sandboxing model, and the [http://www.romab.com/ironsuite/ IronSuite] provides sandboxed versions of Firefox ([http://www.romab.com/ironfox/ IronFox]) and Safari on Mac OS X.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Questions? Contact [mailto:john.wilander@owasp.org John Wilander, Session Chair]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[Summit_2011|'''Return Global Summit 2011 Home Page''']]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:Category:Summit_2011_Tracks|'''Return to Global Summit 2011 Working Sessions''']]&lt;br /&gt;
&lt;br /&gt;
[[Category:Summit_2011]]&lt;br /&gt;
[[Category: Summit 2011 Tracks]]&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASPSummit2011EnduserWarningsBrowserSecurityTrack.pdf&amp;diff=105746</id>
		<title>File:OWASPSummit2011EnduserWarningsBrowserSecurityTrack.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASPSummit2011EnduserWarningsBrowserSecurityTrack.pdf&amp;diff=105746"/>
				<updated>2011-02-24T18:28:14Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASPSummit2011DOMSandboxingBrowserSecurityTrack.pdf&amp;diff=105745</id>
		<title>File:OWASPSummit2011DOMSandboxingBrowserSecurityTrack.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASPSummit2011DOMSandboxingBrowserSecurityTrack.pdf&amp;diff=105745"/>
				<updated>2011-02-24T18:01:47Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: uploaded a new version of &amp;amp;quot;File:OWASPSummit2011DOMSandboxingBrowserSecurityTrack.pdf&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASPSummit2011HTML5SecurityBrowserSecurityTrack.pdf&amp;diff=105744</id>
		<title>File:OWASPSummit2011HTML5SecurityBrowserSecurityTrack.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASPSummit2011HTML5SecurityBrowserSecurityTrack.pdf&amp;diff=105744"/>
				<updated>2011-02-24T18:00:50Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: uploaded a new version of &amp;amp;quot;File:OWASPSummit2011HTML5SecurityBrowserSecurityTrack.pdf&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASPSummit2011SiteSecurityPolicyBrowserSecurityTrack.pdf&amp;diff=105743</id>
		<title>File:OWASPSummit2011SiteSecurityPolicyBrowserSecurityTrack.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASPSummit2011SiteSecurityPolicyBrowserSecurityTrack.pdf&amp;diff=105743"/>
				<updated>2011-02-24T18:00:14Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: uploaded a new version of &amp;amp;quot;File:OWASPSummit2011SiteSecurityPolicyBrowserSecurityTrack.pdf&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASPSummit2011EcmaScript5SecurityBrowserSecurityTrack.pdf&amp;diff=105742</id>
		<title>File:OWASPSummit2011EcmaScript5SecurityBrowserSecurityTrack.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASPSummit2011EcmaScript5SecurityBrowserSecurityTrack.pdf&amp;diff=105742"/>
				<updated>2011-02-24T17:59:40Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: uploaded a new version of &amp;amp;quot;File:OWASPSummit2011EcmaScript5SecurityBrowserSecurityTrack.pdf&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Summit_2011_Browser_Security_Track&amp;diff=105741</id>
		<title>Category:Summit 2011 Browser Security Track</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Summit_2011_Browser_Security_Track&amp;diff=105741"/>
				<updated>2011-02-24T17:53:57Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Added raw notes from all four browser security sessions&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:T._browser_security.jpg]]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Google-groups-logo-1.jpg|link=https://groups.google.com/group/owasp-summit-browsersec]][https://groups.google.com/group/owasp-summit-browsersec Join the Google Group for this track]&amp;lt;br&amp;gt;&lt;br /&gt;
==== About  ====&lt;br /&gt;
The Browser Security track of the OWASP Summit 2011 was an initial community effort to bring together browser vendors, major web app providers, well-known white hat hackers, and OWASP leaders to discuss what can be done to enhance web security through the browser. The track comprised of two half-day day workshops on chosen subtopics (see tabs). We invited some of the world's top experts to maximize the chances of moving forward this important area or application security.&lt;br /&gt;
&lt;br /&gt;
===Session Notes===&lt;br /&gt;
Here are the notes from all the four browser security sessions. Later on we will publish a Browser Security Report building on these sessions.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/6/6d/OWASPSummit2011SiteSecurityPolicyBrowserSecurityTrack.pdf Site Security Policy notes (pdf)]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/0/06/OWASPSummit2011DOMSandboxingBrowserSecurityTrack.pdf DOM Sandboxing notes (pdf)]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/c/cd/OWASPSummit2011HTML5SecurityBrowserSecurityTrack.pdf HTML5 Security notes (pdf)]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/f/f7/OWASPSummit2011EcmaScript5SecurityBrowserSecurityTrack.pdf EcmaScript 5 Security notes (pdf)]&lt;br /&gt;
&lt;br /&gt;
===Who Participated?===&lt;br /&gt;
The following browser, major web app, and plugin vendors participated in the browser security sessions:&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.google.com/chrome http://www.owasp.org/images/f/f6/Chrome_small.jpg]&lt;br /&gt;
[http://www.mozilla.com/en-US/firefox/ http://www.owasp.org/images/4/47/Firefox_small.jpg]&lt;br /&gt;
[http://ie.microsoft.com/testdrive/info/downloads/Default.html http://www.owasp.org/images/6/62/Internet_explorer_small.jpg]&lt;br /&gt;
[http://www.paypal.com https://www.owasp.org/images/c/c9/Paypal_logo.gif]&lt;br /&gt;
[http://www.adobe.com http://www.owasp.org/images/8/87/Adobe_logo_standard_for_Tasha.jpg]&lt;br /&gt;
&lt;br /&gt;
/John Wilander, Session Chair&lt;br /&gt;
==== DOM Sandboxing ====&lt;br /&gt;
===Virtualization and Sandboxing for Secure Multi-Domain Web Apps===&lt;br /&gt;
&lt;br /&gt;
[[Image:JS_DOM_Box_Jasvir_Gaz.jpg]]&lt;br /&gt;
&lt;br /&gt;
===Co-chair Dr Jasvir Nagra===&lt;br /&gt;
Jasvir Nagra is a researcher and software engineer at Google. He is the designer of [http://code.google.com/p/google-caja/ Caja] - a secure subset of HTML, CSS and JavaScript; co-author of [http://www.amazon.com/Surreptitious-Software-Obfuscation-Watermarking-Tamperproofing/dp/0321549252 Surreptitious Software] - a book on obfuscation, software watermarking and tamper-proofing, contributer to [http://shindig.apache.org/ Shindig] - the reference implementation of OpenSocial.&lt;br /&gt;
&lt;br /&gt;
===Co-chair Gareth Heyes===&lt;br /&gt;
Gareth &amp;quot;Gaz&amp;quot; Heyes calls himself Chief Conspiracy theorist and is affiliated with Microsoft. He is the designer and developer behind [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=JSReg JSReg] – a Javascript sandbox which converts code using regular expressions; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=HTMLReg HTMLReg] &amp;amp; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=CSSReg CSSReg] – converters of malicious HTML/CSS into a safe form of HTML. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
===Subjects and Goals (draft)===&lt;br /&gt;
Goals and issues that need browser vendor cooperation:&lt;br /&gt;
* '''Attenuated versions of existing apis to sandboxed code'''. How should browsers introduce new apis into the sandbox or allow the sandbox to provide attenuated versions of existing apis to sandboxed code? For example, lets say the sandbox wants to provide an attenuated &amp;quot;alert&amp;quot; function to sandboxed code which does something slightly different than the real &amp;quot;alert&amp;quot;. What kind of apis could the browser provide to safely allow such extensions/apis? Do these need to be standardized such that different sandbox vendors can interoperate.&lt;br /&gt;
* '''Client side sandboxed apps maintaining state and authentication'''. For example if a user is created in a sandboxed app how is it determined what that user can do?&lt;br /&gt;
* '''Create a standard for modifying a sandboxed environment'''&lt;br /&gt;
* '''Deprecate and discourage standards''' which ambiently or undeniably pass credentials. &lt;br /&gt;
* '''Adopt a simpler rights amplification api''' like [http://web-send.org/introducer Web Introducer]&lt;br /&gt;
* '''Create a standard for authentication within a sandboxed environment''' (maybe interfacing with existing auth without passing creds like 0Auth works)&lt;br /&gt;
&lt;br /&gt;
===Working Form===&lt;br /&gt;
The working form will most probably be short presentations to frame the topic and then round table discussions. Depending on number of attendees we'll break into groups.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== HTML5 ====&lt;br /&gt;
===HTML5 Security===&lt;br /&gt;
[[Image:Html5_mario_hackvertor.jpg‎‎]]&lt;br /&gt;
&lt;br /&gt;
===Co-chair Mario Heiderich===&lt;br /&gt;
Mario Heiderich works as a researcher for the Ruhr-University in Bochum, Germany and currently focuses on HTML5, SVG security and security implications of the ES5 specification draft. Mario invoked the [http://html5sec.org/ HTML5 security cheat-sheet] and maintains the [http://php-ids.org/ PHPIDS filter rules]. In his spare time he delivers trainings and security consultancy for larger German and international companies. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
===Co-chair Gareth Heyes===&lt;br /&gt;
Gareth &amp;quot;Gaz&amp;quot; Heyes calls himself Chief Conspiracy theorist and is affiliated with Microsoft. He is the designer and developer behind [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=JSReg JSReg] – a Javascript sandbox which converts code using regular expressions; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=HTMLReg HTMLReg] &amp;amp; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=CSSReg CSSReg] – converters of malicious HTML/CSS into a safe form of HTML. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
===Subjects and Goals (draft)===&lt;br /&gt;
* '''Handle autofocus in a unified and secure way'''. Make sure SOP applies for autofocus usage in frame/iframe'd websites. Re-discuss necessity for (future) attributes like this.&lt;br /&gt;
* '''Discuss necessity and capability for the HTML5 form controls'''. Do we need a non-SOP formaction attribute and why? &lt;br /&gt;
* '''Goal I''': Initiate and create documentation and references for developers that address security issues. Html5sec.org is a start but impossible to continue or extend large scale without vendor help&lt;br /&gt;
* '''Goal II''': Discuss and heavily restrict SVG capabilities - especially when deployed in CSS backgrounds and &amp;lt;img&amp;gt; tags. Mainly Opera and Mozilla are addressed here.&lt;br /&gt;
* '''Long Term Goal(s)''': Provide a working and easy to use as well as vendor supported HTML5 compliant filter software such as HTMLPurifier. Browser vendors should participate in creating security software and filters - not undermine them as we could experience in the last decade&lt;br /&gt;
&lt;br /&gt;
==== EcmaScript 5====&lt;br /&gt;
=== EcmaScript 5 Security ===&lt;br /&gt;
&lt;br /&gt;
===Co-chair Mario Heiderich===&lt;br /&gt;
Mario Heiderich works as a researcher for the Ruhr-University in Bochum, Germany and currently focuses on HTML5, SVG security and security implications of the ES5 specification draft. Mario invoked the [http://html5sec.org/ HTML5 security cheat-sheet] and maintains the [http://php-ids.org/ PHPIDS filter rules]. In his spare time he delivers trainings and security consultancy for larger German and international companies. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
===Co-chair 2===&lt;br /&gt;
To be confirmed.&lt;br /&gt;
&lt;br /&gt;
===Subjects and Goals (draft)===&lt;br /&gt;
* '''Fix the problems with Object.defineProperty() and property unsealing / [https://bugzilla.mozilla.org/show_bug.cgi?id=588138 double-freezing]'''. Implement it if not yet done.&lt;br /&gt;
* '''Goal I''': Raise awareness for the power or object freezing in a security context. ES5 can really make a change here.&lt;br /&gt;
* '''Goal II''': Raise awareness in seeing the DOM as the place where XSS attacks actually take place - and where they should be prevented. CSP is a great yet still immature start - but worth discussing and extending. Discuss specification drafts for a secure DOM and easy to configure capability profiles with reasonable and quantitative proofs of concept.&lt;br /&gt;
* '''Long Term Goal''': Discuss the possibility of vendor supported client side security mechanisms. Client side IDS/IPS based on ES5 can be possible - yet have to be designed and specified. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Site Security Policy ====&lt;br /&gt;
There are several initiatives for expressing and enforcing website security policies. [http://tools.ietf.org/html/draft-hodges-strict-transport-sec-02 HTTP Strict Transport Security] for enforced TLS. [https://developer.mozilla.org/en/Introducing_Content_Security_Policy Content Security Policy] for whitelisting resource domains and enforcing file-only JavaScript. [http://blogs.msdn.com/b/ie/archive/2009/01/27/ie8-security-part-vii-clickjacking-defenses.aspx X-Frame-Options] for enforce framing restrictions. Harmonizing these features among browsers is a huge task. Getting developers to adopt and implement is even more challenging. This session will try to address all of these questions as well as the technical alternatives – headers, meta tags, nonces, signatures, html zones, css-like policies, violation events etc.&lt;br /&gt;
&lt;br /&gt;
* Should we have independent, coherent and simple policy mechanisms or a generalized, extensible policy mechanism?&lt;br /&gt;
* Should developers have multiple choices for expressing policies such as headers ''and'' meta tags?&lt;br /&gt;
* Should policies restrict domains, URLs, or elements? What are the consequences?&lt;br /&gt;
* Should one or two browser vendors deploy a policy mechanism in the field, collect experience, and then we set a standard?&lt;br /&gt;
* How do we help developers understand the need for policies and how do we help them write/generate/maintain policies?&lt;br /&gt;
* How important is performance and web 1.0/web 2.0 compliance? How much of the web can we afford to break? 0 %?&lt;br /&gt;
&lt;br /&gt;
===Co-chair Jeff Hodges===&lt;br /&gt;
Jeff Hodges is Distinguished Security Engineer at PayPal, Inc and one of the three original authors of the [http://tools.ietf.org/html/draft-hodges-strict-transport-sec-02 HTTP Strict Transport Security] spec. Check out [http://identitymeme.org/ IdentityMeme.org Jeff's blog].&lt;br /&gt;
&lt;br /&gt;
===Co-chair David Ross===&lt;br /&gt;
David Ross is a Principal Security Software Engineer on the MSRC Engineering team at Microsoft. Prior to joining MSRC Engineering in 2002, David spent his formative years on the Internet Explorer Security Team and wears the battle scars with pride. Check out [http://blogs.msdn.com/dross David’s blog].&lt;br /&gt;
&lt;br /&gt;
===Co-chair Lucas Adamski===&lt;br /&gt;
Lucas Adamski is the Director of Security Engineering at Mozilla Corporation. He specializes in penetration testing, incident response, spec and code reviews, fuzzing, training, security processes and software PLC. Check out [http://blog.mozilla.com/ladamski/ Lucas' blog].&lt;br /&gt;
&lt;br /&gt;
==== Enduser Warnings ====&lt;br /&gt;
===Enduser Warnings===&lt;br /&gt;
[[Image:Three_browsers_user_info.jpg]]&lt;br /&gt;
&lt;br /&gt;
===Subjects and Goals (draft)===&lt;br /&gt;
Clearly there is a need for warnings that users understand and that conveys the right information. Perhaps we can agree on some guidelines or at least exchange lessons learned.&lt;br /&gt;
&lt;br /&gt;
* How should browsers signal invalid SSL certs to the enduser? Are we helping security right now? What to do about 50 % of users clicking through warnings? Mozilla replaces the padlock with a [https://support.mozilla.com/en-US/kb/Site%20Identity%20Button site identity button] i Firefox 4. &amp;quot;Larry&amp;quot; will inform the user of the site's status. Google recently tried out a skull &amp;amp; bones icon for bad certs but moved back to [http://www.google.com/support/chrome/bin/answer.py?hl=en&amp;amp;answer=95617 padlocks] again.&lt;br /&gt;
* How should browsers communicate other kinds of information such as privacy, malware warnings, &amp;quot;not visited before&amp;quot; etc? Forbes had an interesting example of [http://blogs.forbes.com/kashmirhill/2011/01/05/visualizing-better-privacy-policies/?boxes=Homepagechannels how to visualize privacy].&lt;br /&gt;
&lt;br /&gt;
Some additional information, thoughts and discussions on these subjects elsewhere:&lt;br /&gt;
&lt;br /&gt;
* [http://www.freedom-to-tinker.com/blog/sjs/web-browser-security-user-interfaces-hard-get-right-and-increasingly-inconsistent Web Browser Security User Interfaces: Hard to Get Right and Increasingly Inconsistent], Freedom to Tinker, 18 Jan 2011&lt;br /&gt;
* [http://intrepidusgroup.com/insight/2010/04/security-dialogs-and-graphics/ Security Dialogs and Graphics], Insight, 27 Apr 2010&lt;br /&gt;
* [http://www.w3.org/TR/wsc-ui/ Web Security Context: User Interface Guidelines], W3C, 12 Aug 2010&lt;br /&gt;
* [http://www.clerkendweller.com/2009/7/28/Colour-Overload-with-IE8-Tab-Grouping Colour Overload with IE8 Tab Grouping], Clerkendweller, 28 Jul 2009&lt;br /&gt;
* [http://www.usablesecurity.org/emperor/ The Emperor's New Security Indicators: An evaluation of website authentication and the effect of role playing on usability studies], IEEE Symposium on Security and Privacy, May 2007&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Securing Plugins ====&lt;br /&gt;
===Securing Plugins===&lt;br /&gt;
Should browsers ship with default plugins? Should plugins be auto-updated? Can plugins or versions of plugins be blacklisted centrally?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Blacklisting ====&lt;br /&gt;
===Blacklisting===&lt;br /&gt;
Can we cooperate better on blacklisting? Does it work between cultures, i e can we have the same process for reporting throughout the world?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== OS Integration ====&lt;br /&gt;
===OS Integration===&lt;br /&gt;
More and more features in browsers get integrated with the underlying operating system. Processes, fonts, filesystem, 3D graphics. How do we secure this?&lt;br /&gt;
&lt;br /&gt;
==== Sandboxed Browser ====&lt;br /&gt;
=== Sandboxed Tabs/Domains/Browser ===&lt;br /&gt;
Microsoft Research has been doing some groundbreaking work on the [http://research.microsoft.com/apps/pubs/default.aspx?id=79655 Gazelle browser], Chrome uses a sandboxing model, and the [http://www.romab.com/ironsuite/ IronSuite] provides sandboxed versions of Firefox ([http://www.romab.com/ironfox/ IronFox]) and Safari on Mac OS X.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Questions? Contact [mailto:john.wilander@owasp.org John Wilander, Session Chair]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[Summit_2011|'''Return Global Summit 2011 Home Page''']]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:Category:Summit_2011_Tracks|'''Return to Global Summit 2011 Working Sessions''']]&lt;br /&gt;
&lt;br /&gt;
[[Category:Summit_2011]]&lt;br /&gt;
[[Category: Summit 2011 Tracks]]&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASPSummit2011SiteSecurityPolicyBrowserSecurityTrack.pdf&amp;diff=105740</id>
		<title>File:OWASPSummit2011SiteSecurityPolicyBrowserSecurityTrack.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASPSummit2011SiteSecurityPolicyBrowserSecurityTrack.pdf&amp;diff=105740"/>
				<updated>2011-02-24T17:14:02Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASPSummit2011HTML5SecurityBrowserSecurityTrack.pdf&amp;diff=105739</id>
		<title>File:OWASPSummit2011HTML5SecurityBrowserSecurityTrack.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASPSummit2011HTML5SecurityBrowserSecurityTrack.pdf&amp;diff=105739"/>
				<updated>2011-02-24T17:13:14Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASPSummit2011EcmaScript5SecurityBrowserSecurityTrack.pdf&amp;diff=105738</id>
		<title>File:OWASPSummit2011EcmaScript5SecurityBrowserSecurityTrack.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASPSummit2011EcmaScript5SecurityBrowserSecurityTrack.pdf&amp;diff=105738"/>
				<updated>2011-02-24T17:12:41Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASPSummit2011DOMSandboxingBrowserSecurityTrack.pdf&amp;diff=105737</id>
		<title>File:OWASPSummit2011DOMSandboxingBrowserSecurityTrack.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASPSummit2011DOMSandboxingBrowserSecurityTrack.pdf&amp;diff=105737"/>
				<updated>2011-02-24T17:12:18Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Summit_2011_Browser_Security_Track&amp;diff=103663</id>
		<title>Category:Summit 2011 Browser Security Track</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Summit_2011_Browser_Security_Track&amp;diff=103663"/>
				<updated>2011-02-06T17:48:23Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Added David and Lucas as co-chairs for Site Content Security&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:T._browser_security.jpg]]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Google-groups-logo-1.jpg|link=https://groups.google.com/group/owasp-summit-browsersec]][https://groups.google.com/group/owasp-summit-browsersec Join the Google Group for this track]&amp;lt;br&amp;gt;&lt;br /&gt;
==== About  ====&lt;br /&gt;
The Browser Security track of the OWASP Summit 2011 is a community effort to bring together browser vendors, major web app providers, and OWASP leaders to discuss what can be done to enhance web security through the browser. The track comprises '''a full day of workshops on chosen subtopics''' (see below). We have invited some of the world's top experts to maximize the chances of moving forward this important area or application security.&lt;br /&gt;
&lt;br /&gt;
Browser vendors attending so far: [http://www.google.com/chrome http://www.owasp.org/images/f/f6/Chrome_small.jpg] [http://www.mozilla.com/en-US/firefox/ http://www.owasp.org/images/4/47/Firefox_small.jpg] [http://ie.microsoft.com/testdrive/info/downloads/Default.html http://www.owasp.org/images/6/62/Internet_explorer_small.jpg]&lt;br /&gt;
&lt;br /&gt;
Major web app providers attending so far: [http://www.paypal.com https://www.owasp.org/images/c/c9/Paypal_logo.gif] [http://www.facebook.com http://www.owasp.org/images/8/8f/Facebook_logo_small.jpg]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/group/owasp-summit-browsersec Join the Google Group for this track] today and get involved in planning, working forms etc.&lt;br /&gt;
&lt;br /&gt;
Welcome!&amp;lt;br&amp;gt;&lt;br /&gt;
/John Wilander, Session Chair&lt;br /&gt;
==== DOM Sandboxing ====&lt;br /&gt;
===Virtualization and Sandboxing for Secure Multi-Domain Web Apps===&lt;br /&gt;
&lt;br /&gt;
[[Image:JS_DOM_Box_Jasvir_Gaz.jpg]]&lt;br /&gt;
&lt;br /&gt;
===Co-chair Dr Jasvir Nagra===&lt;br /&gt;
Jasvir Nagra is a researcher and software engineer at Google. He is the designer of [http://code.google.com/p/google-caja/ Caja] - a secure subset of HTML, CSS and JavaScript; co-author of [http://www.amazon.com/Surreptitious-Software-Obfuscation-Watermarking-Tamperproofing/dp/0321549252 Surreptitious Software] - a book on obfuscation, software watermarking and tamper-proofing, contributer to [http://shindig.apache.org/ Shindig] - the reference implementation of OpenSocial.&lt;br /&gt;
&lt;br /&gt;
===Co-chair Gareth Heyes===&lt;br /&gt;
Gareth &amp;quot;Gaz&amp;quot; Heyes calls himself Chief Conspiracy theorist and is affiliated with Microsoft. He is the designer and developer behind [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=JSReg JSReg] – a Javascript sandbox which converts code using regular expressions; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=HTMLReg HTMLReg] &amp;amp; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=CSSReg CSSReg] – converters of malicious HTML/CSS into a safe form of HTML. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
===Subjects and Goals (draft)===&lt;br /&gt;
Goals and issues that need browser vendor cooperation:&lt;br /&gt;
* '''Attenuated versions of existing apis to sandboxed code'''. How should browsers introduce new apis into the sandbox or allow the sandbox to provide attenuated versions of existing apis to sandboxed code? For example, lets say the sandbox wants to provide an attenuated &amp;quot;alert&amp;quot; function to sandboxed code which does something slightly different than the real &amp;quot;alert&amp;quot;. What kind of apis could the browser provide to safely allow such extensions/apis? Do these need to be standardized such that different sandbox vendors can interoperate.&lt;br /&gt;
* '''Client side sandboxed apps maintaining state and authentication'''. For example if a user is created in a sandboxed app how is it determined what that user can do?&lt;br /&gt;
* '''Create a standard for modifying a sandboxed environment'''&lt;br /&gt;
* '''Deprecate and discourage standards''' which ambiently or undeniably pass credentials. &lt;br /&gt;
* '''Adopt a simpler rights amplification api''' like [http://web-send.org/introducer Web Introducer]&lt;br /&gt;
* '''Create a standard for authentication within a sandboxed environment''' (maybe interfacing with existing auth without passing creds like 0Auth works)&lt;br /&gt;
&lt;br /&gt;
===Working Form===&lt;br /&gt;
The working form will most probably be short presentations to frame the topic and then round table discussions. Depending on number of attendees we'll break into groups.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== HTML5 ====&lt;br /&gt;
===HTML5 Security===&lt;br /&gt;
[[Image:Html5_mario_hackvertor.jpg‎‎]]&lt;br /&gt;
&lt;br /&gt;
===Co-chair Mario Heiderich===&lt;br /&gt;
Mario Heiderich works as a researcher for the Ruhr-University in Bochum, Germany and currently focuses on HTML5, SVG security and security implications of the ES5 specification draft. Mario invoked the [http://html5sec.org/ HTML5 security cheat-sheet] and maintains the [http://php-ids.org/ PHPIDS filter rules]. In his spare time he delivers trainings and security consultancy for larger German and international companies. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
===Co-chair Gareth Heyes===&lt;br /&gt;
Gareth &amp;quot;Gaz&amp;quot; Heyes calls himself Chief Conspiracy theorist and is affiliated with Microsoft. He is the designer and developer behind [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=JSReg JSReg] – a Javascript sandbox which converts code using regular expressions; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=HTMLReg HTMLReg] &amp;amp; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=CSSReg CSSReg] – converters of malicious HTML/CSS into a safe form of HTML. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
===Subjects and Goals (draft)===&lt;br /&gt;
* '''Handle autofocus in a unified and secure way'''. Make sure SOP applies for autofocus usage in frame/iframe'd websites. Re-discuss necessity for (future) attributes like this.&lt;br /&gt;
* '''Discuss necessity and capability for the HTML5 form controls'''. Do we need a non-SOP formaction attribute and why? &lt;br /&gt;
* '''Goal I''': Initiate and create documentation and references for developers that address security issues. Html5sec.org is a start but impossible to continue or extend large scale without vendor help&lt;br /&gt;
* '''Goal II''': Discuss and heavily restrict SVG capabilities - especially when deployed in CSS backgrounds and &amp;lt;img&amp;gt; tags. Mainly Opera and Mozilla are addressed here.&lt;br /&gt;
* '''Long Term Goal(s)''': Provide a working and easy to use as well as vendor supported HTML5 compliant filter software such as HTMLPurifier. Browser vendors should participate in creating security software and filters - not undermine them as we could experience in the last decade&lt;br /&gt;
&lt;br /&gt;
==== EcmaScript 5====&lt;br /&gt;
=== EcmaScript 5 Security ===&lt;br /&gt;
&lt;br /&gt;
===Co-chair Mario Heiderich===&lt;br /&gt;
Mario Heiderich works as a researcher for the Ruhr-University in Bochum, Germany and currently focuses on HTML5, SVG security and security implications of the ES5 specification draft. Mario invoked the [http://html5sec.org/ HTML5 security cheat-sheet] and maintains the [http://php-ids.org/ PHPIDS filter rules]. In his spare time he delivers trainings and security consultancy for larger German and international companies. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
===Co-chair 2===&lt;br /&gt;
To be confirmed.&lt;br /&gt;
&lt;br /&gt;
===Subjects and Goals (draft)===&lt;br /&gt;
* '''Fix the problems with Object.defineProperty() and property unsealing / [https://bugzilla.mozilla.org/show_bug.cgi?id=588138 double-freezing]'''. Implement it if not yet done.&lt;br /&gt;
* '''Goal I''': Raise awareness for the power or object freezing in a security context. ES5 can really make a change here.&lt;br /&gt;
* '''Goal II''': Raise awareness in seeing the DOM as the place where XSS attacks actually take place - and where they should be prevented. CSP is a great yet still immature start - but worth discussing and extending. Discuss specification drafts for a secure DOM and easy to configure capability profiles with reasonable and quantitative proofs of concept.&lt;br /&gt;
* '''Long Term Goal''': Discuss the possibility of vendor supported client side security mechanisms. Client side IDS/IPS based on ES5 can be possible - yet have to be designed and specified. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Site Security Policy ====&lt;br /&gt;
There are several initiatives for expressing and enforcing website security policies. [http://tools.ietf.org/html/draft-hodges-strict-transport-sec-02 HTTP Strict Transport Security] for enforced TLS. [https://developer.mozilla.org/en/Introducing_Content_Security_Policy Content Security Policy] for whitelisting resource domains and enforcing file-only JavaScript. [http://blogs.msdn.com/b/ie/archive/2009/01/27/ie8-security-part-vii-clickjacking-defenses.aspx X-Frame-Options] for enforce framing restrictions. Harmonizing these features among browsers is a huge task. Getting developers to adopt and implement is even more challenging. This session will try to address all of these questions as well as the technical alternatives – headers, meta tags, nonces, signatures, html zones, css-like policies, violation events etc.&lt;br /&gt;
&lt;br /&gt;
* Should we have independent, coherent and simple policy mechanisms or a generalized, extensible policy mechanism?&lt;br /&gt;
* Should developers have multiple choices for expressing policies such as headers ''and'' meta tags?&lt;br /&gt;
* Should policies restrict domains, URLs, or elements? What are the consequences?&lt;br /&gt;
* Should one or two browser vendors deploy a policy mechanism in the field, collect experience, and then we set a standard?&lt;br /&gt;
* How do we help developers understand the need for policies and how do we help them write/generate/maintain policies?&lt;br /&gt;
* How important is performance and web 1.0/web 2.0 compliance? How much of the web can we afford to break? 0 %?&lt;br /&gt;
&lt;br /&gt;
===Co-chair Jeff Hodges===&lt;br /&gt;
Jeff Hodges is Distinguished Security Engineer at PayPal, Inc and one of the three original authors of the [http://tools.ietf.org/html/draft-hodges-strict-transport-sec-02 HTTP Strict Transport Security] spec. Check out [http://identitymeme.org/ IdentityMeme.org Jeff's blog].&lt;br /&gt;
&lt;br /&gt;
===Co-chair David Ross===&lt;br /&gt;
David Ross is a Principal Security Software Engineer on the MSRC Engineering team at Microsoft. Prior to joining MSRC Engineering in 2002, David spent his formative years on the Internet Explorer Security Team and wears the battle scars with pride. Check out [http://blogs.msdn.com/dross David’s blog].&lt;br /&gt;
&lt;br /&gt;
===Co-chair Lucas Adamski===&lt;br /&gt;
Lucas Adamski is the Director of Security Engineering at Mozilla Corporation. He specializes in penetration testing, incident response, spec and code reviews, fuzzing, training, security processes and software PLC. Check out [http://blog.mozilla.com/ladamski/ Lucas' blog].&lt;br /&gt;
&lt;br /&gt;
==== Enduser Warnings ====&lt;br /&gt;
===Enduser Warnings===&lt;br /&gt;
[[Image:Three_browsers_user_info.jpg]]&lt;br /&gt;
&lt;br /&gt;
===Subjects and Goals (draft)===&lt;br /&gt;
Clearly there is a need for warnings that users understand and that conveys the right information. Perhaps we can agree on some guidelines or at least exchange lessons learned.&lt;br /&gt;
&lt;br /&gt;
* How should browsers signal invalid SSL certs to the enduser? Are we helping security right now? What to do about 50 % of users clicking through warnings? Mozilla replaces the padlock with a [https://support.mozilla.com/en-US/kb/Site%20Identity%20Button site identity button] i Firefox 4. &amp;quot;Larry&amp;quot; will inform the user of the site's status. Google recently tried out a skull &amp;amp; bones icon for bad certs but moved back to [http://www.google.com/support/chrome/bin/answer.py?hl=en&amp;amp;answer=95617 padlocks] again.&lt;br /&gt;
* How should browsers communicate other kinds of information such as privacy, malware warnings, &amp;quot;not visited before&amp;quot; etc? Forbes had an interesting example of [http://blogs.forbes.com/kashmirhill/2011/01/05/visualizing-better-privacy-policies/?boxes=Homepagechannels how to visualize privacy].&lt;br /&gt;
&lt;br /&gt;
Some additional information, thoughts and discussions on these subjects elsewhere:&lt;br /&gt;
&lt;br /&gt;
* [http://www.freedom-to-tinker.com/blog/sjs/web-browser-security-user-interfaces-hard-get-right-and-increasingly-inconsistent Web Browser Security User Interfaces: Hard to Get Right and Increasingly Inconsistent], Freedom to Tinker, 18 Jan 2011&lt;br /&gt;
* [http://intrepidusgroup.com/insight/2010/04/security-dialogs-and-graphics/ Security Dialogs and Graphics], Insight, 27 Apr 2010&lt;br /&gt;
* [http://www.w3.org/TR/wsc-ui/ Web Security Context: User Interface Guidelines], W3C, 12 Aug 2010&lt;br /&gt;
* [http://www.clerkendweller.com/2009/7/28/Colour-Overload-with-IE8-Tab-Grouping Colour Overload with IE8 Tab Grouping], Clerkendweller, 28 Jul 2009&lt;br /&gt;
* [http://www.usablesecurity.org/emperor/ The Emperor's New Security Indicators: An evaluation of website authentication and the effect of role playing on usability studies], IEEE Symposium on Security and Privacy, May 2007&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Securing Plugins ====&lt;br /&gt;
===Securing Plugins===&lt;br /&gt;
Should browsers ship with default plugins? Should plugins be auto-updated? Can plugins or versions of plugins be blacklisted centrally?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Blacklisting ====&lt;br /&gt;
===Blacklisting===&lt;br /&gt;
Can we cooperate better on blacklisting? Does it work between cultures, i e can we have the same process for reporting throughout the world?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== OS Integration ====&lt;br /&gt;
===OS Integration===&lt;br /&gt;
More and more features in browsers get integrated with the underlying operating system. Processes, fonts, filesystem, 3D graphics. How do we secure this?&lt;br /&gt;
&lt;br /&gt;
==== Sandboxed Browser ====&lt;br /&gt;
=== Sandboxed Tabs/Domains/Browser ===&lt;br /&gt;
Microsoft Research has been doing some groundbreaking work on the [http://research.microsoft.com/apps/pubs/default.aspx?id=79655 Gazelle browser], Chrome uses a sandboxing model, and the [http://www.romab.com/ironsuite/ IronSuite] provides sandboxed versions of Firefox ([http://www.romab.com/ironfox/ IronFox]) and Safari on Mac OS X.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Questions? Contact [mailto:john.wilander@owasp.org John Wilander, Session Chair]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[Summit_2011|'''Return Global Summit 2011 Home Page''']]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:Category:Summit_2011_Tracks|'''Return to Global Summit 2011 Working Sessions''']]&lt;br /&gt;
&lt;br /&gt;
[[Category:Summit_2011]]&lt;br /&gt;
[[Category: Summit 2011 Tracks]]&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:John.wilander&amp;diff=103267</id>
		<title>User:John.wilander</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:John.wilander&amp;diff=103267"/>
				<updated>2011-02-03T17:25:14Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Added Twitter link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:John_Wilander_090626-346_(for_web).jpg‎|John Wilander]]&lt;br /&gt;
&lt;br /&gt;
John Wilander is an application security researcher and consultant. He is a partner and evangelist at Omegapoint, a consultancy firm based in Sweden. John typically works as a security focused software developer. Java and JavaScript are his languages of choice.&lt;br /&gt;
&lt;br /&gt;
After his Master's degree in Computer Science and Engineering from Linköping University (Sweden) and Nanyang Technological University (Singapore) he pursued a PhD in application security. Last paper still pending but John's research publications can be found [http://www.ida.liu.se/~johwi/research_publications/ here].&lt;br /&gt;
&lt;br /&gt;
John started the Swedish OWASP Chapter in 2007 and has since been leader and co-leader. In 2010 he chaired the most successful OWASP AppSec EU conference so far – [http://www.owasp.org/index.php?title=OWASP_AppSec_Research_2010_-_Stockholm,_Sweden OWASP AppSec Research 2010]. John along with the Swedish chapter are listed as contributors to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10 2010].&lt;br /&gt;
&lt;br /&gt;
For more detailed information, please see my public LinkedIn [http://www.linkedin.com/in/johnwilander page].&lt;br /&gt;
&lt;br /&gt;
* To see my wiki contributions, [[:Special:Contributions/John.wilander|click here]]&lt;br /&gt;
* [mailto:john.wilander@owasp.org Email address]&lt;br /&gt;
* [https://twitter.com/johnwilander Twitter]&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:John.wilander&amp;diff=103265</id>
		<title>User:John.wilander</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:John.wilander&amp;diff=103265"/>
				<updated>2011-02-03T17:23:34Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Added portrait&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:John_Wilander_090626-346_(for_web).jpg‎|John Wilander]]&lt;br /&gt;
&lt;br /&gt;
John Wilander is an application security researcher and consultant. He is a partner and evangelist at Omegapoint, a consultancy firm based in Sweden. John typically works as a security focused software developer. Java and JavaScript are his languages of choice.&lt;br /&gt;
&lt;br /&gt;
After his Master's degree in Computer Science and Engineering from Linköping University (Sweden) and Nanyang Technological University (Singapore) he pursued a PhD in application security. Last paper still pending but John's research publications can be found [http://www.ida.liu.se/~johwi/research_publications/ here].&lt;br /&gt;
&lt;br /&gt;
John started the Swedish OWASP Chapter in 2007 and has since been leader and co-leader. In 2010 he chaired the most successful OWASP AppSec EU conference so far – [http://www.owasp.org/index.php?title=OWASP_AppSec_Research_2010_-_Stockholm,_Sweden OWASP AppSec Research 2010]. John along with the Swedish chapter are listed as contributors to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10 2010].&lt;br /&gt;
&lt;br /&gt;
For more detailed information, please see my public LinkedIn [http://www.linkedin.com/in/johnwilander page].&lt;br /&gt;
&lt;br /&gt;
* To see my wiki contributions, [[:Special:Contributions/John.wilander|click here]].&lt;br /&gt;
* [mailto:john.wilander@owasp.org Email address].&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:John_Wilander_090626-346_(for_web).jpg&amp;diff=103264</id>
		<title>File:John Wilander 090626-346 (for web).jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:John_Wilander_090626-346_(for_web).jpg&amp;diff=103264"/>
				<updated>2011-02-03T17:22:54Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: uploaded a new version of &amp;quot;File:John Wilander 090626-346 (for web).jpg&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Profile picture for John Wilander&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:John_Wilander_090626-346_(for_web).jpg&amp;diff=103261</id>
		<title>File:John Wilander 090626-346 (for web).jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:John_Wilander_090626-346_(for_web).jpg&amp;diff=103261"/>
				<updated>2011-02-03T17:18:37Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Profile picture for John Wilander&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Profile picture for John Wilander&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Sweden&amp;diff=102910</id>
		<title>Sweden</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Sweden&amp;diff=102910"/>
				<updated>2011-02-01T14:38:31Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Added OWASP AppSec Research 2010 for archive purposes&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Sweden|extra=The chapter co-leaders are [mailto:John.Wilander@owasp.org John Wilander], [mailto:Mattias.Bergling@owasp.org Mattias Bergling], and [mailto:Robert.Malmgren@owasp.org Robert Malmgren]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Sweden&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
&lt;br /&gt;
== The OWASP Sweden blog ==&lt;br /&gt;
&lt;br /&gt;
For lengthy news and event reports please visit the [http://owaspsweden.blogspot.com/ OWASP Sweden blog] (in Swedish).&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, March 7 2011, &amp;quot;Security impact of SVG&amp;quot; + &amp;quot;&amp;quot;ECMA Script 5, a frozen DOM and the eradication of XSS'''&lt;br /&gt;
Mario Heiderich works as a researcher for the Ruhr-University in Bochum, Germany and currently focuses on HTML5, SVG security and security implications of the ES5 specification draft while finishing his PhD thesis.&lt;br /&gt;
&lt;br /&gt;
We're very happy to invite Mario to OWASP Sweden in March. His two talks will be given in English at Royal Institute of Technology (KTH).&lt;br /&gt;
&lt;br /&gt;
Get your ticket now at [http://marioheiderich.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Jan 31 2011, &amp;quot;HTTP-säkerhet&amp;quot;'''&lt;br /&gt;
Daniel Stenberg, Martin Holst Swende, and John Wilander will give talks for OWASP Sweden on Jan 31, 5:30 pm - 21 pm. The topics are Websockets, the new Cookie RFC, Content Security Policy, HTTP Strict Transport Security, and X-Frame-Options. We will be in lecture hall &amp;quot;New York&amp;quot;, World Trade Center, Stockholm ([http://www.hitta.se/SearchMixed.aspx?vad=world%20trade%20center&amp;amp;var=stockholm map]).&lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden reaches 500 members ... and gets three leaders'''&lt;br /&gt;
OWASP Sweden now has a stunning 500 members on the mailing list. From now the chapter will be lead by three co-leaders: John Wilander, Mattias Bergling, and Robert Malmgren.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden invites Samy Kamkar, October 4, 2010'''&lt;br /&gt;
Samy Kamkar, famous for the [http://en.wikipedia.org/wiki/Samy_(XSS) Samy XSS attack on MySpace] in 2005 will be giving a talk for OWASP Sweden on October 4, 5:30 pm - 22 pm. We will be in Ljusgården, Årstaängsvägen 19, Marievik/Liljeholmen, Stockholm ([http://www.hitta.se/LargeMap.aspx?var=%c5rsta%e4ngsv%e4gen+19%2c+Liljeholmen%2fMarievik%2c+Stockholm map]).&lt;br /&gt;
&lt;br /&gt;
Nexus Safe and Data@UrService are sponsors and there will be lighter food and beers.&lt;br /&gt;
&lt;br /&gt;
[[Media:OWASP_Sweden_Samy_Kamkar_oktober_2010.pdf]]&lt;br /&gt;
&lt;br /&gt;
Go to [http://samykamkar.eventbrite.com/ EventBrite] and register for free now!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden + FOSS Sthlm &amp;quot;Community Hack&amp;quot; September 4-5 2010'''&lt;br /&gt;
The first weekend of September OWASP Sweden together with FOSS Sthlm invite our members to Community Hack II in Stockholm. A full weekend of hacking on open projects, testing new security hacks, trying out tools (for instance the favorite OWASP tool you've always wanted to learn), or writing new, open guidelines.&lt;br /&gt;
&lt;br /&gt;
Go to [http://communityhack2.eventbrite.com/ EventBrite] and register for free now!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP AppSec Research 2010 in Stockholm, June 21-24 2010'''&lt;br /&gt;
June 21-24, 2010 appsec people will meet in beautiful Stockholm, Sweden. The OWASP chapters in Sweden, Norway, and Denmark together with Stockholm University host the [http://www.owasp.org/index.php/OWASP_AppSec_Research_2010_-_Stockholm,_Sweden OWASP AppSec Research 2010].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting January 21st 2010 -- The Big Protocols'''&lt;br /&gt;
Stiftelsen för Internetinfrastruktur (.SE) and Swedish Network Users' Society (SNUS) invite us to three seminars on the big protocols: BGP, DNSSEC, and SSL/TLS.&lt;br /&gt;
&lt;br /&gt;
Program and invitation (in Swedish): [[File:OWASP_Sweden_-_De_stora_protokollen_2010-01-21.pdf]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting December 2nd 2009 -- OWASP Top 10 2010 (rc1)'''&lt;br /&gt;
Omegapoint invites us to discuss the release candidate of OWASP Top 10 2010 that was presented at OWASP AppSec DC November 13th. The invitation in Swedish is found [[File:OWASP_Sweden_Top_10_december_2009.pdf | here]]. &lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@owasp.org) no later than November 23rd to say you're coming.''' Seats usually fill up fast.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP AppSec Research 2010, June 21-24 in Stockholm, Sweden'''&lt;br /&gt;
OWASP Sweden, Norway, and Denmark invite you to OWASP AppSec Research 2010, June 21-24 in Stockholm. Read more on the [https://www.owasp.org/index.php/OWASP_AppSec_Research_2010_-_Stockholm%2C_Sweden conference wiki page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting April 28th 2009 -- Code Analysis and Review'''&lt;br /&gt;
&lt;br /&gt;
The second chapter meeting of 2009 will be held on Tuesday April 28th at Clarion Hotel Stockholm. The focus is code analysis and code review. Fortify sponsors the event and welcome the chapter members to refreshments, starting at 17.30.&lt;br /&gt;
&lt;br /&gt;
The program:&lt;br /&gt;
&lt;br /&gt;
* Fredrik Möller (Fortify) will biefly present Fortify and their support of OWASP&lt;br /&gt;
* David Anumudu (Fortify) will present and do a live demo of Fortify Solution&lt;br /&gt;
* James Dickson (Simovits Consulting) will give a talk on code review&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@omegapoint.se) no later than April 23rd to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting March 26th 2009 -- XSS &amp;amp; CSRF'''&lt;br /&gt;
&lt;br /&gt;
The first meeting of 2009 will be held Thursday March 26th at LabCenter, Oxtorgsgränd 2, Stockholm. The focus is cross-site scripting and cross-site request forgery, attacks and countermeasures. Inspect it and LabCenter sponsor the event and welcome the chapter members to refreshments, starting at 17.00.&lt;br /&gt;
&lt;br /&gt;
The program:&lt;br /&gt;
&lt;br /&gt;
* Hasain Alshakarti, TrueSec: &amp;quot;XSS &amp;amp; CSRF -- A Deadly Cocktail&amp;quot;&lt;br /&gt;
* Sergio Molero, Concrete IT: &amp;quot;Skydd mot XSS och CSRF&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Mattias Bergling (mattias.bergling@inspectit.se) no later than March 23rd to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting November 19th 2008 -- PCI DSS'''&lt;br /&gt;
&lt;br /&gt;
The next chapter meeting is Wednesday November 19th. The focus of the seminars is on PCI-DSS, i.e. security in payment card handling on the Internet. &lt;br /&gt;
The program:&lt;br /&gt;
* Mats Henriksson, Pan Nordic Card Assoc: &amp;quot;PCI DSS - Tre goda anledningar&amp;quot;&lt;br /&gt;
* Pål Göran Stensson, Defensor Sverige AB: &amp;quot;PCI DSS - Externa krav och konsulten&amp;quot;&lt;br /&gt;
* Bengt Berg, Cybercom Sweden East AB: &amp;quot;Olika angreppssätt på PCI DSS&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''The meeting is fully booked. But do send an email to John Wilander (john.wilander@omegapoint.se) to say you're interested and we'll let you know if seats become available.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Hosts the OWASP AppSec Europe Conference 2010'''&lt;br /&gt;
&lt;br /&gt;
We're hosting the European OWASP AppSec conference in 2010! Please read the [http://www.owasp.org/index.php/OWASP_AppSec_Europe_2010_-_Sweden announcement].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting October 6th 2008 -- Security in the Open Source Process'''&lt;br /&gt;
&lt;br /&gt;
The next chapter meeting is Monday October 6th at Clarion Hotel Stockholm (Skanstull). The focus of the seminars will be on &amp;quot;Security in the Open Source Process&amp;quot;. Refreshments will be served from 16:30 and the seminars will commence at 17:30. Except for a closing panel discussion the program contains the following:&lt;br /&gt;
&lt;br /&gt;
* Simon Josefsson, SJD: ”Anekdoter och lärdomar från granskning av säkerhetsprogram”&lt;br /&gt;
* Daniel Stenberg, daniel.haxx.se: ”Säker kod och utveckling i cURL-projektet”&lt;br /&gt;
* Anders Karlsson, MySQL och Sun Microsystems: ”MySQL: Säkerhet i ett kommersiellt open source-projekt”&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Robert Malmgren (anmalan@romab.com) no later than September 29th to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting May 27th 2008 - SQL Injection, Web Scarab'''&lt;br /&gt;
&lt;br /&gt;
OWASP-Sweden welcomes its members to the next chapter meeting - Tuesday May 27th at Clarion Hotel Stockholm. Refreshments will be served from 17:00, demos will be shown from 17:30, and the seminars will commence at 18:00. The main attractions are:&lt;br /&gt;
 &lt;br /&gt;
* Patrik Karlson, Inspect it: &amp;quot;SQL injection, identifiering och utnyttjande&amp;quot;&lt;br /&gt;
* Johannes Gumbel, TrueSec: &amp;quot;WebScarab—funktioner, fördelar och nackdelar&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Mattias Bergling (mattias.bergling@inspectit.se) no later than May 21st to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Kick-Off Meeting for OWASP-Sweden April 1st 2008'''&lt;br /&gt;
&lt;br /&gt;
The OWASP-Sweden kick-off will be held at WTC in Stockholm on April 1st. Yeah, it's April Fool's Day but we go under the tagline &amp;quot;Application Security is Not a Joke&amp;quot;. The presentation program includes:&lt;br /&gt;
&lt;br /&gt;
* Andrei Sabelfeld, well-known security researcher from Chalmers&lt;br /&gt;
* Michael Anderberg, Chief Security Advisor at Microsoft Sweden&lt;br /&gt;
* Per Mellstrand, software analyst at Sony Ericsson and researcher at Blekinge Institute of Technology&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@omegapoint.se) no later than March 27 to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
We're kicking off!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden in Computer Sweden - 08:44, 19 Dec 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Today the Swedish national IT newspaper 'Computer Sweden' published an article on the new OWASP-Sweden chapter - [http://computersweden.idg.se/2.2683/1.137387 ''Mecka för säker programmering till Sverige''], or ''A Mecka for Secure Programming Reaches Sweden'' in English. While OWASP is more than a programmer's guide, Mattias Bergling and I are very happy to get the news out to a large part of Sweden's IT industry.&lt;br /&gt;
&lt;br /&gt;
'''To become a member of Owasp-Sweden just join the [http://lists.owasp.org/mailman/listinfo/owasp-sweden mailing list].'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden opens! - 22:25, 01 Oct 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Finally, Sweden has joined the OWASP movement and John Wilander, the local chapter leader, welcomes members to the Stockholm-based OWASP-Sweden. Please, join our mailing list. Plans for meetings and seminars will be made.&lt;br /&gt;
&lt;br /&gt;
Are you interested in helping out? Do you have ideas for great invited speakers or workshop meetings? Feel free to contact the chapter.&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Sweden&amp;diff=102909</id>
		<title>Sweden</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Sweden&amp;diff=102909"/>
				<updated>2011-02-01T14:35:25Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Added Mario event March 7&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Sweden|extra=The chapter co-leaders are [mailto:John.Wilander@owasp.org John Wilander], [mailto:Mattias.Bergling@owasp.org Mattias Bergling], and [mailto:Robert.Malmgren@owasp.org Robert Malmgren]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Sweden&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
&lt;br /&gt;
== The OWASP Sweden blog ==&lt;br /&gt;
&lt;br /&gt;
For lengthy news and event reports please visit the [http://owaspsweden.blogspot.com/ OWASP Sweden blog] (in Swedish).&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, March 7 2011, &amp;quot;Security impact of SVG&amp;quot; + &amp;quot;&amp;quot;ECMA Script 5, a frozen DOM and the eradication of XSS'''&lt;br /&gt;
Mario Heiderich works as a researcher for the Ruhr-University in Bochum, Germany and currently focuses on HTML5, SVG security and security implications of the ES5 specification draft while finishing his PhD thesis.&lt;br /&gt;
&lt;br /&gt;
We're very happy to invite Mario to OWASP Sweden in March. His two talks will be given in English at Royal Institute of Technology (KTH).&lt;br /&gt;
&lt;br /&gt;
Get your ticket now at [http://marioheiderich.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Jan 31 2011, &amp;quot;HTTP-säkerhet&amp;quot;'''&lt;br /&gt;
Daniel Stenberg, Martin Holst Swende, and John Wilander will give talks for OWASP Sweden on Jan 31, 5:30 pm - 21 pm. The topics are Websockets, the new Cookie RFC, Content Security Policy, HTTP Strict Transport Security, and X-Frame-Options. We will be in lecture hall &amp;quot;New York&amp;quot;, World Trade Center, Stockholm ([http://www.hitta.se/SearchMixed.aspx?vad=world%20trade%20center&amp;amp;var=stockholm map]).&lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden reaches 500 members ... and gets three leaders'''&lt;br /&gt;
OWASP Sweden now has a stunning 500 members on the mailing list. From now the chapter will be lead by three co-leaders: John Wilander, Mattias Bergling, and Robert Malmgren.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden invites Samy Kamkar, October 4, 2010'''&lt;br /&gt;
Samy Kamkar, famous for the [http://en.wikipedia.org/wiki/Samy_(XSS) Samy XSS attack on MySpace] in 2005 will be giving a talk for OWASP Sweden on October 4, 5:30 pm - 22 pm. We will be in Ljusgården, Årstaängsvägen 19, Marievik/Liljeholmen, Stockholm ([http://www.hitta.se/LargeMap.aspx?var=%c5rsta%e4ngsv%e4gen+19%2c+Liljeholmen%2fMarievik%2c+Stockholm map]).&lt;br /&gt;
&lt;br /&gt;
Nexus Safe and Data@UrService are sponsors and there will be lighter food and beers.&lt;br /&gt;
&lt;br /&gt;
[[Media:OWASP_Sweden_Samy_Kamkar_oktober_2010.pdf]]&lt;br /&gt;
&lt;br /&gt;
Go to [http://samykamkar.eventbrite.com/ EventBrite] and register for free now!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden + FOSS Sthlm &amp;quot;Community Hack&amp;quot; September 4-5 2010'''&lt;br /&gt;
The first weekend of September OWASP Sweden together with FOSS Sthlm invite our members to Community Hack II in Stockholm. A full weekend of hacking on open projects, testing new security hacks, trying out tools (for instance the favorite OWASP tool you've always wanted to learn), or writing new, open guidelines.&lt;br /&gt;
&lt;br /&gt;
Go to [http://communityhack2.eventbrite.com/ EventBrite] and register for free now!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting January 21st 2010 -- The Big Protocols'''&lt;br /&gt;
Stiftelsen för Internetinfrastruktur (.SE) and Swedish Network Users' Society (SNUS) invite us to three seminars on the big protocols: BGP, DNSSEC, and SSL/TLS.&lt;br /&gt;
&lt;br /&gt;
Program and invitation (in Swedish): [[File:OWASP_Sweden_-_De_stora_protokollen_2010-01-21.pdf]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting December 2nd 2009 -- OWASP Top 10 2010 (rc1)'''&lt;br /&gt;
Omegapoint invites us to discuss the release candidate of OWASP Top 10 2010 that was presented at OWASP AppSec DC November 13th. The invitation in Swedish is found [[File:OWASP_Sweden_Top_10_december_2009.pdf | here]]. &lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@owasp.org) no later than November 23rd to say you're coming.''' Seats usually fill up fast.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP AppSec Research 2010, June 21-24 in Stockholm, Sweden'''&lt;br /&gt;
OWASP Sweden, Norway, and Denmark invite you to OWASP AppSec Research 2010, June 21-24 in Stockholm. Read more on the [https://www.owasp.org/index.php/OWASP_AppSec_Research_2010_-_Stockholm%2C_Sweden conference wiki page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting April 28th 2009 -- Code Analysis and Review'''&lt;br /&gt;
&lt;br /&gt;
The second chapter meeting of 2009 will be held on Tuesday April 28th at Clarion Hotel Stockholm. The focus is code analysis and code review. Fortify sponsors the event and welcome the chapter members to refreshments, starting at 17.30.&lt;br /&gt;
&lt;br /&gt;
The program:&lt;br /&gt;
&lt;br /&gt;
* Fredrik Möller (Fortify) will biefly present Fortify and their support of OWASP&lt;br /&gt;
* David Anumudu (Fortify) will present and do a live demo of Fortify Solution&lt;br /&gt;
* James Dickson (Simovits Consulting) will give a talk on code review&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@omegapoint.se) no later than April 23rd to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting March 26th 2009 -- XSS &amp;amp; CSRF'''&lt;br /&gt;
&lt;br /&gt;
The first meeting of 2009 will be held Thursday March 26th at LabCenter, Oxtorgsgränd 2, Stockholm. The focus is cross-site scripting and cross-site request forgery, attacks and countermeasures. Inspect it and LabCenter sponsor the event and welcome the chapter members to refreshments, starting at 17.00.&lt;br /&gt;
&lt;br /&gt;
The program:&lt;br /&gt;
&lt;br /&gt;
* Hasain Alshakarti, TrueSec: &amp;quot;XSS &amp;amp; CSRF -- A Deadly Cocktail&amp;quot;&lt;br /&gt;
* Sergio Molero, Concrete IT: &amp;quot;Skydd mot XSS och CSRF&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Mattias Bergling (mattias.bergling@inspectit.se) no later than March 23rd to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting November 19th 2008 -- PCI DSS'''&lt;br /&gt;
&lt;br /&gt;
The next chapter meeting is Wednesday November 19th. The focus of the seminars is on PCI-DSS, i.e. security in payment card handling on the Internet. &lt;br /&gt;
The program:&lt;br /&gt;
* Mats Henriksson, Pan Nordic Card Assoc: &amp;quot;PCI DSS - Tre goda anledningar&amp;quot;&lt;br /&gt;
* Pål Göran Stensson, Defensor Sverige AB: &amp;quot;PCI DSS - Externa krav och konsulten&amp;quot;&lt;br /&gt;
* Bengt Berg, Cybercom Sweden East AB: &amp;quot;Olika angreppssätt på PCI DSS&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''The meeting is fully booked. But do send an email to John Wilander (john.wilander@omegapoint.se) to say you're interested and we'll let you know if seats become available.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Hosts the OWASP AppSec Europe Conference 2010'''&lt;br /&gt;
&lt;br /&gt;
We're hosting the European OWASP AppSec conference in 2010! Please read the [http://www.owasp.org/index.php/OWASP_AppSec_Europe_2010_-_Sweden announcement].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting October 6th 2008 -- Security in the Open Source Process'''&lt;br /&gt;
&lt;br /&gt;
The next chapter meeting is Monday October 6th at Clarion Hotel Stockholm (Skanstull). The focus of the seminars will be on &amp;quot;Security in the Open Source Process&amp;quot;. Refreshments will be served from 16:30 and the seminars will commence at 17:30. Except for a closing panel discussion the program contains the following:&lt;br /&gt;
&lt;br /&gt;
* Simon Josefsson, SJD: ”Anekdoter och lärdomar från granskning av säkerhetsprogram”&lt;br /&gt;
* Daniel Stenberg, daniel.haxx.se: ”Säker kod och utveckling i cURL-projektet”&lt;br /&gt;
* Anders Karlsson, MySQL och Sun Microsystems: ”MySQL: Säkerhet i ett kommersiellt open source-projekt”&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Robert Malmgren (anmalan@romab.com) no later than September 29th to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting May 27th 2008 - SQL Injection, Web Scarab'''&lt;br /&gt;
&lt;br /&gt;
OWASP-Sweden welcomes its members to the next chapter meeting - Tuesday May 27th at Clarion Hotel Stockholm. Refreshments will be served from 17:00, demos will be shown from 17:30, and the seminars will commence at 18:00. The main attractions are:&lt;br /&gt;
 &lt;br /&gt;
* Patrik Karlson, Inspect it: &amp;quot;SQL injection, identifiering och utnyttjande&amp;quot;&lt;br /&gt;
* Johannes Gumbel, TrueSec: &amp;quot;WebScarab—funktioner, fördelar och nackdelar&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Mattias Bergling (mattias.bergling@inspectit.se) no later than May 21st to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Kick-Off Meeting for OWASP-Sweden April 1st 2008'''&lt;br /&gt;
&lt;br /&gt;
The OWASP-Sweden kick-off will be held at WTC in Stockholm on April 1st. Yeah, it's April Fool's Day but we go under the tagline &amp;quot;Application Security is Not a Joke&amp;quot;. The presentation program includes:&lt;br /&gt;
&lt;br /&gt;
* Andrei Sabelfeld, well-known security researcher from Chalmers&lt;br /&gt;
* Michael Anderberg, Chief Security Advisor at Microsoft Sweden&lt;br /&gt;
* Per Mellstrand, software analyst at Sony Ericsson and researcher at Blekinge Institute of Technology&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@omegapoint.se) no later than March 27 to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
We're kicking off!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden in Computer Sweden - 08:44, 19 Dec 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Today the Swedish national IT newspaper 'Computer Sweden' published an article on the new OWASP-Sweden chapter - [http://computersweden.idg.se/2.2683/1.137387 ''Mecka för säker programmering till Sverige''], or ''A Mecka for Secure Programming Reaches Sweden'' in English. While OWASP is more than a programmer's guide, Mattias Bergling and I are very happy to get the news out to a large part of Sweden's IT industry.&lt;br /&gt;
&lt;br /&gt;
'''To become a member of Owasp-Sweden just join the [http://lists.owasp.org/mailman/listinfo/owasp-sweden mailing list].'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden opens! - 22:25, 01 Oct 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Finally, Sweden has joined the OWASP movement and John Wilander, the local chapter leader, welcomes members to the Stockholm-based OWASP-Sweden. Please, join our mailing list. Plans for meetings and seminars will be made.&lt;br /&gt;
&lt;br /&gt;
Are you interested in helping out? Do you have ideas for great invited speakers or workshop meetings? Feel free to contact the chapter.&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Sweden&amp;diff=102908</id>
		<title>Sweden</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Sweden&amp;diff=102908"/>
				<updated>2011-02-01T14:29:03Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Added HTTP Sec event Jan 31 (archive purpose, invite via email and Eventbrite)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Sweden|extra=The chapter co-leaders are [mailto:John.Wilander@owasp.org John Wilander], [mailto:Mattias.Bergling@owasp.org Mattias Bergling], and [mailto:Robert.Malmgren@owasp.org Robert Malmgren]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Sweden&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
&lt;br /&gt;
== The OWASP Sweden blog ==&lt;br /&gt;
&lt;br /&gt;
For lengthy news and event reports please visit the [http://owaspsweden.blogspot.com/ OWASP Sweden blog] (in Swedish).&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Meeting, Jan 31 2011, &amp;quot;HTTP-säkerhet&amp;quot;'''&lt;br /&gt;
Daniel Stenberg, Martin Holst Swende, and John Wilander will give talks for OWASP Sweden on Jan 31, 5:30 pm - 21 pm. The topics are Websockets, the new Cookie RFC, Content Security Policy, HTTP Strict Transport Security, and X-Frame-Options. We will be in lecture hall &amp;quot;New York&amp;quot;, World Trade Center, Stockholm ([http://www.hitta.se/SearchMixed.aspx?vad=world%20trade%20center&amp;amp;var=stockholm map]).&lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden reaches 500 members ... and gets three leaders'''&lt;br /&gt;
OWASP Sweden now has a stunning 500 members on the mailing list. From now the chapter will be lead by three co-leaders: John Wilander, Mattias Bergling, and Robert Malmgren.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden invites Samy Kamkar, October 4, 2010'''&lt;br /&gt;
Samy Kamkar, famous for the [http://en.wikipedia.org/wiki/Samy_(XSS) Samy XSS attack on MySpace] in 2005 will be giving a talk for OWASP Sweden on October 4, 5:30 pm - 22 pm. We will be in Ljusgården, Årstaängsvägen 19, Marievik/Liljeholmen, Stockholm ([http://www.hitta.se/LargeMap.aspx?var=%c5rsta%e4ngsv%e4gen+19%2c+Liljeholmen%2fMarievik%2c+Stockholm map]).&lt;br /&gt;
&lt;br /&gt;
Nexus Safe and Data@UrService are sponsors and there will be lighter food and beers.&lt;br /&gt;
&lt;br /&gt;
[[Media:OWASP_Sweden_Samy_Kamkar_oktober_2010.pdf]]&lt;br /&gt;
&lt;br /&gt;
Go to [http://samykamkar.eventbrite.com/ EventBrite] and register for free now!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden + FOSS Sthlm &amp;quot;Community Hack&amp;quot; September 4-5 2010'''&lt;br /&gt;
The first weekend of September OWASP Sweden together with FOSS Sthlm invite our members to Community Hack II in Stockholm. A full weekend of hacking on open projects, testing new security hacks, trying out tools (for instance the favorite OWASP tool you've always wanted to learn), or writing new, open guidelines.&lt;br /&gt;
&lt;br /&gt;
Go to [http://communityhack2.eventbrite.com/ EventBrite] and register for free now!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting January 21st 2010 -- The Big Protocols'''&lt;br /&gt;
Stiftelsen för Internetinfrastruktur (.SE) and Swedish Network Users' Society (SNUS) invite us to three seminars on the big protocols: BGP, DNSSEC, and SSL/TLS.&lt;br /&gt;
&lt;br /&gt;
Program and invitation (in Swedish): [[File:OWASP_Sweden_-_De_stora_protokollen_2010-01-21.pdf]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting December 2nd 2009 -- OWASP Top 10 2010 (rc1)'''&lt;br /&gt;
Omegapoint invites us to discuss the release candidate of OWASP Top 10 2010 that was presented at OWASP AppSec DC November 13th. The invitation in Swedish is found [[File:OWASP_Sweden_Top_10_december_2009.pdf | here]]. &lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@owasp.org) no later than November 23rd to say you're coming.''' Seats usually fill up fast.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP AppSec Research 2010, June 21-24 in Stockholm, Sweden'''&lt;br /&gt;
OWASP Sweden, Norway, and Denmark invite you to OWASP AppSec Research 2010, June 21-24 in Stockholm. Read more on the [https://www.owasp.org/index.php/OWASP_AppSec_Research_2010_-_Stockholm%2C_Sweden conference wiki page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting April 28th 2009 -- Code Analysis and Review'''&lt;br /&gt;
&lt;br /&gt;
The second chapter meeting of 2009 will be held on Tuesday April 28th at Clarion Hotel Stockholm. The focus is code analysis and code review. Fortify sponsors the event and welcome the chapter members to refreshments, starting at 17.30.&lt;br /&gt;
&lt;br /&gt;
The program:&lt;br /&gt;
&lt;br /&gt;
* Fredrik Möller (Fortify) will biefly present Fortify and their support of OWASP&lt;br /&gt;
* David Anumudu (Fortify) will present and do a live demo of Fortify Solution&lt;br /&gt;
* James Dickson (Simovits Consulting) will give a talk on code review&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@omegapoint.se) no later than April 23rd to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting March 26th 2009 -- XSS &amp;amp; CSRF'''&lt;br /&gt;
&lt;br /&gt;
The first meeting of 2009 will be held Thursday March 26th at LabCenter, Oxtorgsgränd 2, Stockholm. The focus is cross-site scripting and cross-site request forgery, attacks and countermeasures. Inspect it and LabCenter sponsor the event and welcome the chapter members to refreshments, starting at 17.00.&lt;br /&gt;
&lt;br /&gt;
The program:&lt;br /&gt;
&lt;br /&gt;
* Hasain Alshakarti, TrueSec: &amp;quot;XSS &amp;amp; CSRF -- A Deadly Cocktail&amp;quot;&lt;br /&gt;
* Sergio Molero, Concrete IT: &amp;quot;Skydd mot XSS och CSRF&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Mattias Bergling (mattias.bergling@inspectit.se) no later than March 23rd to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting November 19th 2008 -- PCI DSS'''&lt;br /&gt;
&lt;br /&gt;
The next chapter meeting is Wednesday November 19th. The focus of the seminars is on PCI-DSS, i.e. security in payment card handling on the Internet. &lt;br /&gt;
The program:&lt;br /&gt;
* Mats Henriksson, Pan Nordic Card Assoc: &amp;quot;PCI DSS - Tre goda anledningar&amp;quot;&lt;br /&gt;
* Pål Göran Stensson, Defensor Sverige AB: &amp;quot;PCI DSS - Externa krav och konsulten&amp;quot;&lt;br /&gt;
* Bengt Berg, Cybercom Sweden East AB: &amp;quot;Olika angreppssätt på PCI DSS&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''The meeting is fully booked. But do send an email to John Wilander (john.wilander@omegapoint.se) to say you're interested and we'll let you know if seats become available.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Sweden Hosts the OWASP AppSec Europe Conference 2010'''&lt;br /&gt;
&lt;br /&gt;
We're hosting the European OWASP AppSec conference in 2010! Please read the [http://www.owasp.org/index.php/OWASP_AppSec_Europe_2010_-_Sweden announcement].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting October 6th 2008 -- Security in the Open Source Process'''&lt;br /&gt;
&lt;br /&gt;
The next chapter meeting is Monday October 6th at Clarion Hotel Stockholm (Skanstull). The focus of the seminars will be on &amp;quot;Security in the Open Source Process&amp;quot;. Refreshments will be served from 16:30 and the seminars will commence at 17:30. Except for a closing panel discussion the program contains the following:&lt;br /&gt;
&lt;br /&gt;
* Simon Josefsson, SJD: ”Anekdoter och lärdomar från granskning av säkerhetsprogram”&lt;br /&gt;
* Daniel Stenberg, daniel.haxx.se: ”Säker kod och utveckling i cURL-projektet”&lt;br /&gt;
* Anders Karlsson, MySQL och Sun Microsystems: ”MySQL: Säkerhet i ett kommersiellt open source-projekt”&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Robert Malmgren (anmalan@romab.com) no later than September 29th to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden Meeting May 27th 2008 - SQL Injection, Web Scarab'''&lt;br /&gt;
&lt;br /&gt;
OWASP-Sweden welcomes its members to the next chapter meeting - Tuesday May 27th at Clarion Hotel Stockholm. Refreshments will be served from 17:00, demos will be shown from 17:30, and the seminars will commence at 18:00. The main attractions are:&lt;br /&gt;
 &lt;br /&gt;
* Patrik Karlson, Inspect it: &amp;quot;SQL injection, identifiering och utnyttjande&amp;quot;&lt;br /&gt;
* Johannes Gumbel, TrueSec: &amp;quot;WebScarab—funktioner, fördelar och nackdelar&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to Mattias Bergling (mattias.bergling@inspectit.se) no later than May 21st to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Kick-Off Meeting for OWASP-Sweden April 1st 2008'''&lt;br /&gt;
&lt;br /&gt;
The OWASP-Sweden kick-off will be held at WTC in Stockholm on April 1st. Yeah, it's April Fool's Day but we go under the tagline &amp;quot;Application Security is Not a Joke&amp;quot;. The presentation program includes:&lt;br /&gt;
&lt;br /&gt;
* Andrei Sabelfeld, well-known security researcher from Chalmers&lt;br /&gt;
* Michael Anderberg, Chief Security Advisor at Microsoft Sweden&lt;br /&gt;
* Per Mellstrand, software analyst at Sony Ericsson and researcher at Blekinge Institute of Technology&lt;br /&gt;
&lt;br /&gt;
'''Don't forget to send an email to John Wilander (john.wilander@omegapoint.se) no later than March 27 to say you're coming.''' We need to know how many will turn up.&lt;br /&gt;
&lt;br /&gt;
We're kicking off!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden in Computer Sweden - 08:44, 19 Dec 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Today the Swedish national IT newspaper 'Computer Sweden' published an article on the new OWASP-Sweden chapter - [http://computersweden.idg.se/2.2683/1.137387 ''Mecka för säker programmering till Sverige''], or ''A Mecka for Secure Programming Reaches Sweden'' in English. While OWASP is more than a programmer's guide, Mattias Bergling and I are very happy to get the news out to a large part of Sweden's IT industry.&lt;br /&gt;
&lt;br /&gt;
'''To become a member of Owasp-Sweden just join the [http://lists.owasp.org/mailman/listinfo/owasp-sweden mailing list].'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP-Sweden opens! - 22:25, 01 Oct 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Finally, Sweden has joined the OWASP movement and John Wilander, the local chapter leader, welcomes members to the Stockholm-based OWASP-Sweden. Please, join our mailing list. Plans for meetings and seminars will be made.&lt;br /&gt;
&lt;br /&gt;
Are you interested in helping out? Do you have ideas for great invited speakers or workshop meetings? Feel free to contact the chapter.&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Summit_2011_Browser_Security_Track&amp;diff=102305</id>
		<title>Category:Summit 2011 Browser Security Track</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Summit_2011_Browser_Security_Track&amp;diff=102305"/>
				<updated>2011-01-27T14:45:13Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:T._browser_security.jpg]]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Google-groups-logo-1.jpg|link=https://groups.google.com/group/owasp-summit-browsersec]][https://groups.google.com/group/owasp-summit-browsersec Join the Google Group for this track]&amp;lt;br&amp;gt;&lt;br /&gt;
==== About  ====&lt;br /&gt;
The Browser Security track of the OWASP Summit 2011 is a community effort to bring together browser vendors, major web app providers, and OWASP leaders to discuss what can be done to enhance web security through the browser. The track comprises '''a full day of workshops on chosen subtopics''' (see below). We have invited some of the world's top experts to maximize the chances of moving forward this important area or application security.&lt;br /&gt;
&lt;br /&gt;
Browser vendors attending so far: [http://www.google.com/chrome http://www.owasp.org/images/f/f6/Chrome_small.jpg] [http://www.mozilla.com/en-US/firefox/ http://www.owasp.org/images/4/47/Firefox_small.jpg] [http://ie.microsoft.com/testdrive/info/downloads/Default.html http://www.owasp.org/images/6/62/Internet_explorer_small.jpg]&lt;br /&gt;
&lt;br /&gt;
Major web app providers attending so far: [http://www.paypal.com https://www.owasp.org/images/c/c9/Paypal_logo.gif] [http://www.facebook.com http://www.owasp.org/images/8/8f/Facebook_logo_small.jpg]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/group/owasp-summit-browsersec Join the Google Group for this track] today and get involved in planning, working forms etc.&lt;br /&gt;
&lt;br /&gt;
Welcome!&amp;lt;br&amp;gt;&lt;br /&gt;
/John Wilander, Session Chair&lt;br /&gt;
==== DOM Sandboxing ====&lt;br /&gt;
===Virtualization and Sandboxing for Secure Multi-Domain Web Apps===&lt;br /&gt;
&lt;br /&gt;
[[Image:JS_DOM_Box_Jasvir_Gaz.jpg]]&lt;br /&gt;
&lt;br /&gt;
===Co-chair Dr Jasvir Nagra===&lt;br /&gt;
Jasvir Nagra is a researcher and software engineer at Google. He is the designer of [http://code.google.com/p/google-caja/ Caja] - a secure subset of HTML, CSS and JavaScript; co-author of [http://www.amazon.com/Surreptitious-Software-Obfuscation-Watermarking-Tamperproofing/dp/0321549252 Surreptitious Software] - a book on obfuscation, software watermarking and tamper-proofing, contributer to [http://shindig.apache.org/ Shindig] - the reference implementation of OpenSocial.&lt;br /&gt;
&lt;br /&gt;
===Co-chair Gareth Heyes===&lt;br /&gt;
Gareth &amp;quot;Gaz&amp;quot; Heyes calls himself Chief Conspiracy theorist and is affiliated with Microsoft. He is the designer and developer behind [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=JSReg JSReg] – a Javascript sandbox which converts code using regular expressions; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=HTMLReg HTMLReg] &amp;amp; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=CSSReg CSSReg] – converters of malicious HTML/CSS into a safe form of HTML. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
===Subjects and Goals (draft)===&lt;br /&gt;
Goals and issues that need browser vendor cooperation:&lt;br /&gt;
* '''Attenuated versions of existing apis to sandboxed code'''. How should browsers introduce new apis into the sandbox or allow the sandbox to provide attenuated versions of existing apis to sandboxed code? For example, lets say the sandbox wants to provide an attenuated &amp;quot;alert&amp;quot; function to sandboxed code which does something slightly different than the real &amp;quot;alert&amp;quot;. What kind of apis could the browser provide to safely allow such extensions/apis? Do these need to be standardized such that different sandbox vendors can interoperate.&lt;br /&gt;
* '''Client side sandboxed apps maintaining state and authentication'''. For example if a user is created in a sandboxed app how is it determined what that user can do?&lt;br /&gt;
* '''Create a standard for modifying a sandboxed environment'''&lt;br /&gt;
* '''Deprecate and discourage standards''' which ambiently or undeniably pass credentials. &lt;br /&gt;
* '''Adopt a simpler rights amplification api''' like [http://web-send.org/introducer Web Introducer]&lt;br /&gt;
* '''Create a standard for authentication within a sandboxed environment''' (maybe interfacing with existing auth without passing creds like 0Auth works)&lt;br /&gt;
&lt;br /&gt;
===Working Form===&lt;br /&gt;
The working form will most probably be short presentations to frame the topic and then round table discussions. Depending on number of attendees we'll break into groups.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== HTML5 ====&lt;br /&gt;
===HTML5 Security===&lt;br /&gt;
[[Image:Html5_mario_hackvertor.jpg‎‎]]&lt;br /&gt;
&lt;br /&gt;
===Co-chair Mario Heiderich===&lt;br /&gt;
Mario Heiderich works as a researcher for the Ruhr-University in Bochum, Germany and currently focuses on HTML5, SVG security and security implications of the ES5 specification draft. Mario invoked the [http://html5sec.org/ HTML5 security cheat-sheet] and maintains the [http://php-ids.org/ PHPIDS filter rules]. In his spare time he delivers trainings and security consultancy for larger German and international companies. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
===Co-chair Gareth Heyes===&lt;br /&gt;
Gareth &amp;quot;Gaz&amp;quot; Heyes calls himself Chief Conspiracy theorist and is affiliated with Microsoft. He is the designer and developer behind [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=JSReg JSReg] – a Javascript sandbox which converts code using regular expressions; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=HTMLReg HTMLReg] &amp;amp; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=CSSReg CSSReg] – converters of malicious HTML/CSS into a safe form of HTML. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
===Subjects and Goals (draft)===&lt;br /&gt;
* '''Handle autofocus in a unified and secure way'''. Make sure SOP applies for autofocus usage in frame/iframe'd websites. Re-discuss necessity for (future) attributes like this.&lt;br /&gt;
* '''Discuss necessity and capability for the HTML5 form controls'''. Do we need a non-SOP formaction attribute and why? &lt;br /&gt;
* '''Goal I''': Initiate and create documentation and references for developers that address security issues. Html5sec.org is a start but impossible to continue or extend large scale without vendor help&lt;br /&gt;
* '''Goal II''': Discuss and heavily restrict SVG capabilities - especially when deployed in CSS backgrounds and &amp;lt;img&amp;gt; tags. Mainly Opera and Mozilla are addressed here.&lt;br /&gt;
* '''Long Term Goal(s)''': Provide a working and easy to use as well as vendor supported HTML5 compliant filter software such as HTMLPurifier. Browser vendors should participate in creating security software and filters - not undermine them as we could experience in the last decade&lt;br /&gt;
&lt;br /&gt;
==== EcmaScript 5====&lt;br /&gt;
=== EcmaScript 5 Security ===&lt;br /&gt;
&lt;br /&gt;
===Co-chair Mario Heiderich===&lt;br /&gt;
Mario Heiderich works as a researcher for the Ruhr-University in Bochum, Germany and currently focuses on HTML5, SVG security and security implications of the ES5 specification draft. Mario invoked the [http://html5sec.org/ HTML5 security cheat-sheet] and maintains the [http://php-ids.org/ PHPIDS filter rules]. In his spare time he delivers trainings and security consultancy for larger German and international companies. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
===Co-chair 2===&lt;br /&gt;
To be confirmed.&lt;br /&gt;
&lt;br /&gt;
===Subjects and Goals (draft)===&lt;br /&gt;
* '''Fix the problems with Object.defineProperty() and property unsealing / [https://bugzilla.mozilla.org/show_bug.cgi?id=588138 double-freezing]'''. Implement it if not yet done.&lt;br /&gt;
* '''Goal I''': Raise awareness for the power or object freezing in a security context. ES5 can really make a change here.&lt;br /&gt;
* '''Goal II''': Raise awareness in seeing the DOM as the place where XSS attacks actually take place - and where they should be prevented. CSP is a great yet still immature start - but worth discussing and extending. Discuss specification drafts for a secure DOM and easy to configure capability profiles with reasonable and quantitative proofs of concept.&lt;br /&gt;
* '''Long Term Goal''': Discuss the possibility of vendor supported client side security mechanisms. Client side IDS/IPS based on ES5 can be possible - yet have to be designed and specified. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Site Security Policy ====&lt;br /&gt;
There are several initiatives for expressing and enforcing website security policies. [http://tools.ietf.org/html/draft-hodges-strict-transport-sec-02 HTTP Strict Transport Security] for enforced TLS. [https://developer.mozilla.org/en/Introducing_Content_Security_Policy Content Security Policy] for whitelisting resource domains and enforcing file-only JavaScript. [http://blogs.msdn.com/b/ie/archive/2009/01/27/ie8-security-part-vii-clickjacking-defenses.aspx X-Frame-Options] for enforce framing restrictions. Harmonizing these features among browsers is a huge task. Getting developers to adopt and implement is even more challenging. This session will try to address all of these questions as well as the technical alternatives – headers, meta tags, nonces, signatures, html zones, css-like policies, violation events etc.&lt;br /&gt;
&lt;br /&gt;
* Should we have independent, coherent and simple policy mechanisms or a generalized, extensible policy mechanism?&lt;br /&gt;
* Should developers have multiple choices for expressing policies such as headers ''and'' meta tags?&lt;br /&gt;
* Should policies restrict domains, URLs, or elements? What are the consequences?&lt;br /&gt;
* Should one or two browser vendors deploy a policy mechanism in the field, collect experience, and then we set a standard?&lt;br /&gt;
* How do we help developers understand the need for policies and how do we help them write/generate/maintain policies?&lt;br /&gt;
* How important is performance and web 1.0/web 2.0 compliance? How much of the web can we afford to break? 0 %?&lt;br /&gt;
&lt;br /&gt;
===Co-chair Jeff Hodges===&lt;br /&gt;
Jeff Hodges is Distinguished Security Engineer at PayPal, Inc and one of the three original authors of the [http://tools.ietf.org/html/draft-hodges-strict-transport-sec-02 HTTP Strict Transport Security] spec. Check out his blog [http://identitymeme.org/ IdentityMeme.org].&lt;br /&gt;
&lt;br /&gt;
===Co-chair Michael Coates===&lt;br /&gt;
[http://www.owasp.org/index.php/User:MichaelCoates Michael Coates] is a long-time OWASP contributor and leader, as well as a Mozilla employee. He leads the [http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project AppSensor] and the [http://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet TLS Cheat Sheet] project.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Enduser Warnings ====&lt;br /&gt;
===Enduser Warnings===&lt;br /&gt;
[[Image:Three_browsers_user_info.jpg]]&lt;br /&gt;
&lt;br /&gt;
===Subjects and Goals (draft)===&lt;br /&gt;
Clearly there is a need for warnings that users understand and that conveys the right information. Perhaps we can agree on some guidelines or at least exchange lessons learned.&lt;br /&gt;
&lt;br /&gt;
* How should browsers signal invalid SSL certs to the enduser? Are we helping security right now? What to do about 50 % of users clicking through warnings? Mozilla replaces the padlock with a [https://support.mozilla.com/en-US/kb/Site%20Identity%20Button site identity button] i Firefox 4. &amp;quot;Larry&amp;quot; will inform the user of the site's status. Google recently tried out a skull &amp;amp; bones icon for bad certs but moved back to [http://www.google.com/support/chrome/bin/answer.py?hl=en&amp;amp;answer=95617 padlocks] again.&lt;br /&gt;
* How should browsers communicate other kinds of information such as privacy, malware warnings, &amp;quot;not visited before&amp;quot; etc? Forbes had an interesting example of [http://blogs.forbes.com/kashmirhill/2011/01/05/visualizing-better-privacy-policies/?boxes=Homepagechannels how to visualize privacy].&lt;br /&gt;
&lt;br /&gt;
Some additional information, thoughts and discussions on these subjects elsewhere:&lt;br /&gt;
&lt;br /&gt;
* [http://www.freedom-to-tinker.com/blog/sjs/web-browser-security-user-interfaces-hard-get-right-and-increasingly-inconsistent Web Browser Security User Interfaces: Hard to Get Right and Increasingly Inconsistent], Freedom to Tinker, 18 Jan 2011&lt;br /&gt;
* [http://intrepidusgroup.com/insight/2010/04/security-dialogs-and-graphics/ Security Dialogs and Graphics], Insight, 27 Apr 2010&lt;br /&gt;
* [http://www.w3.org/TR/wsc-ui/ Web Security Context: User Interface Guidelines], W3C, 12 Aug 2010&lt;br /&gt;
* [http://www.clerkendweller.com/2009/7/28/Colour-Overload-with-IE8-Tab-Grouping Colour Overload with IE8 Tab Grouping], Clerkendweller, 28 Jul 2009&lt;br /&gt;
* [http://www.usablesecurity.org/emperor/ The Emperor's New Security Indicators: An evaluation of website authentication and the effect of role playing on usability studies], IEEE Symposium on Security and Privacy, May 2007&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Securing Plugins ====&lt;br /&gt;
===Securing Plugins===&lt;br /&gt;
Should browsers ship with default plugins? Should plugins be auto-updated? Can plugins or versions of plugins be blacklisted centrally?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Blacklisting ====&lt;br /&gt;
===Blacklisting===&lt;br /&gt;
Can we cooperate better on blacklisting? Does it work between cultures, i e can we have the same process for reporting throughout the world?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== OS Integration ====&lt;br /&gt;
===OS Integration===&lt;br /&gt;
More and more features in browsers get integrated with the underlying operating system. Processes, fonts, filesystem, 3D graphics. How do we secure this?&lt;br /&gt;
&lt;br /&gt;
==== Sandboxed Browser ====&lt;br /&gt;
=== Sandboxed Tabs/Domains/Browser ===&lt;br /&gt;
Microsoft Research has been doing some groundbreaking work on the [http://research.microsoft.com/apps/pubs/default.aspx?id=79655 Gazelle browser], Chrome uses a sandboxing model, and the [http://www.romab.com/ironsuite/ IronSuite] provides sandboxed versions of Firefox ([http://www.romab.com/ironfox/ IronFox]) and Safari on Mac OS X.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Questions? Contact [mailto:john.wilander@owasp.org John Wilander, Session Chair]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[Summit_2011|'''Return Global Summit 2011 Home Page''']]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:Category:Summit_2011_Tracks|'''Return to Global Summit 2011 Working Sessions''']]&lt;br /&gt;
&lt;br /&gt;
[[Category:Summit_2011]]&lt;br /&gt;
[[Category: Summit 2011 Tracks]]&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Summit_2011_Browser_Security_Track&amp;diff=102304</id>
		<title>Category:Summit 2011 Browser Security Track</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Summit_2011_Browser_Security_Track&amp;diff=102304"/>
				<updated>2011-01-27T14:44:15Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: Rework of &amp;quot;New HTTP Headers&amp;quot; -&amp;gt; &amp;quot;Site Security Policy&amp;quot;. New agenda, new chair. Switched ordering of &amp;quot;Site Security Policy&amp;quot; and &amp;quot;Enduser Warnings&amp;quot;.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:T._browser_security.jpg]]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Google-groups-logo-1.jpg|link=https://groups.google.com/group/owasp-summit-browsersec]][https://groups.google.com/group/owasp-summit-browsersec Join the Google Group for this track]&amp;lt;br&amp;gt;&lt;br /&gt;
==== About  ====&lt;br /&gt;
The Browser Security track of the OWASP Summit 2011 is a community effort to bring together browser vendors, major web app providers, and OWASP leaders to discuss what can be done to enhance web security through the browser. The track comprises '''a full day of workshops on chosen subtopics''' (see below). We have invited some of the world's top experts to maximize the chances of moving forward this important area or application security.&lt;br /&gt;
&lt;br /&gt;
Browser vendors attending so far: [http://www.google.com/chrome http://www.owasp.org/images/f/f6/Chrome_small.jpg] [http://www.mozilla.com/en-US/firefox/ http://www.owasp.org/images/4/47/Firefox_small.jpg] [http://ie.microsoft.com/testdrive/info/downloads/Default.html http://www.owasp.org/images/6/62/Internet_explorer_small.jpg]&lt;br /&gt;
&lt;br /&gt;
Major web app providers attending so far: [http://www.paypal.com https://www.owasp.org/images/c/c9/Paypal_logo.gif] [http://www.facebook.com http://www.owasp.org/images/8/8f/Facebook_logo_small.jpg]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/group/owasp-summit-browsersec Join the Google Group for this track] today and get involved in planning, working forms etc.&lt;br /&gt;
&lt;br /&gt;
Welcome!&amp;lt;br&amp;gt;&lt;br /&gt;
/John Wilander, Session Chair&lt;br /&gt;
==== DOM Sandboxing ====&lt;br /&gt;
===Virtualization and Sandboxing for Secure Multi-Domain Web Apps===&lt;br /&gt;
&lt;br /&gt;
[[Image:JS_DOM_Box_Jasvir_Gaz.jpg]]&lt;br /&gt;
&lt;br /&gt;
===Co-chair Dr Jasvir Nagra===&lt;br /&gt;
Jasvir Nagra is a researcher and software engineer at Google. He is the designer of [http://code.google.com/p/google-caja/ Caja] - a secure subset of HTML, CSS and JavaScript; co-author of [http://www.amazon.com/Surreptitious-Software-Obfuscation-Watermarking-Tamperproofing/dp/0321549252 Surreptitious Software] - a book on obfuscation, software watermarking and tamper-proofing, contributer to [http://shindig.apache.org/ Shindig] - the reference implementation of OpenSocial.&lt;br /&gt;
&lt;br /&gt;
===Co-chair Gareth Heyes===&lt;br /&gt;
Gareth &amp;quot;Gaz&amp;quot; Heyes calls himself Chief Conspiracy theorist and is affiliated with Microsoft. He is the designer and developer behind [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=JSReg JSReg] – a Javascript sandbox which converts code using regular expressions; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=HTMLReg HTMLReg] &amp;amp; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=CSSReg CSSReg] – converters of malicious HTML/CSS into a safe form of HTML. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
===Subjects and Goals (draft)===&lt;br /&gt;
Goals and issues that need browser vendor cooperation:&lt;br /&gt;
* '''Attenuated versions of existing apis to sandboxed code'''. How should browsers introduce new apis into the sandbox or allow the sandbox to provide attenuated versions of existing apis to sandboxed code? For example, lets say the sandbox wants to provide an attenuated &amp;quot;alert&amp;quot; function to sandboxed code which does something slightly different than the real &amp;quot;alert&amp;quot;. What kind of apis could the browser provide to safely allow such extensions/apis? Do these need to be standardized such that different sandbox vendors can interoperate.&lt;br /&gt;
* '''Client side sandboxed apps maintaining state and authentication'''. For example if a user is created in a sandboxed app how is it determined what that user can do?&lt;br /&gt;
* '''Create a standard for modifying a sandboxed environment'''&lt;br /&gt;
* '''Deprecate and discourage standards''' which ambiently or undeniably pass credentials. &lt;br /&gt;
* '''Adopt a simpler rights amplification api''' like [http://web-send.org/introducer Web Introducer]&lt;br /&gt;
* '''Create a standard for authentication within a sandboxed environment''' (maybe interfacing with existing auth without passing creds like 0Auth works)&lt;br /&gt;
&lt;br /&gt;
===Working Form===&lt;br /&gt;
The working form will most probably be short presentations to frame the topic and then round table discussions. Depending on number of attendees we'll break into groups.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== HTML5 ====&lt;br /&gt;
===HTML5 Security===&lt;br /&gt;
[[Image:Html5_mario_hackvertor.jpg‎‎]]&lt;br /&gt;
&lt;br /&gt;
===Co-chair Mario Heiderich===&lt;br /&gt;
Mario Heiderich works as a researcher for the Ruhr-University in Bochum, Germany and currently focuses on HTML5, SVG security and security implications of the ES5 specification draft. Mario invoked the [http://html5sec.org/ HTML5 security cheat-sheet] and maintains the [http://php-ids.org/ PHPIDS filter rules]. In his spare time he delivers trainings and security consultancy for larger German and international companies. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
===Co-chair Gareth Heyes===&lt;br /&gt;
Gareth &amp;quot;Gaz&amp;quot; Heyes calls himself Chief Conspiracy theorist and is affiliated with Microsoft. He is the designer and developer behind [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=JSReg JSReg] – a Javascript sandbox which converts code using regular expressions; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=HTMLReg HTMLReg] &amp;amp; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=CSSReg CSSReg] – converters of malicious HTML/CSS into a safe form of HTML. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
===Subjects and Goals (draft)===&lt;br /&gt;
* '''Handle autofocus in a unified and secure way'''. Make sure SOP applies for autofocus usage in frame/iframe'd websites. Re-discuss necessity for (future) attributes like this.&lt;br /&gt;
* '''Discuss necessity and capability for the HTML5 form controls'''. Do we need a non-SOP formaction attribute and why? &lt;br /&gt;
* '''Goal I''': Initiate and create documentation and references for developers that address security issues. Html5sec.org is a start but impossible to continue or extend large scale without vendor help&lt;br /&gt;
* '''Goal II''': Discuss and heavily restrict SVG capabilities - especially when deployed in CSS backgrounds and &amp;lt;img&amp;gt; tags. Mainly Opera and Mozilla are addressed here.&lt;br /&gt;
* '''Long Term Goal(s)''': Provide a working and easy to use as well as vendor supported HTML5 compliant filter software such as HTMLPurifier. Browser vendors should participate in creating security software and filters - not undermine them as we could experience in the last decade&lt;br /&gt;
&lt;br /&gt;
==== EcmaScript 5====&lt;br /&gt;
=== EcmaScript 5 Security ===&lt;br /&gt;
&lt;br /&gt;
===Co-chair Mario Heiderich===&lt;br /&gt;
Mario Heiderich works as a researcher for the Ruhr-University in Bochum, Germany and currently focuses on HTML5, SVG security and security implications of the ES5 specification draft. Mario invoked the [http://html5sec.org/ HTML5 security cheat-sheet] and maintains the [http://php-ids.org/ PHPIDS filter rules]. In his spare time he delivers trainings and security consultancy for larger German and international companies. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
===Co-chair 2===&lt;br /&gt;
To be confirmed.&lt;br /&gt;
&lt;br /&gt;
===Subjects and Goals (draft)===&lt;br /&gt;
* '''Fix the problems with Object.defineProperty() and property unsealing / [https://bugzilla.mozilla.org/show_bug.cgi?id=588138 double-freezing]'''. Implement it if not yet done.&lt;br /&gt;
* '''Goal I''': Raise awareness for the power or object freezing in a security context. ES5 can really make a change here.&lt;br /&gt;
* '''Goal II''': Raise awareness in seeing the DOM as the place where XSS attacks actually take place - and where they should be prevented. CSP is a great yet still immature start - but worth discussing and extending. Discuss specification drafts for a secure DOM and easy to configure capability profiles with reasonable and quantitative proofs of concept.&lt;br /&gt;
* '''Long Term Goal''': Discuss the possibility of vendor supported client side security mechanisms. Client side IDS/IPS based on ES5 can be possible - yet have to be designed and specified. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Site Security Policy ====&lt;br /&gt;
There are several initiatives for expressing and enforcing website security policies. [http://tools.ietf.org/html/draft-hodges-strict-transport-sec-02 HTTP Strict Transport Security] for enforced TLS. [https://developer.mozilla.org/en/Introducing_Content_Security_Policy Content Security Policy] for whitelisting resource domains and enforcing file-only JavaScript. [http://blogs.msdn.com/b/ie/archive/2009/01/27/ie8-security-part-vii-clickjacking-defenses.aspx X-Frame-Options] for enforce framing restrictions. Harmonizing these features among browsers is a huge task. Getting developers to adopt and implement is even more challenging. This session will try to address all of these questions as well as the technical alternatives – headers, meta tags, nonces, signatures, html zones, css-like policies, violation events etc.&lt;br /&gt;
&lt;br /&gt;
* Should we have independent, coherent and simple policy mechanisms or a generalized, extensible policy mechanism for scripting?&lt;br /&gt;
* Should developers have multiple choices for expressing policies such as headers ''and'' meta tags?&lt;br /&gt;
* Should policies restrict domains, URLs, or elements? What are the consequences?&lt;br /&gt;
* Should one or two browser vendors deploy a policy mechanism in the field, collect experience, and then we set a standard?&lt;br /&gt;
* How do we help developers understand the need for policies and how do we help them write/generate/maintain policies?&lt;br /&gt;
* How important is performance and web 1.0/web 2.0 compliance? How much of the web can we afford to break? 0 %?&lt;br /&gt;
&lt;br /&gt;
===Co-chair Jeff Hodges===&lt;br /&gt;
Jeff Hodges is Distinguished Security Engineer at PayPal, Inc and one of the three original authors of the [http://tools.ietf.org/html/draft-hodges-strict-transport-sec-02 HTTP Strict Transport Security] spec. Check out his blog [http://identitymeme.org/ IdentityMeme.org].&lt;br /&gt;
&lt;br /&gt;
===Co-chair Michael Coates===&lt;br /&gt;
[http://www.owasp.org/index.php/User:MichaelCoates Michael Coates] is a long-time OWASP contributor and leader, as well as a Mozilla employee. He leads the [http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project AppSensor] and the [http://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet TLS Cheat Sheet] project.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Enduser Warnings ====&lt;br /&gt;
===Enduser Warnings===&lt;br /&gt;
[[Image:Three_browsers_user_info.jpg]]&lt;br /&gt;
&lt;br /&gt;
===Subjects and Goals (draft)===&lt;br /&gt;
Clearly there is a need for warnings that users understand and that conveys the right information. Perhaps we can agree on some guidelines or at least exchange lessons learned.&lt;br /&gt;
&lt;br /&gt;
* How should browsers signal invalid SSL certs to the enduser? Are we helping security right now? What to do about 50 % of users clicking through warnings? Mozilla replaces the padlock with a [https://support.mozilla.com/en-US/kb/Site%20Identity%20Button site identity button] i Firefox 4. &amp;quot;Larry&amp;quot; will inform the user of the site's status. Google recently tried out a skull &amp;amp; bones icon for bad certs but moved back to [http://www.google.com/support/chrome/bin/answer.py?hl=en&amp;amp;answer=95617 padlocks] again.&lt;br /&gt;
* How should browsers communicate other kinds of information such as privacy, malware warnings, &amp;quot;not visited before&amp;quot; etc? Forbes had an interesting example of [http://blogs.forbes.com/kashmirhill/2011/01/05/visualizing-better-privacy-policies/?boxes=Homepagechannels how to visualize privacy].&lt;br /&gt;
&lt;br /&gt;
Some additional information, thoughts and discussions on these subjects elsewhere:&lt;br /&gt;
&lt;br /&gt;
* [http://www.freedom-to-tinker.com/blog/sjs/web-browser-security-user-interfaces-hard-get-right-and-increasingly-inconsistent Web Browser Security User Interfaces: Hard to Get Right and Increasingly Inconsistent], Freedom to Tinker, 18 Jan 2011&lt;br /&gt;
* [http://intrepidusgroup.com/insight/2010/04/security-dialogs-and-graphics/ Security Dialogs and Graphics], Insight, 27 Apr 2010&lt;br /&gt;
* [http://www.w3.org/TR/wsc-ui/ Web Security Context: User Interface Guidelines], W3C, 12 Aug 2010&lt;br /&gt;
* [http://www.clerkendweller.com/2009/7/28/Colour-Overload-with-IE8-Tab-Grouping Colour Overload with IE8 Tab Grouping], Clerkendweller, 28 Jul 2009&lt;br /&gt;
* [http://www.usablesecurity.org/emperor/ The Emperor's New Security Indicators: An evaluation of website authentication and the effect of role playing on usability studies], IEEE Symposium on Security and Privacy, May 2007&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Securing Plugins ====&lt;br /&gt;
===Securing Plugins===&lt;br /&gt;
Should browsers ship with default plugins? Should plugins be auto-updated? Can plugins or versions of plugins be blacklisted centrally?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Blacklisting ====&lt;br /&gt;
===Blacklisting===&lt;br /&gt;
Can we cooperate better on blacklisting? Does it work between cultures, i e can we have the same process for reporting throughout the world?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== OS Integration ====&lt;br /&gt;
===OS Integration===&lt;br /&gt;
More and more features in browsers get integrated with the underlying operating system. Processes, fonts, filesystem, 3D graphics. How do we secure this?&lt;br /&gt;
&lt;br /&gt;
==== Sandboxed Browser ====&lt;br /&gt;
=== Sandboxed Tabs/Domains/Browser ===&lt;br /&gt;
Microsoft Research has been doing some groundbreaking work on the [http://research.microsoft.com/apps/pubs/default.aspx?id=79655 Gazelle browser], Chrome uses a sandboxing model, and the [http://www.romab.com/ironsuite/ IronSuite] provides sandboxed versions of Firefox ([http://www.romab.com/ironfox/ IronFox]) and Safari on Mac OS X.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Questions? Contact [mailto:john.wilander@owasp.org John Wilander, Session Chair]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[Summit_2011|'''Return Global Summit 2011 Home Page''']]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:Category:Summit_2011_Tracks|'''Return to Global Summit 2011 Working Sessions''']]&lt;br /&gt;
&lt;br /&gt;
[[Category:Summit_2011]]&lt;br /&gt;
[[Category: Summit 2011 Tracks]]&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session003&amp;diff=102299</id>
		<title>Summit 2011 Working Sessions/Session003</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session003&amp;diff=102299"/>
				<updated>2011-01-27T13:24:49Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name1 = John Wilander&lt;br /&gt;
| summit_session_attendee_email1 = john.wilander@owasp.org&lt;br /&gt;
| summit_session_attendee_company1=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name2 = Michael Coates&lt;br /&gt;
| summit_session_attendee_email2 = Michael.Coates@owasp.org&lt;br /&gt;
| summit_session_attendee_company2=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name3 = Colin Watson&lt;br /&gt;
| summit_session_attendee_email3 = colin.watson@owasp.org&lt;br /&gt;
| summit_session_attendee_company3=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name4 = Stefano Di Paola&lt;br /&gt;
| summit_session_attendee_email4 = &lt;br /&gt;
| summit_session_attendee_company4=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name5 = Isaac Dawson&lt;br /&gt;
| summit_session_attendee_email5 = &lt;br /&gt;
| summit_session_attendee_company5= Veracode&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name6 = &lt;br /&gt;
| summit_session_attendee_email6 = &lt;br /&gt;
| summit_session_attendee_company6=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name7 = &lt;br /&gt;
| summit_session_attendee_email7 = &lt;br /&gt;
| summit_session_attendee_company7=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name8 = &lt;br /&gt;
| summit_session_attendee_email8 = &lt;br /&gt;
| summit_session_attendee_company8=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name9 = &lt;br /&gt;
| summit_session_attendee_email9 = &lt;br /&gt;
| summit_session_attendee_company9=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name10 = &lt;br /&gt;
| summit_session_attendee_email10 = &lt;br /&gt;
| summit_session_attendee_company10=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name11 = &lt;br /&gt;
| summit_session_attendee_email11 = &lt;br /&gt;
| summit_session_attendee_company11=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name12 = &lt;br /&gt;
| summit_session_attendee_email12 = &lt;br /&gt;
| summit_session_attendee_company12=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name13 = &lt;br /&gt;
| summit_session_attendee_email13 = &lt;br /&gt;
| summit_session_attendee_company13=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name14 = &lt;br /&gt;
| summit_session_attendee_email14 = &lt;br /&gt;
| summit_session_attendee_company14=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name15 = &lt;br /&gt;
| summit_session_attendee_email15 = &lt;br /&gt;
| summit_session_attendee_company15=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name16 = &lt;br /&gt;
| summit_session_attendee_email16 = &lt;br /&gt;
| summit_session_attendee_company16=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name17 = &lt;br /&gt;
| summit_session_attendee_email17 = &lt;br /&gt;
| summit_session_attendee_company17=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name18 = &lt;br /&gt;
| summit_session_attendee_email18 = &lt;br /&gt;
| summit_session_attendee_company18=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name19 = &lt;br /&gt;
| summit_session_attendee_email19 = &lt;br /&gt;
| summit_session_attendee_company19=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name20 = &lt;br /&gt;
| summit_session_attendee_email20 = &lt;br /&gt;
| summit_session_attendee_company20=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20=&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| summit_track_logo = [[Image:T._browser_security.jpg]]&lt;br /&gt;
| summit_ws_logo = [[Image:WS._browser_security.jpg]]&lt;br /&gt;
| summit_session_name = EcmaScript 5 Security&lt;br /&gt;
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session003&lt;br /&gt;
| mailing_list = https://groups.google.com/group/owasp-summit-browsersec&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| short_working_session_description= &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| related_project_name1 = Browser Security Track - main page&lt;br /&gt;
| related_project_url_1 = http://www.owasp.org/index.php/Category:Summit_2011_Browser_Security_Track&lt;br /&gt;
&lt;br /&gt;
| related_project_name2 = Google Group for the Browser Security Track&lt;br /&gt;
| related_project_url_2 = https://groups.google.com/group/owasp-summit-browsersec&lt;br /&gt;
&lt;br /&gt;
| related_project_name3 = &lt;br /&gt;
| related_project_url_3 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name4 = &lt;br /&gt;
| related_project_url_4 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name5 = &lt;br /&gt;
| related_project_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name1= '''Fix the problems with Object.defineProperty() and property unsealing / [https://bugzilla.mozilla.org/show_bug.cgi?id=588138 double-freezing]'''.&amp;lt;noinclude&amp;gt; Implement it if not yet done.&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name2 = &amp;lt;noinclude&amp;gt;'''Goal I''': &amp;lt;/noinclude&amp;gt;Raise awareness for the power or object freezing in a security context. &amp;lt;noinclude&amp;gt;ES5 can really make a change here.&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name3 = &amp;lt;noinclude&amp;gt;'''Goal II''':&amp;lt;/noinclude&amp;gt; Raise awareness in seeing the DOM as the place where XSS attacks actually take place - and where they should be prevented. &amp;lt;noinclude&amp;gt; CSP is a great yet still immature start - but worth discussing and extending. Discuss specification drafts for a secure DOM and easy to configure capability profiles with reasonable and quantitative proofs of concept.&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name4 = '''Long Term Goal''': Discuss the possibility of vendor supported client side security mechanisms. &amp;lt;noinclude&amp;gt;Client side IDS/IPS based on ES5 can be possible - yet have to be designed and specified. &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name5 =  &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_date_and_time = Tuesday, 09 February &amp;lt;br&amp;gt; Time: TBA&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| discussion_model = The working form will most probably be short presentations to frame the topic and then round table discussions. Depending on number of attendees we'll break into groups.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_resources = Projector, whiteboards, markers, Internet connectivity, power&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_additional_details = &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Co-chair Mario Heiderich===&lt;br /&gt;
Mario Heiderich works as a researcher for the Ruhr-University in Bochum, Germany and currently focuses on HTML5, SVG security and security implications of the ES5 specification draft. Mario invoked the [http://html5sec.org/ HTML5 security cheat-sheet] and maintains the [http://php-ids.org/ PHPIDS filter rules]. In his spare time he delivers trainings and security consultancy for larger German and international companies. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
===Co-chair 2===&lt;br /&gt;
To be confirmed.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name1 =  Browser Security Report&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name2 = Browser Security Priority List&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name3 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name4 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name5 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name6 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name7 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name8 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name1 = Mario Heiderich&lt;br /&gt;
| summit_session_leader_email1 = &lt;br /&gt;
| summit_session_leader_username1 =&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name2 = TBC&lt;br /&gt;
| summit_session_leader_email2 = &lt;br /&gt;
| summit_session_leader_username2 =&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name3 =&lt;br /&gt;
| summit_session_leader_email3 = &lt;br /&gt;
| summit_session_leader_username3 =&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_leader_name1 = John Wilander&lt;br /&gt;
| operational_leader_email1 = john.wilander@owasp.org&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| meeting_notes = &lt;br /&gt;
|-&lt;br /&gt;
| session_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Session003&lt;br /&gt;
| session_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Working_Sessions/Session003&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/includeonly&amp;gt;&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session002&amp;diff=102295</id>
		<title>Summit 2011 Working Sessions/Session002</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session002&amp;diff=102295"/>
				<updated>2011-01-27T12:47:58Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name1 = John Wilander&lt;br /&gt;
| summit_session_attendee_email1 = john.wilander@owasp.org&lt;br /&gt;
| summit_session_attendee_company1=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name2 = Michael Coates&lt;br /&gt;
| summit_session_attendee_email2 = Michael.Coates@owasp.org&lt;br /&gt;
| summit_session_attendee_company2=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name3 = Colin Watson&lt;br /&gt;
| summit_session_attendee_email3 = colin.watson@owasp.org&lt;br /&gt;
| summit_session_attendee_company3=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name4 = Stefano Di Paola&lt;br /&gt;
| summit_session_attendee_email4 = &lt;br /&gt;
| summit_session_attendee_company4=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name5 = Isaac Dawson&lt;br /&gt;
| summit_session_attendee_email5 = &lt;br /&gt;
| summit_session_attendee_company5= Veracode&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name6 = &lt;br /&gt;
| summit_session_attendee_email6 = &lt;br /&gt;
| summit_session_attendee_company6=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name7 = &lt;br /&gt;
| summit_session_attendee_email7 = &lt;br /&gt;
| summit_session_attendee_company7=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name8 = &lt;br /&gt;
| summit_session_attendee_email8 = &lt;br /&gt;
| summit_session_attendee_company8=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name9 = &lt;br /&gt;
| summit_session_attendee_email9 = &lt;br /&gt;
| summit_session_attendee_company9=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name10 = &lt;br /&gt;
| summit_session_attendee_email10 = &lt;br /&gt;
| summit_session_attendee_company10=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name11 = &lt;br /&gt;
| summit_session_attendee_email11 = &lt;br /&gt;
| summit_session_attendee_company11=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name12 = &lt;br /&gt;
| summit_session_attendee_email12 = &lt;br /&gt;
| summit_session_attendee_company12=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name13 = &lt;br /&gt;
| summit_session_attendee_email13 = &lt;br /&gt;
| summit_session_attendee_company13=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name14 = &lt;br /&gt;
| summit_session_attendee_email14 = &lt;br /&gt;
| summit_session_attendee_company14=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name15 = &lt;br /&gt;
| summit_session_attendee_email15 = &lt;br /&gt;
| summit_session_attendee_company15=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name16 = &lt;br /&gt;
| summit_session_attendee_email16 = &lt;br /&gt;
| summit_session_attendee_company16=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name17 = &lt;br /&gt;
| summit_session_attendee_email17 = &lt;br /&gt;
| summit_session_attendee_company17=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name18 = &lt;br /&gt;
| summit_session_attendee_email18 = &lt;br /&gt;
| summit_session_attendee_company18=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name19 = &lt;br /&gt;
| summit_session_attendee_email19 = &lt;br /&gt;
| summit_session_attendee_company19=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name20 = &lt;br /&gt;
| summit_session_attendee_email20 = &lt;br /&gt;
| summit_session_attendee_company20=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20=&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| summit_track_logo = [[Image:T._browser_security.jpg]]&lt;br /&gt;
| summit_ws_logo = [[Image:WS._browser_security.jpg]]&lt;br /&gt;
| summit_session_name = HTML5 Security&lt;br /&gt;
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session002&lt;br /&gt;
| mailing_list = https://groups.google.com/group/owasp-summit-browsersec&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| short_working_session_description= &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| related_project_name1 = Browser Security Track - main page&lt;br /&gt;
| related_project_url_1 = http://www.owasp.org/index.php/Category:Summit_2011_Browser_Security_Track&lt;br /&gt;
&lt;br /&gt;
| related_project_name2 = Google Group for the Browser Security Track&lt;br /&gt;
| related_project_url_2 = https://groups.google.com/group/owasp-summit-browsersec&lt;br /&gt;
&lt;br /&gt;
| related_project_name3 = &lt;br /&gt;
| related_project_url_3 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name4 = &lt;br /&gt;
| related_project_url_4 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name5 = &lt;br /&gt;
| related_project_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name1= '''Handle autofocus in a unified and secure way'''.&amp;lt;noinclude&amp;gt; Make sure SOP applies for autofocus usage in frame/iframe'd websites. Re-discuss necessity for (future) attributes like this.&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name2 = '''Discuss necessity and capability for the HTML5 form controls'''.&amp;lt;noinclude&amp;gt; Do we need a non-SOP formaction attribute and why? &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name3 = &amp;lt;noinclude&amp;gt;'''Goal I''':&amp;lt;/noinclude&amp;gt;  Initiate and create documentation and references for developers that address security issues. &amp;lt;noinclude&amp;gt;Html5sec.org is a start but impossible to continue or extend large scale without vendor help&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name4 = &amp;lt;noinclude&amp;gt;'''Goal II''':&amp;lt;/noinclude&amp;gt;Discuss and heavily restrict SVG capabilities - especially when deployed in CSS backgrounds and &amp;lt;img&amp;gt; tags. &amp;lt;noinclude&amp;gt;Mainly Opera and Mozilla are addressed here.&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name5 =   '''Long Term Goal(s)''': Provide a working and easy to use as well as vendor supported HTML5 compliant filter software such as HTMLPurifier. &amp;lt;noinclude&amp;gt;Browser vendors should participate in creating security software and filters - not undermine them as we could experience in the last decade.&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_date_and_time = Tuesday, 09 February &amp;lt;br&amp;gt; Time: TBA&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| discussion_model = The working form will most probably be short presentations to frame the topic and then round table discussions. Depending on number of attendees we'll break into groups.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_resources = Projector, whiteboards, markers, Internet connectivity, power&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_additional_details = &amp;lt;br&amp;gt;&lt;br /&gt;
  &lt;br /&gt;
[[Image:Html5_mario_hackvertor.jpg‎‎]]&lt;br /&gt;
&lt;br /&gt;
===Co-chair Mario Heiderich===&lt;br /&gt;
Mario Heiderich works as a researcher for the Ruhr-University in Bochum, Germany and currently focuses on HTML5, SVG security and security implications of the ES5 specification draft. Mario invoked the [http://html5sec.org/ HTML5 security cheat-sheet] and maintains the [http://php-ids.org/ PHPIDS filter rules]. In his spare time he delivers trainings and security consultancy for larger German and international companies. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
===Co-chair Gareth Heyes===&lt;br /&gt;
Gareth &amp;quot;Gaz&amp;quot; Heyes calls himself Chief Conspiracy theorist and is affiliated with Microsoft. He is the designer and developer behind [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=JSReg JSReg] – a Javascript sandbox which converts code using regular expressions; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=HTMLReg HTMLReg] &amp;amp; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=CSSReg CSSReg] – converters of malicious HTML/CSS into a safe form of HTML. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name1 =  Browser Security Report&lt;br /&gt;
|summit_session_deliverable_url_1 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name2 = Browser Security Priority Report&lt;br /&gt;
|summit_session_deliverable_url_2 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name3 = &lt;br /&gt;
|summit_session_deliverable_url_3 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name4 = &lt;br /&gt;
|summit_session_deliverable_url_4 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name5 = &lt;br /&gt;
|summit_session_deliverable_url_5 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name6 = &lt;br /&gt;
|summit_session_deliverable_url_6 =&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name7 = &lt;br /&gt;
|summit_session_deliverable_url_7 =&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name8 = &lt;br /&gt;
|summit_session_deliverable_url_8 =&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name1 = Mario Heiderich&lt;br /&gt;
| summit_session_leader_email1 = &lt;br /&gt;
| summit_session_leader_username1 =&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name2 = Gareth Heyes&lt;br /&gt;
| summit_session_leader_email2 = gazheyes@gmail.com&lt;br /&gt;
| summit_session_leader_username2 = Gareth Heyes&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name3 =&lt;br /&gt;
| summit_session_leader_email3 = &lt;br /&gt;
| summit_session_leader_username3 =&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_leader_name1 = John Wilander&lt;br /&gt;
| operational_leader_email1 = john.wilander@owasp.org&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| meeting_notes = &lt;br /&gt;
|-&lt;br /&gt;
| session_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Session002&lt;br /&gt;
| session_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Working_Sessions/Session002&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/includeonly&amp;gt;&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session001&amp;diff=102294</id>
		<title>Summit 2011 Working Sessions/Session001</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session001&amp;diff=102294"/>
				<updated>2011-01-27T12:46:43Z</updated>
		
		<summary type="html">&lt;p&gt;John.wilander: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name1 = Email John Wilander if you are unable to edit the Wiki and would like to sign up!&lt;br /&gt;
| summit_session_attendee_email1 = john.wilander@owasp.org&lt;br /&gt;
| summit_session_attendee_company1=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name2 = Michael Coates&lt;br /&gt;
| summit_session_attendee_email2 = &lt;br /&gt;
| summit_session_attendee_company2=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name3 = Colin Watson&lt;br /&gt;
| summit_session_attendee_email3 = &lt;br /&gt;
| summit_session_attendee_company3=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name4 = Stefano Di Paola&lt;br /&gt;
| summit_session_attendee_email4 = &lt;br /&gt;
| summit_session_attendee_company4=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name5 = Isaac Dawson&lt;br /&gt;
| summit_session_attendee_email5 = &lt;br /&gt;
| summit_session_attendee_company5= Veracode&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name6 = &lt;br /&gt;
| summit_session_attendee_email6 = &lt;br /&gt;
| summit_session_attendee_company6=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name7 = &lt;br /&gt;
| summit_session_attendee_email7 = &lt;br /&gt;
| summit_session_attendee_company7=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name8 = &lt;br /&gt;
| summit_session_attendee_email8 = &lt;br /&gt;
| summit_session_attendee_company8=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name9 = &lt;br /&gt;
| summit_session_attendee_email9 = &lt;br /&gt;
| summit_session_attendee_company9=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name10 = &lt;br /&gt;
| summit_session_attendee_email10 = &lt;br /&gt;
| summit_session_attendee_company10=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name11 = &lt;br /&gt;
| summit_session_attendee_email11 = &lt;br /&gt;
| summit_session_attendee_company11=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name12 = &lt;br /&gt;
| summit_session_attendee_email12 = &lt;br /&gt;
| summit_session_attendee_company12=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name13 = &lt;br /&gt;
| summit_session_attendee_email13 = &lt;br /&gt;
| summit_session_attendee_company13=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name14 = &lt;br /&gt;
| summit_session_attendee_email14 = &lt;br /&gt;
| summit_session_attendee_company14=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name15 = &lt;br /&gt;
| summit_session_attendee_email15 = &lt;br /&gt;
| summit_session_attendee_company15=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name16 = &lt;br /&gt;
| summit_session_attendee_email16 = &lt;br /&gt;
| summit_session_attendee_company16=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name17 = &lt;br /&gt;
| summit_session_attendee_email17 = &lt;br /&gt;
| summit_session_attendee_company17=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name18 = &lt;br /&gt;
| summit_session_attendee_email18 = &lt;br /&gt;
| summit_session_attendee_company18=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name19 = &lt;br /&gt;
| summit_session_attendee_email19 = &lt;br /&gt;
| summit_session_attendee_company19=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name20 = &lt;br /&gt;
| summit_session_attendee_email20 = &lt;br /&gt;
| summit_session_attendee_company20=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20=&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| summit_track_logo = [[Image:T._browser_security.jpg]]&lt;br /&gt;
| summit_ws_logo = [[Image:WS._browser_security.jpg]]&lt;br /&gt;
| summit_session_name = DOM Sandboxing&lt;br /&gt;
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session001&lt;br /&gt;
| mailing_list = https://groups.google.com/group/owasp-summit-browsersec&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| short_working_session_description= '''Virtualization and Sandboxing for Secure Multi-Domain Web Apps'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| related_project_name1 = Browser Security Track - main page&lt;br /&gt;
| related_project_url_1 = http://www.owasp.org/index.php/Category:Summit_2011_Browser_Security_Track&lt;br /&gt;
&lt;br /&gt;
| related_project_name2 = Google Group for the Browser Security Track&lt;br /&gt;
| related_project_url_2 = https://groups.google.com/group/owasp-summit-browsersec&lt;br /&gt;
&lt;br /&gt;
| related_project_name3 = &lt;br /&gt;
| related_project_url_3 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name4 = &lt;br /&gt;
| related_project_url_4 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name5 = &lt;br /&gt;
| related_project_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name1= '''Attenuated versions of existing apis to sandboxed code'''. &amp;lt;noinclude&amp;gt;How should browsers introduce new apis into the sandbox or allow the sandbox to provide attenuated versions of existing apis to sandboxed code? For example, lets say the sandbox wants to provide an attenuated &amp;quot;alert&amp;quot; function to sandboxed code which does something slightly different than the real &amp;quot;alert&amp;quot;. What kind of apis could the browser provide to safely allow such extensions/apis? Do these need to be standardized such that different sandbox vendors can interoperate.&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name2 = '''Client side sandboxed apps maintaining state and authentication'''.&amp;lt;noinclude&amp;gt; For example if a user is created in a sandboxed app how is it determined what that user can do?&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name3 = '''Create a standard for modifying a sandboxed environment'''&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name4 = '''Deprecate and discourage standards''' which ambiently or undeniably pass credentials. &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name5 =   '''Create a standard for authentication within a sandboxed environment''' (maybe interfacing with existing auth without passing creds like 0Auth works)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_date_and_time = Tuesday, 09 February &amp;lt;br&amp;gt; Time: TBA&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| discussion_model = The working form will most probably be short presentations to frame the topic and then round table discussions. Depending on number of attendees we'll break into groups.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_resources = Projector, whiteboards, markers, Internet connectivity, power&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_additional_details = &amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:JS_DOM_Box_Jasvir_Gaz.jpg]]&lt;br /&gt;
&lt;br /&gt;
===Co-chair Dr Jasvir Nagra===&lt;br /&gt;
Jasvir Nagra is a researcher and software engineer at Google. He is the designer of [http://code.google.com/p/google-caja/ Caja] - a secure subset of HTML, CSS and JavaScript; co-author of [http://www.amazon.com/Surreptitious-Software-Obfuscation-Watermarking-Tamperproofing/dp/0321549252 Surreptitious Software] - a book on obfuscation, software watermarking and tamper-proofing, contributer to [http://shindig.apache.org/ Shindig] - the reference implementation of OpenSocial.&lt;br /&gt;
&lt;br /&gt;
===Co-chair Gareth Heyes===&lt;br /&gt;
Gareth &amp;quot;Gaz&amp;quot; Heyes calls himself Chief Conspiracy theorist and is affiliated with Microsoft. He is the designer and developer behind [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=JSReg JSReg] – a Javascript sandbox which converts code using regular expressions; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=HTMLReg HTMLReg] &amp;amp; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=CSSReg CSSReg] – converters of malicious HTML/CSS into a safe form of HTML. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name1 = Browser Security Report&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name2 = Browser Security Priority List&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name3 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name4 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name5 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name6 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name7 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name8 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name1 = Dr. Jasvir Nagra&lt;br /&gt;
| summit_session_leader_email1 = &lt;br /&gt;
| summit_session_leader_username1 =&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name2 = Gareth Heyes&lt;br /&gt;
| summit_session_leader_email2 = gazheyes@gmail.com&lt;br /&gt;
| summit_session_leader_username2 = Gareth Heyes&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name3 =&lt;br /&gt;
| summit_session_leader_email3 = &lt;br /&gt;
| summit_session_leader_username3 =&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_leader_name1 = John Wilander&lt;br /&gt;
| operational_leader_email1 = john.wilander@owasp.org&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| meeting_notes = &lt;br /&gt;
|-&lt;br /&gt;
| session_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Session001&lt;br /&gt;
| session_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Working_Sessions/Session001 &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/includeonly&amp;gt;&lt;/div&gt;</summary>
		<author><name>John.wilander</name></author>	</entry>

	</feed>