<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Nishi</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Nishi"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Nishi"/>
		<updated>2026-04-18T09:58:27Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012&amp;diff=140633</id>
		<title>AppSecUSA 2012</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012&amp;diff=140633"/>
				<updated>2012-12-04T03:07:59Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* Blended Threats and JavaScript: A Plan for Permanent Network Compromise */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;AppSec USA 2012 — LASCON Edition, TX&amp;lt;br&amp;gt;&lt;br /&gt;
Austin, TX at the Hyatt Regency Hotel Downtown&amp;lt;br&amp;gt;&lt;br /&gt;
Training: October 23rd-24th — Conference Sessions: October 25th-26th&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in application security.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
For more information on CFP, CFT, Sponsorship, and registration, '''see the official AppSec USA website at [http://www.appsecusa.org http://www.appsecusa.org]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=&amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;AppSec USA 2012 Presentations and Talks&amp;lt;/span&amp;gt;=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Thursday 25th Oct''' ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Thursday)	&amp;lt;/span&amp;gt;===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am  - 11:45 am (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm  - 2:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm  - 3:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm  - 4:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== '''Friday 26th Oct''' ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am - 11:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;1:00 pm - 1:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm - 2:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm - 3:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm - 4:45 pm (Friday)&amp;lt;/span&amp;gt; === &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012&amp;diff=140632</id>
		<title>AppSecUSA 2012</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012&amp;diff=140632"/>
				<updated>2012-12-04T03:07:21Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* Blended Threats and JavaScript: A Plan for Permanent Network Compromise */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;AppSec USA 2012 — LASCON Edition, TX&amp;lt;br&amp;gt;&lt;br /&gt;
Austin, TX at the Hyatt Regency Hotel Downtown&amp;lt;br&amp;gt;&lt;br /&gt;
Training: October 23rd-24th — Conference Sessions: October 25th-26th&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in application security.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
For more information on CFP, CFT, Sponsorship, and registration, '''see the official AppSec USA website at [http://www.appsecusa.org http://www.appsecusa.org]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=&amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;AppSec USA 2012 Presentations and Talks&amp;lt;/span&amp;gt;=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Thursday 25th Oct''' ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Thursday)	&amp;lt;/span&amp;gt;===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am  - 11:45 am (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm  - 2:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm  - 3:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm  - 4:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== '''Friday 26th Oct''' ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am - 11:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation Not Available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;1:00 pm - 1:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm - 2:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm - 3:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm - 4:45 pm (Friday)&amp;lt;/span&amp;gt; === &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012&amp;diff=140630</id>
		<title>AppSecUSA 2012</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012&amp;diff=140630"/>
				<updated>2012-12-04T02:49:32Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* 11:00 am - 11:45 am (Friday) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;AppSec USA 2012 — LASCON Edition, TX&amp;lt;br&amp;gt;&lt;br /&gt;
Austin, TX at the Hyatt Regency Hotel Downtown&amp;lt;br&amp;gt;&lt;br /&gt;
Training: October 23rd-24th — Conference Sessions: October 25th-26th&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in application security.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
For more information on CFP, CFT, Sponsorship, and registration, '''see the official AppSec USA website at [http://www.appsecusa.org http://www.appsecusa.org]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=&amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;AppSec USA 2012 Presentations and Talks&amp;lt;/span&amp;gt;=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Thursday 25th Oct''' ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Thursday)	&amp;lt;/span&amp;gt;===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am  - 11:45 am (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm  - 2:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm  - 3:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm  - 4:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== '''Friday 26th Oct''' ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am - 11:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;1:00 pm - 1:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm - 2:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm - 3:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm - 4:45 pm (Friday)&amp;lt;/span&amp;gt; === &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012&amp;diff=139830</id>
		<title>AppSecUSA 2012</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012&amp;diff=139830"/>
				<updated>2012-11-19T05:16:57Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* Friday 26th Oct */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;AppSec USA 2012 — LASCON Edition, TX&amp;lt;br&amp;gt;&lt;br /&gt;
Austin, TX at the Hyatt Regency Hotel Downtown&amp;lt;br&amp;gt;&lt;br /&gt;
Training: October 23rd-24th — Conference Sessions: October 25th-26th&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in application security.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
For more information on CFP, CFT, Sponsorship, and registration, '''see the official AppSec USA website at [http://www.appsecusa.org http://www.appsecusa.org]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=&amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;AppSec USA 2012 Presentations and Talks&amp;lt;/span&amp;gt;=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Thursday 25th Oct''' ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Thursday)	&amp;lt;/span&amp;gt;===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am  - 11:45 am (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm  - 2:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm  - 3:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm  - 4:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== '''Friday 26th Oct''' ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am - 11:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;1:00 pm - 1:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm - 2:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm - 3:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm - 4:45 pm (Friday)&amp;lt;/span&amp;gt; === &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012&amp;diff=139829</id>
		<title>AppSecUSA 2012</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012&amp;diff=139829"/>
				<updated>2012-11-19T05:16:12Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;AppSec USA 2012 — LASCON Edition, TX&amp;lt;br&amp;gt;&lt;br /&gt;
Austin, TX at the Hyatt Regency Hotel Downtown&amp;lt;br&amp;gt;&lt;br /&gt;
Training: October 23rd-24th — Conference Sessions: October 25th-26th&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in application security.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
For more information on CFP, CFT, Sponsorship, and registration, '''see the official AppSec USA website at [http://www.appsecusa.org http://www.appsecusa.org]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=&amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;AppSec USA 2012 Presentations and Talks&amp;lt;/span&amp;gt;=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Thursday 25th Oct''' ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Thursday)	&amp;lt;/span&amp;gt;===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am  - 11:45 am (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm  - 2:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm  - 3:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm  - 4:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am - 11:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;1:00 pm - 1:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm - 2:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm - 3:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm - 4:45 pm (Friday)&amp;lt;/span&amp;gt; === &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012&amp;diff=139828</id>
		<title>AppSecUSA 2012</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012&amp;diff=139828"/>
				<updated>2012-11-19T05:02:02Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;AppSec USA 2012 — LASCON Edition, TX&amp;lt;br&amp;gt;&lt;br /&gt;
Austin, TX at the Hyatt Regency Hotel Downtown&amp;lt;br&amp;gt;&lt;br /&gt;
Training: October 23rd-24th — Conference Sessions: October 25th-26th&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in application security.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
For more information on CFP, CFT, Sponsorship, and registration, '''see the official AppSec USA website at [http://www.appsecusa.org http://www.appsecusa.org]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Thursday)	&amp;lt;/span&amp;gt;===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am  - 11:45 am (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm  - 2:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm  - 3:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm  - 4:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am - 11:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;1:00 pm - 1:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm - 2:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm - 3:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm - 4:45 pm (Friday)&amp;lt;/span&amp;gt; === &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139810</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139810"/>
				<updated>2012-11-18T23:39:41Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* Building Predictable Systems using Behavioral Security Modeling: Functional Security Requirements */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Thursday)	&amp;lt;/span&amp;gt;===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am  - 11:45 am (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm  - 2:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm  - 3:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm  - 4:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am - 11:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;1:00 pm - 1:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm - 2:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm - 3:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm - 4:45 pm (Friday)&amp;lt;/span&amp;gt; === &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139809</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139809"/>
				<updated>2012-11-18T23:39:00Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Thursday)	&amp;lt;/span&amp;gt;===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== &amp;lt;span style=&amp;quot;color:#666666;&amp;quot;&amp;gt;Building Predictable Systems using Behavioral Security Modeling: Functional Security Requirements&amp;lt;/span&amp;gt; ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am  - 11:45 am (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm  - 2:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm  - 3:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm  - 4:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am - 11:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;1:00 pm - 1:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm - 2:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm - 3:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm - 4:45 pm (Friday)&amp;lt;/span&amp;gt; === &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139807</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139807"/>
				<updated>2012-11-18T19:33:48Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* 4:00 pm - 4:45 pm  */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Thursday)	&amp;lt;/span&amp;gt;===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am  - 11:45 am (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm  - 2:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm  - 3:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm  - 4:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am - 11:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;1:00 pm - 1:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm - 2:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm - 3:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm - 4:45 pm (Friday)&amp;lt;/span&amp;gt; === &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139806</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139806"/>
				<updated>2012-11-18T19:33:37Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* 3:00 pm - 3:45 pm  */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Thursday)	&amp;lt;/span&amp;gt;===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am  - 11:45 am (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm  - 2:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm  - 3:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm  - 4:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am - 11:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;1:00 pm - 1:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm - 2:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm - 3:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm - 4:45 pm &amp;lt;/span&amp;gt; === &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139805</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139805"/>
				<updated>2012-11-18T19:33:24Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* 2:00 pm - 2:45 pm  */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Thursday)	&amp;lt;/span&amp;gt;===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am  - 11:45 am (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm  - 2:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm  - 3:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm  - 4:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am - 11:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;1:00 pm - 1:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm - 2:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm - 3:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm - 4:45 pm &amp;lt;/span&amp;gt; === &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139804</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139804"/>
				<updated>2012-11-18T19:33:12Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* 1:00 pm - 1:45 pm  */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Thursday)	&amp;lt;/span&amp;gt;===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am  - 11:45 am (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm  - 2:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm  - 3:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm  - 4:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am - 11:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;1:00 pm - 1:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm - 2:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm - 3:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm - 4:45 pm &amp;lt;/span&amp;gt; === &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139803</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139803"/>
				<updated>2012-11-18T19:32:57Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* 11:00 am - 11:45 am  */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Thursday)	&amp;lt;/span&amp;gt;===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am  - 11:45 am (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm  - 2:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm  - 3:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm  - 4:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am - 11:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;1:00 pm - 1:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm - 2:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm - 3:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm - 4:45 pm &amp;lt;/span&amp;gt; === &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139802</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139802"/>
				<updated>2012-11-18T19:32:44Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* 10:00 am - 10:45 am  */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Thursday)	&amp;lt;/span&amp;gt;===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am  - 11:45 am (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm  - 2:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm  - 3:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm  - 4:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am - 11:45 am &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;1:00 pm - 1:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm - 2:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm - 3:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm - 4:45 pm &amp;lt;/span&amp;gt; === &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139801</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139801"/>
				<updated>2012-11-18T19:32:17Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* 4:00 pm  - 4:45 pm  */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Thursday)	&amp;lt;/span&amp;gt;===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am  - 11:45 am (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm  - 2:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm  - 3:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm  - 4:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am - 11:45 am &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;1:00 pm - 1:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm - 2:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm - 3:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm - 4:45 pm &amp;lt;/span&amp;gt; === &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139800</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139800"/>
				<updated>2012-11-18T19:32:06Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* 3:00 pm  - 3:45 pm  */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Thursday)	&amp;lt;/span&amp;gt;===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am  - 11:45 am (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm  - 2:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm  - 3:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm  - 4:45 pm &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am - 11:45 am &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;1:00 pm - 1:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm - 2:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm - 3:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm - 4:45 pm &amp;lt;/span&amp;gt; === &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139799</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139799"/>
				<updated>2012-11-18T19:31:41Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* 2:00 pm  - 2:45 pm  */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Thursday)	&amp;lt;/span&amp;gt;===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am  - 11:45 am (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm  - 2:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm  - 3:45 pm &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm  - 4:45 pm &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am - 11:45 am &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;1:00 pm - 1:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm - 2:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm - 3:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm - 4:45 pm &amp;lt;/span&amp;gt; === &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139798</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139798"/>
				<updated>2012-11-18T19:31:25Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* 11:00 am  - 11:45 am  */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Thursday)	&amp;lt;/span&amp;gt;===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am  - 11:45 am (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm  - 2:45 pm &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm  - 3:45 pm &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm  - 4:45 pm &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am - 11:45 am &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;1:00 pm - 1:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm - 2:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm - 3:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm - 4:45 pm &amp;lt;/span&amp;gt; === &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139797</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139797"/>
				<updated>2012-11-18T19:30:53Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* 10:00 am - 10:45 am 	 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Thursday)	&amp;lt;/span&amp;gt;===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am  - 11:45 am &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm  - 2:45 pm &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm  - 3:45 pm &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm  - 4:45 pm &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am - 11:45 am &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;1:00 pm - 1:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm - 2:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm - 3:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm - 4:45 pm &amp;lt;/span&amp;gt; === &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139796</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139796"/>
				<updated>2012-11-18T19:28:01Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am 	&amp;lt;/span&amp;gt;===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am  - 11:45 am &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm  - 2:45 pm &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm  - 3:45 pm &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm  - 4:45 pm &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am - 11:45 am &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;1:00 pm - 1:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm - 2:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm - 3:45 pm &amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm - 4:45 pm &amp;lt;/span&amp;gt; === &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139795</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139795"/>
				<updated>2012-11-18T19:23:08Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 === 4:00 pm - 4:45 pm === &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139794</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139794"/>
				<updated>2012-11-18T19:21:51Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* 4:00 pm - 4:45 pm */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 === &amp;lt;span style=&amp;quot;color:#006699;&amp;quot; &amp;gt;4:00 pm - 4:45 pm&amp;lt;/span&amp;gt; 	=== &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139793</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139793"/>
				<updated>2012-11-18T19:15:26Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* Hack your way to a degree: a new direction in teaching application security at universities */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm - 4:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139792</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139792"/>
				<updated>2012-11-18T19:14:48Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree: a new direction in teaching application security at universities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm - 4:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139791</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139791"/>
				<updated>2012-11-18T19:13:00Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree: a new direction in teaching application security at universities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm - 4:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139790</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139790"/>
				<updated>2012-11-18T19:11:22Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree: a new direction in teaching application security at universities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
=== 4:00 pm - 4:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139789</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139789"/>
				<updated>2012-11-18T18:58:42Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree: a new direction in teaching application security at universities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 4:00 pm - 4:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139788</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139788"/>
				<updated>2012-11-18T18:56:46Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree: a new direction in teaching application security at universities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 4:00 pm - 4:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139787</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139787"/>
				<updated>2012-11-18T18:46:50Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk''' | Rugged devops | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
*'''Ryan Barnett''' | Attack | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
*'''Sherif Koussa''' | Developer | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
*'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
*'''Jon Mccoy''' | Reverse Engineering | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
*'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
*'''Vaagn Toukharian''' | Attack | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
*'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
*'''Mathew Rowley''' | Mobile | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
*'''Jerry Hoff''' | Developer | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
*'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
*'''Michele Orru''' | Attack | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
*'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
*'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
*'''Ofer Maor''' | Developer | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
*'''Nick Galbreath''' | Rugged devops | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
*'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
*'''John Steven''' | Developer | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
*'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
*'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
*'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
*'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
*'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
*'''Simon Roses Femerling''' | Architecture | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
*'''David Kennedy''' | Attack | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
*'''Richard Bejtlich''' | Case Studies | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
*'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
*'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree: a new direction in teaching application security at universities - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
*'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
*'''Phil Purviance''' | Attack | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
*'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
*'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
*'''Jason Chan''' | Cloud | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
*'''Will Urbanski''' | Architecture | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
*'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
*'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
*'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
*'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
*'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
*'''Shreeraj Shah''' | Attack | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
*'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
*'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
*'''Alex Russell''' | Developer | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
*'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
*'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
*'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 4:00 pm - 4:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
*'''Yvan Boily''' | Developer | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
*'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
*'''Wendy Nather''' | Architecture | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
*'''Fred Donovan''' | Attack | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
*'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139786</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139786"/>
				<updated>2012-11-18T18:39:09Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
*'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
*'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
*'''Dan Amodio''' | Mobile | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
*'''Alejandro Caceres''' | Reverse Engineering | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
*'''Jeremiah Shirk''' | Rugged devops | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
*'''Ryan Barnett''' | Attack | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
*'''Sherif Koussa''' | Developer | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
*'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
*'''Jon Mccoy''' | Reverse Engineering | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
*'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
*'''Vaagn Toukharian''' | Attack | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
*'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
*'''Mathew Rowley''' | Mobile | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
*'''Jerry Hoff''' | Developer | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
*'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
*'''Michele Orru''' | Attack | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
*'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
*'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
*'''Ofer Maor''' | Developer | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
*'''Nick Galbreath''' | Rugged devops | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
*'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
*'''John Steven''' | Developer | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
*'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
*'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
*'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
*'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
*'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
*'''Simon Roses Femerling''' | Architecture | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
*'''David Kennedy''' | Attack | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
*'''Richard Bejtlich''' | Case Studies | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
*'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
*'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree: a new direction in teaching application security at universities - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
*'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
*'''Phil Purviance''' | Attack | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
*'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
*'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
*'''Jason Chan''' | Cloud | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
*'''Will Urbanski''' | Architecture | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
*'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
*'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
*'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
*'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
*'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
*'''Shreeraj Shah''' | Attack | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
*'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
*'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
*'''Alex Russell''' | Developer | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
*'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
*'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
*'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 4:00 pm - 4:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
*'''Yvan Boily''' | Developer | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
*'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
*'''Wendy Nather''' | Architecture | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
*'''Fred Donovan''' | Attack | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
*'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139785</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139785"/>
				<updated>2012-11-18T18:26:37Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
*'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
*'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
*'''Dan Amodio''' | Mobile | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
*'''Alejandro Caceres''' | Reverse Engineering | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
*'''Jeremiah Shirk''' | Rugged devops | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
*'''Ryan Barnett''' | Attack | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
*'''Sherif Koussa''' | Developer | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
*'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
*'''Jon Mccoy''' | Reverse Engineering | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
*'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
*'''Vaagn Toukharian''' | Attack | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
*'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
*'''Mathew Rowley''' | Mobile | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
*'''Jerry Hoff''' | Developer | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
*'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
*'''Michele Orru''' | Attack | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
*'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
*'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
*'''Ofer Maor''' | Developer | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
*'''Nick Galbreath''' | Rugged devops | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
*'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
*'''John Steven''' | Developer | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
*'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
*'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
*'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
*'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
*'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
*'''Simon Roses Femerling''' | Architecture | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
*'''David Kennedy''' | Attack | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
*'''Richard Bejtlich''' | Case Studies | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
*'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
*'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree: a new direction in teaching application security at universities - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
*'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
*'''Phil Purviance''' | Attack | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
*'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
*'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
*'''Jason Chan''' | Cloud | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
*'''Will Urbanski''' | Architecture | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
*'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
*'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
*'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
*'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
*'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
*'''Shreeraj Shah''' | Attack | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
*'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
*'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
*'''Alex Russell''' | Developer | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
*'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
*'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
*'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 4:00 pm - 4:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
*'''Yvan Boily''' | Developer | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
*'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
*'''Wendy Nather''' | Architecture | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
*'''Fred Donovan''' | Attack | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
*'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139784</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139784"/>
				<updated>2012-11-18T18:23:35Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;0&amp;quot; cellspading=&amp;quot;0&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
*'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
*'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
*'''Dan Amodio''' | Mobile | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
*'''Alejandro Caceres''' | Reverse Engineering | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
*'''Jeremiah Shirk''' | Rugged devops | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
*'''Ryan Barnett''' | Attack | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
*'''Sherif Koussa''' | Developer | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
*'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
*'''Jon Mccoy''' | Reverse Engineering | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
*'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
*'''Vaagn Toukharian''' | Attack | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
*'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
*'''Mathew Rowley''' | Mobile | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
*'''Jerry Hoff''' | Developer | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
*'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
*'''Michele Orru''' | Attack | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
*'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
*'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
*'''Ofer Maor''' | Developer | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
*'''Nick Galbreath''' | Rugged devops | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
*'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
*'''John Steven''' | Developer | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
*'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
*'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
*'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;0&amp;quot; cellspading=&amp;quot;0&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
*'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
*'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
*'''Simon Roses Femerling''' | Architecture | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
*'''David Kennedy''' | Attack | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
*'''Richard Bejtlich''' | Case Studies | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
*'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
*'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree: a new direction in teaching application security at universities - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
*'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
*'''Phil Purviance''' | Attack | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
*'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
*'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
*'''Jason Chan''' | Cloud | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
*'''Will Urbanski''' | Architecture | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
*'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
*'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
*'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
*'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
*'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
*'''Shreeraj Shah''' | Attack | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
*'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
*'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
*'''Alex Russell''' | Developer | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
*'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
*'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
*'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 4:00 pm - 4:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
*'''Yvan Boily''' | Developer | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
*'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
*'''Wendy Nather''' | Architecture | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
*'''Fred Donovan''' | Attack | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
*'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139783</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139783"/>
				<updated>2012-11-18T18:18:16Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;0&amp;quot; cellspading=&amp;quot;0&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
*'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
*'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
*'''Dan Amodio''' | Mobile | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
*'''Alejandro Caceres''' | Reverse Engineering | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
*'''Jeremiah Shirk''' | Rugged devops | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
*'''Ryan Barnett''' | Attack | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
*'''Sherif Koussa''' | Developer | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
*'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
*'''Jon Mccoy''' | Reverse Engineering | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
*'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
*'''Vaagn Toukharian''' | Attack | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
*'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
*'''Mathew Rowley''' | Mobile | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
*'''Jerry Hoff''' | Developer | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
*'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
*'''Michele Orru''' | Attack | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
*'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
*'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
*'''Ofer Maor''' | Developer | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
*'''Nick Galbreath''' | Rugged devops | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
*'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
*'''John Steven''' | Developer | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
*'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
*'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
*'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
*'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
*'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
*'''Simon Roses Femerling''' | Architecture | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
*'''David Kennedy''' | Attack | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
*'''Richard Bejtlich''' | Case Studies | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
*'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
*'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree: a new direction in teaching application security at universities - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
*'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
*'''Phil Purviance''' | Attack | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
*'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
*'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
*'''Jason Chan''' | Cloud | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
*'''Will Urbanski''' | Architecture | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
*'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
*'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
*'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
*'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
*'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
*'''Shreeraj Shah''' | Attack | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
*'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
*'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
*'''Alex Russell''' | Developer | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
*'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
*'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
*'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
=== 4:00 pm - 4:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
*'''Yvan Boily''' | Developer | Presentation not available&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
*'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
*'''Wendy Nather''' | Architecture | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
*'''Fred Donovan''' | Attack | Presentation not available &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
*'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139782</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139782"/>
				<updated>2012-11-18T16:56:12Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* SQL Server Exploitation, Escalation, and Pilfering */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== 	&lt;br /&gt;
*'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
*'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
*'''Dan Amodio''' | Mobile | Presentation not available &lt;br /&gt;
&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
*'''Alejandro Caceres''' | Reverse Engineering | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
*'''Jeremiah Shirk''' | Rugged devops | Presentation not available&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
*'''Ryan Barnett''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
*'''Sherif Koussa''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
*'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
*'''Jon Mccoy''' | Reverse Engineering | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
*'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
*'''Vaagn Toukharian''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
*'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&lt;br /&gt;
&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
*'''Mathew Rowley''' | Mobile | Presentation not available&lt;br /&gt;
	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
*'''Jerry Hoff''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
*'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &lt;br /&gt;
 &lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
*'''Michele Orru''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
*'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
*'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&lt;br /&gt;
&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
*'''Ofer Maor''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
*'''Nick Galbreath''' | Rugged devops | Presentation not available &lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
*'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
*'''John Steven''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
*'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
*'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&lt;br /&gt;
&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
*'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
*'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
*'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
*'''Simon Roses Femerling''' | Architecture | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
*'''David Kennedy''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
*'''Richard Bejtlich''' | Case Studies | Presentation not available&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
*'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
*'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree: a new direction in teaching application security at universities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
*'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
*'''Phil Purviance''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
*'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&lt;br /&gt;
&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
*'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
*'''Jason Chan''' | Cloud | Presentation not available &lt;br /&gt;
 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
*'''Will Urbanski''' | Architecture | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
*'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
*'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
*'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
*'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
*'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs - PDF]&lt;br /&gt;
&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
*'''Shreeraj Shah''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
*'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&lt;br /&gt;
&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
*'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
*'''Alex Russell''' | Developer | Presentation not available &lt;br /&gt;
 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
*'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
*'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
*'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm - 4:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
*'''Yvan Boily''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
*'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
*'''Wendy Nather''' | Architecture | Presentation not available &lt;br /&gt;
&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
*'''Fred Donovan''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
*'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139781</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139781"/>
				<updated>2012-11-18T16:55:56Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== 	&lt;br /&gt;
*'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
*'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
*'''Dan Amodio''' | Mobile | Presentation not available &lt;br /&gt;
&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
*'''Alejandro Caceres''' | Reverse Engineering | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
*'''Jeremiah Shirk''' | Rugged devops | Presentation not available&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
*'''Ryan Barnett''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
*'''Sherif Koussa''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
*'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
*'''Jon Mccoy''' | Reverse Engineering | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
*'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
*'''Vaagn Toukharian''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
*'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&lt;br /&gt;
&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
*'''Mathew Rowley''' | Mobile | Presentation not available&lt;br /&gt;
	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
*'''Jerry Hoff''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
*'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &lt;br /&gt;
 &lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
*'''Michele Orru''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
*'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
*'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&lt;br /&gt;
&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
*'''Ofer Maor''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
*'''Nick Galbreath''' | Rugged devops | Presentation not available &lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
*'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
*'''John Steven''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
*'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
*'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&lt;br /&gt;
&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
*'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
*'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
*'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
*'''Simon Roses Femerling''' | Architecture | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
*'''David Kennedy''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
*'''Richard Bejtlich''' | Case Studies | Presentation not available&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
*'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
*'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree: a new direction in teaching application security at universities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
*'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
*'''Phil Purviance''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
*'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&lt;br /&gt;
&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
*'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
*'''Jason Chan''' | Cloud | Presentation not available &lt;br /&gt;
 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
*'''Will Urbanski''' | Architecture | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
*'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation Not available &lt;br /&gt;
	&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
*'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
*'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
*'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
*'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs - PDF]&lt;br /&gt;
&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
*'''Shreeraj Shah''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
*'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&lt;br /&gt;
&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
*'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
*'''Alex Russell''' | Developer | Presentation not available &lt;br /&gt;
 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
*'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
*'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
*'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm - 4:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
*'''Yvan Boily''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
*'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
*'''Wendy Nather''' | Architecture | Presentation not available &lt;br /&gt;
&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
*'''Fred Donovan''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
*'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139780</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139780"/>
				<updated>2012-11-18T16:54:38Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* Gauntlt: Rugged by Example */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== 	&lt;br /&gt;
*'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
*'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
*'''Dan Amodio''' | Mobile | Presentation not available &lt;br /&gt;
&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
*'''Alejandro Caceres''' | Reverse Engineering | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
*'''Jeremiah Shirk''' | Rugged devops | Presentation not available&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
*'''Ryan Barnett''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
*'''Sherif Koussa''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
*'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
*'''Jon Mccoy''' | Reverse Engineering | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
*'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
*'''Vaagn Toukharian''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
*'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&lt;br /&gt;
&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
*'''Mathew Rowley''' | Mobile | Presentation not available&lt;br /&gt;
	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
*'''Jerry Hoff''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
*'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &lt;br /&gt;
 &lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
*'''Michele Orru''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
*'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
*'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&lt;br /&gt;
&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
*'''Ofer Maor''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
*'''Nick Galbreath''' | Rugged devops | Presentation not available &lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
*'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
*'''John Steven''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
*'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
*'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&lt;br /&gt;
&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
*'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
*'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
*'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
*'''Simon Roses Femerling''' | Architecture | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
*'''David Kennedy''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
*'''Richard Bejtlich''' | Case Studies | Presentation not available&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
*'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
*'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree: a new direction in teaching application security at universities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
*'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
*'''Phil Purviance''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
*'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation Not available&lt;br /&gt;
&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
*'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
*'''Jason Chan''' | Cloud | Presentation not available &lt;br /&gt;
 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
*'''Will Urbanski''' | Architecture | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
*'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation Not available &lt;br /&gt;
	&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
*'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
*'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
*'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
*'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs - PDF]&lt;br /&gt;
&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
*'''Shreeraj Shah''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
*'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&lt;br /&gt;
&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
*'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
*'''Alex Russell''' | Developer | Presentation not available &lt;br /&gt;
 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
*'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
*'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
*'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm - 4:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
*'''Yvan Boily''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
*'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
*'''Wendy Nather''' | Architecture | Presentation not available &lt;br /&gt;
&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
*'''Fred Donovan''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
*'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139779</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139779"/>
				<updated>2012-11-18T16:53:55Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* NoSQL, no security? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== 	&lt;br /&gt;
*'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
*'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
*'''Dan Amodio''' | Mobile | Presentation not available &lt;br /&gt;
&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
*'''Alejandro Caceres''' | Reverse Engineering | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
*'''Jeremiah Shirk''' | Rugged devops | PDF&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
*'''Ryan Barnett''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
*'''Sherif Koussa''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
*'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
*'''Jon Mccoy''' | Reverse Engineering | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
*'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
*'''Vaagn Toukharian''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
*'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&lt;br /&gt;
&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
*'''Mathew Rowley''' | Mobile | Presentation not available&lt;br /&gt;
	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
*'''Jerry Hoff''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
*'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &lt;br /&gt;
 &lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
*'''Michele Orru''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
*'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
*'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&lt;br /&gt;
&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
*'''Ofer Maor''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
*'''Nick Galbreath''' | Rugged devops | Presentation not available &lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
*'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
*'''John Steven''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
*'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
*'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&lt;br /&gt;
&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
*'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
*'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
*'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
*'''Simon Roses Femerling''' | Architecture | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
*'''David Kennedy''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
*'''Richard Bejtlich''' | Case Studies | Presentation not available&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
*'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
*'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree: a new direction in teaching application security at universities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
*'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
*'''Phil Purviance''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
*'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation Not available&lt;br /&gt;
&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
*'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
*'''Jason Chan''' | Cloud | Presentation not available &lt;br /&gt;
 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
*'''Will Urbanski''' | Architecture | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
*'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation Not available &lt;br /&gt;
	&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
*'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
*'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
*'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
*'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs - PDF]&lt;br /&gt;
&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
*'''Shreeraj Shah''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
*'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&lt;br /&gt;
&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
*'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
*'''Alex Russell''' | Developer | Presentation not available &lt;br /&gt;
 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
*'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
*'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
*'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm - 4:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
*'''Yvan Boily''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
*'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
*'''Wendy Nather''' | Architecture | Presentation not available &lt;br /&gt;
&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
*'''Fred Donovan''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
*'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139778</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139778"/>
				<updated>2012-11-18T16:53:39Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== 	&lt;br /&gt;
*'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
*'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
*'''Dan Amodio''' | Mobile | Presentation not available &lt;br /&gt;
&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
*'''Alejandro Caceres''' | Reverse Engineering | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
*'''Jeremiah Shirk''' | Rugged devops | PDF&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
*'''Ryan Barnett''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
*'''Sherif Koussa''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
*'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
*'''Jon Mccoy''' | Reverse Engineering | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
*'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
*'''Vaagn Toukharian''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
*'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&lt;br /&gt;
&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
*'''Mathew Rowley''' | Mobile | Presentation not available&lt;br /&gt;
	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
*'''Jerry Hoff''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
*'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &lt;br /&gt;
 &lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
*'''Michele Orru''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
*'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
*'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&lt;br /&gt;
&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
*'''Ofer Maor''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
*'''Nick Galbreath''' | Rugged devops | Presentation not available &lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
*'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
*'''John Steven''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
*'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
*'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&lt;br /&gt;
&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
*'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
*'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
*'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
*'''Simon Roses Femerling''' | Architecture | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
*'''David Kennedy''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
*'''Richard Bejtlich''' | Case Studies | Presentation not available&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
*'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
*'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree: a new direction in teaching application security at universities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
*'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
*'''Phil Purviance''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
*'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation Not available&lt;br /&gt;
&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
*'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
*'''Jason Chan''' | Cloud | Presentation not available &lt;br /&gt;
 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
*'''Will Urbanski''' | Architecture | Presentation Not available &lt;br /&gt;
&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
*'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation Not available &lt;br /&gt;
	&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
*'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
*'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
*'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
*'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs - PDF]&lt;br /&gt;
&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
*'''Shreeraj Shah''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
*'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&lt;br /&gt;
&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
*'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
*'''Alex Russell''' | Developer | Presentation not available &lt;br /&gt;
 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
*'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
*'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
*'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm - 4:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
*'''Yvan Boily''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
*'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
*'''Wendy Nather''' | Architecture | Presentation not available &lt;br /&gt;
&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
*'''Fred Donovan''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
*'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139777</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139777"/>
				<updated>2012-11-18T16:53:21Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* Payback on Web Attackers: Web Honeypots */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== 	&lt;br /&gt;
*'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
*'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
*'''Dan Amodio''' | Mobile | Presentation not available &lt;br /&gt;
&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
*'''Alejandro Caceres''' | Reverse Engineering | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
*'''Jeremiah Shirk''' | Rugged devops | PDF&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
*'''Ryan Barnett''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
*'''Sherif Koussa''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
*'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
*'''Jon Mccoy''' | Reverse Engineering | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
*'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
*'''Vaagn Toukharian''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
*'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&lt;br /&gt;
&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
*'''Mathew Rowley''' | Mobile | Presentation not available&lt;br /&gt;
	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
*'''Jerry Hoff''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
*'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &lt;br /&gt;
 &lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
*'''Michele Orru''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
*'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
*'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&lt;br /&gt;
&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
*'''Ofer Maor''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
*'''Nick Galbreath''' | Rugged devops | Presentation not available &lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
*'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
*'''John Steven''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
*'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
*'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&lt;br /&gt;
&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
*'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
*'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
*'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
*'''Simon Roses Femerling''' | Architecture | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
*'''David Kennedy''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
*'''Richard Bejtlich''' | Case Studies | Presentation not available&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
*'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
*'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree: a new direction in teaching application security at universities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
*'''Dan Cornell, Josh Sokol''' | Architecture | Presentation Not available &lt;br /&gt;
&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
*'''Phil Purviance''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
*'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation Not available&lt;br /&gt;
&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
*'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
*'''Jason Chan''' | Cloud | Presentation not available &lt;br /&gt;
 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
*'''Will Urbanski''' | Architecture | Presentation Not available &lt;br /&gt;
&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
*'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation Not available &lt;br /&gt;
	&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
*'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
*'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
*'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
*'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs - PDF]&lt;br /&gt;
&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
*'''Shreeraj Shah''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
*'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&lt;br /&gt;
&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
*'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
*'''Alex Russell''' | Developer | Presentation not available &lt;br /&gt;
 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
*'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
*'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
*'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm - 4:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
*'''Yvan Boily''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
*'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
*'''Wendy Nather''' | Architecture | Presentation not available &lt;br /&gt;
&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
*'''Fred Donovan''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
*'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139776</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139776"/>
				<updated>2012-11-18T16:53:05Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== 	&lt;br /&gt;
*'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
*'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
*'''Dan Amodio''' | Mobile | Presentation not available &lt;br /&gt;
&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
*'''Alejandro Caceres''' | Reverse Engineering | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
*'''Jeremiah Shirk''' | Rugged devops | PDF&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
*'''Ryan Barnett''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
*'''Sherif Koussa''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
*'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
*'''Jon Mccoy''' | Reverse Engineering | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
*'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
*'''Vaagn Toukharian''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
*'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&lt;br /&gt;
&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
*'''Mathew Rowley''' | Mobile | Presentation not available&lt;br /&gt;
	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
*'''Jerry Hoff''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
*'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &lt;br /&gt;
 &lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
*'''Michele Orru''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
*'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
*'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&lt;br /&gt;
&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
*'''Ofer Maor''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
*'''Nick Galbreath''' | Rugged devops | Presentation not available &lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
*'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
*'''John Steven''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
*'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
*'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&lt;br /&gt;
&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
*'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
*'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
*'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
*'''Simon Roses Femerling''' | Architecture | Presentation Not available &lt;br /&gt;
&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
*'''David Kennedy''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
*'''Richard Bejtlich''' | Case Studies | Presentation not available&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
*'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
*'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree: a new direction in teaching application security at universities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
*'''Dan Cornell, Josh Sokol''' | Architecture | Presentation Not available &lt;br /&gt;
&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
*'''Phil Purviance''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
*'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation Not available&lt;br /&gt;
&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
*'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
*'''Jason Chan''' | Cloud | Presentation not available &lt;br /&gt;
 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
*'''Will Urbanski''' | Architecture | Presentation Not available &lt;br /&gt;
&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
*'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation Not available &lt;br /&gt;
	&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
*'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
*'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
*'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
*'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs - PDF]&lt;br /&gt;
&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
*'''Shreeraj Shah''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
*'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&lt;br /&gt;
&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
*'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
*'''Alex Russell''' | Developer | Presentation not available &lt;br /&gt;
 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
*'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
*'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
*'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm - 4:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
*'''Yvan Boily''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
*'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
*'''Wendy Nather''' | Architecture | Presentation not available &lt;br /&gt;
&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
*'''Fred Donovan''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
*'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139775</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139775"/>
				<updated>2012-11-18T16:52:35Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* Reverse Engineering “Secure” HTTP APIs With An SSL Proxy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== 	&lt;br /&gt;
*'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
*'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
*'''Dan Amodio''' | Mobile | Presentation not available &lt;br /&gt;
&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
*'''Alejandro Caceres''' | Reverse Engineering | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
*'''Jeremiah Shirk''' | Rugged devops | PDF&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
*'''Ryan Barnett''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
*'''Sherif Koussa''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
*'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
*'''Jon Mccoy''' | Reverse Engineering | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
*'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
*'''Vaagn Toukharian''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
*'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&lt;br /&gt;
&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
*'''Mathew Rowley''' | Mobile | Presentation not available&lt;br /&gt;
	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
*'''Jerry Hoff''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
*'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &lt;br /&gt;
 &lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
*'''Michele Orru''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
*'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
*'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&lt;br /&gt;
&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
*'''Ofer Maor''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
*'''Nick Galbreath''' | Rugged devops | Presentation not available &lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
*'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
*'''John Steven''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
*'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation Not available&lt;br /&gt;
	&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
*'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&lt;br /&gt;
&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
*'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
*'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
*'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
*'''Simon Roses Femerling''' | Architecture | Presentation Not available &lt;br /&gt;
&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
*'''David Kennedy''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
*'''Richard Bejtlich''' | Case Studies | Presentation not available&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
*'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
*'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree: a new direction in teaching application security at universities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
*'''Dan Cornell, Josh Sokol''' | Architecture | Presentation Not available &lt;br /&gt;
&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
*'''Phil Purviance''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
*'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation Not available&lt;br /&gt;
&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
*'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
*'''Jason Chan''' | Cloud | Presentation not available &lt;br /&gt;
 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
*'''Will Urbanski''' | Architecture | Presentation Not available &lt;br /&gt;
&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
*'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation Not available &lt;br /&gt;
	&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
*'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
*'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
*'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
*'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs - PDF]&lt;br /&gt;
&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
*'''Shreeraj Shah''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
*'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&lt;br /&gt;
&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
*'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
*'''Alex Russell''' | Developer | Presentation not available &lt;br /&gt;
 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
*'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
*'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
*'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm - 4:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
*'''Yvan Boily''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
*'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
*'''Wendy Nather''' | Architecture | Presentation not available &lt;br /&gt;
&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
*'''Fred Donovan''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
*'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139773</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139773"/>
				<updated>2012-11-18T16:51:24Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== 	&lt;br /&gt;
*'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
*'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
*'''Dan Amodio''' | Mobile | Presentation not available &lt;br /&gt;
&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
*'''Alejandro Caceres''' | Reverse Engineering | Presentation Not available&lt;br /&gt;
	&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
*'''Jeremiah Shirk''' | Rugged devops | PDF&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
*'''Ryan Barnett''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
*'''Sherif Koussa''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
*'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
*'''Jon Mccoy''' | Reverse Engineering | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
*'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
*'''Vaagn Toukharian''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
*'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&lt;br /&gt;
&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
*'''Mathew Rowley''' | Mobile | Presentation not available&lt;br /&gt;
	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
*'''Jerry Hoff''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
*'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &lt;br /&gt;
 &lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
*'''Michele Orru''' | Attack | Presentation not available&lt;br /&gt;
 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
*'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
*'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&lt;br /&gt;
&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
*'''Ofer Maor''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
*'''Nick Galbreath''' | Rugged devops | Presentation not available &lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
*'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
*'''John Steven''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
*'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation Not available&lt;br /&gt;
	&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
*'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&lt;br /&gt;
&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
*'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
*'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
*'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
*'''Simon Roses Femerling''' | Architecture | Presentation Not available &lt;br /&gt;
&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
*'''David Kennedy''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
*'''Richard Bejtlich''' | Case Studies | Presentation not available&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
*'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
*'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree: a new direction in teaching application security at universities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
*'''Dan Cornell, Josh Sokol''' | Architecture | Presentation Not available &lt;br /&gt;
&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
*'''Phil Purviance''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
*'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation Not available&lt;br /&gt;
&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
*'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
*'''Jason Chan''' | Cloud | Presentation not available &lt;br /&gt;
 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
*'''Will Urbanski''' | Architecture | Presentation Not available &lt;br /&gt;
&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
*'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation Not available &lt;br /&gt;
	&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
*'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
*'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
*'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
*'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs - PDF]&lt;br /&gt;
&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
*'''Shreeraj Shah''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
*'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&lt;br /&gt;
&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
*'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
*'''Alex Russell''' | Developer | Presentation not available &lt;br /&gt;
 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
*'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
*'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
*'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm - 4:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
*'''Yvan Boily''' | Developer | Presentation not available&lt;br /&gt;
&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
*'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
*'''Wendy Nather''' | Architecture | Presentation not available &lt;br /&gt;
&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
*'''Fred Donovan''' | Attack | Presentation not available &lt;br /&gt;
	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
*'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139772</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139772"/>
				<updated>2012-11-18T16:48:50Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== 	&lt;br /&gt;
*'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
*'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
*'''Dan Amodio''' | Mobile | Presentation Not available &lt;br /&gt;
&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
*'''Alejandro Caceres''' | Reverse Engineering | Presentation Not available&lt;br /&gt;
	&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
*'''Jeremiah Shirk''' | Rugged devops | PDF&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
*'''Ryan Barnett''' | Attack | Presentation Not available&lt;br /&gt;
 	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
*'''Sherif Koussa''' | Developer | Presentation Not available&lt;br /&gt;
&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
*'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
*'''Jon Mccoy''' | Reverse Engineering | Presentation Not available&lt;br /&gt;
&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
*'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
*'''Vaagn Toukharian''' | Attack | Presentation Not available&lt;br /&gt;
 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
*'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&lt;br /&gt;
&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
*'''Mathew Rowley''' | Mobile | Presentation Not available&lt;br /&gt;
	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
*'''Jerry Hoff''' | Developer | Presentation Not available&lt;br /&gt;
&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
*'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &lt;br /&gt;
 &lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
*'''Michele Orru''' | Attack | Presentation Not available&lt;br /&gt;
 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
*'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
*'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&lt;br /&gt;
&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
*'''Ofer Maor''' | Developer | Presentation Not available&lt;br /&gt;
&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
*'''Nick Galbreath''' | Rugged devops | Presentation Not available &lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
*'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
*'''John Steven''' | Developer | Presentation Not available&lt;br /&gt;
&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
*'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation Not available&lt;br /&gt;
	&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
*'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&lt;br /&gt;
&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
*'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
*'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
*'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
*'''Simon Roses Femerling''' | Architecture | Presentation Not available &lt;br /&gt;
&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
*'''David Kennedy''' | Attack | Presentation Not available &lt;br /&gt;
	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
*'''Richard Bejtlich''' | Case Studies | Presentation Not available&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
*'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
*'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree: a new direction in teaching application security at universities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
*'''Dan Cornell, Josh Sokol''' | Architecture | Presentation Not available &lt;br /&gt;
&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
*'''Phil Purviance''' | Attack | Presentation Not available &lt;br /&gt;
	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
*'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation Not available&lt;br /&gt;
&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
*'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
*'''Jason Chan''' | Cloud | Presentation Not available &lt;br /&gt;
 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
*'''Will Urbanski''' | Architecture | Presentation Not available &lt;br /&gt;
&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
*'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation Not available &lt;br /&gt;
	&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
*'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
*'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
*'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
*'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs - PDF]&lt;br /&gt;
&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
*'''Shreeraj Shah''' | Attack | Presentation Not available &lt;br /&gt;
	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
*'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation Not available&lt;br /&gt;
&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
*'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
*'''Alex Russell''' | Developer | Presentation Not available &lt;br /&gt;
 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
*'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
*'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
*'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm - 4:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
*'''Yvan Boily''' | Developer | Presentation Not available&lt;br /&gt;
&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
*'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
*'''Wendy Nather''' | Architecture | Presentation Not available &lt;br /&gt;
&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
*'''Fred Donovan''' | Attack | Presentation Not available &lt;br /&gt;
	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
*'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139771</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139771"/>
				<updated>2012-11-18T16:07:39Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* Web Framework Vulnerabilities */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== 	&lt;br /&gt;
*'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
*'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
*'''Dan Amodio''' | Mobile | PDF &lt;br /&gt;
&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
*'''Alejandro Caceres''' | Reverse Engineering | PDF&lt;br /&gt;
	&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
*'''Jeremiah Shirk''' | Rugged devops | PDF&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
*'''Ryan Barnett''' | Attack | PDF&lt;br /&gt;
 	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
*'''Sherif Koussa''' | Developer | PDF&lt;br /&gt;
&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
*'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
*'''Jon Mccoy''' | Reverse Engineering | PDF&lt;br /&gt;
&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
*'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
*'''Vaagn Toukharian''' | Attack | PDF&lt;br /&gt;
 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
*'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | PDF&lt;br /&gt;
&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
*'''Mathew Rowley''' | Mobile | PDF&lt;br /&gt;
	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
*'''Jerry Hoff''' | Developer | PDF&lt;br /&gt;
&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
*'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | PDF &lt;br /&gt;
 &lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
*'''Michele Orru''' | Attack | PDF&lt;br /&gt;
 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
*'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
*'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&lt;br /&gt;
&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
*'''Ofer Maor''' | Developer | PDF&lt;br /&gt;
&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
*'''Nick Galbreath''' | Rugged devops | PDF &lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
*'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
*'''John Steven''' | Developer | PDF&lt;br /&gt;
&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
*'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | PDF&lt;br /&gt;
	&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
*'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&lt;br /&gt;
&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
*'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
*'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
*'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
*'''Simon Roses Femerling''' | Architecture | PDF &lt;br /&gt;
&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
*'''David Kennedy''' | Attack | PDF &lt;br /&gt;
	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
*'''Richard Bejtlich''' | Case Studies | PDF&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
*'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
*'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree: a new direction in teaching application security at universities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
*'''Dan Cornell, Josh Sokol''' | Architecture | PDF &lt;br /&gt;
&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
*'''Phil Purviance''' | Attack | PDF &lt;br /&gt;
	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
*'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | PDF&lt;br /&gt;
&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
*'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
*'''Jason Chan''' | Cloud | PDF &lt;br /&gt;
 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
*'''Will Urbanski''' | Architecture | PDF &lt;br /&gt;
&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
*'''Antti Rantasaari, Scott Sutherland''' | Attack | PDF &lt;br /&gt;
	&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
*'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
*'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
*'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
*'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs - PDF]&lt;br /&gt;
&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
*'''Shreeraj Shah''' | Attack | PDF &lt;br /&gt;
	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
*'''Jarret Raim, Matt Tesauro''' | Case Studies | PDF&lt;br /&gt;
&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
*'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
*'''Alex Russell''' | Developer | PDF &lt;br /&gt;
 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
*'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
*'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
*'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm - 4:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
*'''Yvan Boily''' | Developer | PDF&lt;br /&gt;
&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
*'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
*'''Wendy Nather''' | Architecture | PDF &lt;br /&gt;
&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
*'''Fred Donovan''' | Attack | PDF &lt;br /&gt;
	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
*'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:WebFrameworkVulnerablilitiesAppSecUSA.pdf&amp;diff=139770</id>
		<title>File:WebFrameworkVulnerablilitiesAppSecUSA.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:WebFrameworkVulnerablilitiesAppSecUSA.pdf&amp;diff=139770"/>
				<updated>2012-11-18T16:06:19Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: Web App Framework Based Vulnerabilies&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Web App Framework Based Vulnerabilies&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139769</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139769"/>
				<updated>2012-11-18T16:03:36Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* Web App Crypto - A Study in Failure */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== 	&lt;br /&gt;
*'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
*'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
*'''Dan Amodio''' | Mobile | PDF &lt;br /&gt;
&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
*'''Alejandro Caceres''' | Reverse Engineering | PDF&lt;br /&gt;
	&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
*'''Jeremiah Shirk''' | Rugged devops | PDF&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
*'''Ryan Barnett''' | Attack | PDF&lt;br /&gt;
 	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
*'''Sherif Koussa''' | Developer | PDF&lt;br /&gt;
&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
*'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
*'''Jon Mccoy''' | Reverse Engineering | PDF&lt;br /&gt;
&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
*'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
*'''Vaagn Toukharian''' | Attack | PDF&lt;br /&gt;
 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
*'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | PDF&lt;br /&gt;
&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
*'''Mathew Rowley''' | Mobile | PDF&lt;br /&gt;
	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
*'''Jerry Hoff''' | Developer | PDF&lt;br /&gt;
&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
*'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | PDF &lt;br /&gt;
 &lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
*'''Michele Orru''' | Attack | PDF&lt;br /&gt;
 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
*'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
*'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&lt;br /&gt;
&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
*'''Ofer Maor''' | Developer | PDF&lt;br /&gt;
&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
*'''Nick Galbreath''' | Rugged devops | PDF &lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
*'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
*'''John Steven''' | Developer | PDF&lt;br /&gt;
&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
*'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | PDF&lt;br /&gt;
	&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
*'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&lt;br /&gt;
&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
*'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
*'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
*'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
*'''Simon Roses Femerling''' | Architecture | PDF &lt;br /&gt;
&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
*'''David Kennedy''' | Attack | PDF &lt;br /&gt;
	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
*'''Richard Bejtlich''' | Case Studies | PDF&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
*'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
*'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree: a new direction in teaching application security at universities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
*'''Dan Cornell, Josh Sokol''' | Architecture | PDF &lt;br /&gt;
&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
*'''Phil Purviance''' | Attack | PDF &lt;br /&gt;
	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
*'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | PDF&lt;br /&gt;
&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
*'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
*'''Jason Chan''' | Cloud | PDF &lt;br /&gt;
 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
*'''Will Urbanski''' | Architecture | PDF &lt;br /&gt;
&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
*'''Antti Rantasaari, Scott Sutherland''' | Attack | PDF &lt;br /&gt;
	&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
*'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
*'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
*'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
*'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs - PDF]&lt;br /&gt;
&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
*'''Shreeraj Shah''' | Attack | PDF &lt;br /&gt;
	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
*'''Jarret Raim, Matt Tesauro''' | Case Studies | PDF&lt;br /&gt;
&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
*'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
*'''Alex Russell''' | Developer | PDF &lt;br /&gt;
 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
*'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
*'''Abraham Kang''' | Attack | PDF&lt;br /&gt;
&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
*'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm - 4:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
*'''Yvan Boily''' | Developer | PDF&lt;br /&gt;
&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
*'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
*'''Wendy Nather''' | Architecture | PDF &lt;br /&gt;
&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
*'''Fred Donovan''' | Attack | PDF &lt;br /&gt;
	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
*'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Web_app_crypto_20121026.pdf&amp;diff=139768</id>
		<title>File:Web app crypto 20121026.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Web_app_crypto_20121026.pdf&amp;diff=139768"/>
				<updated>2012-11-18T16:03:00Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: Web App Cryptology A Study in Failure&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Web App Cryptology A Study in Failure&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139767</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139767"/>
				<updated>2012-11-18T16:01:08Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* Unraveling Some of the Mysteries around DOM-Based XSS */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== 	&lt;br /&gt;
*'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
*'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
*'''Dan Amodio''' | Mobile | PDF &lt;br /&gt;
&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
*'''Alejandro Caceres''' | Reverse Engineering | PDF&lt;br /&gt;
	&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
*'''Jeremiah Shirk''' | Rugged devops | PDF&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
*'''Ryan Barnett''' | Attack | PDF&lt;br /&gt;
 	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
*'''Sherif Koussa''' | Developer | PDF&lt;br /&gt;
&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
*'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
*'''Jon Mccoy''' | Reverse Engineering | PDF&lt;br /&gt;
&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
*'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
*'''Vaagn Toukharian''' | Attack | PDF&lt;br /&gt;
 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
*'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | PDF&lt;br /&gt;
&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
*'''Mathew Rowley''' | Mobile | PDF&lt;br /&gt;
	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
*'''Jerry Hoff''' | Developer | PDF&lt;br /&gt;
&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
*'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | PDF &lt;br /&gt;
 &lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
*'''Michele Orru''' | Attack | PDF&lt;br /&gt;
 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
*'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
*'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&lt;br /&gt;
&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
*'''Ofer Maor''' | Developer | PDF&lt;br /&gt;
&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
*'''Nick Galbreath''' | Rugged devops | PDF &lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
*'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
*'''John Steven''' | Developer | PDF&lt;br /&gt;
&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
*'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | PDF&lt;br /&gt;
	&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
*'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&lt;br /&gt;
&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
*'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
*'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
*'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
*'''Simon Roses Femerling''' | Architecture | PDF &lt;br /&gt;
&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
*'''David Kennedy''' | Attack | PDF &lt;br /&gt;
	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
*'''Richard Bejtlich''' | Case Studies | PDF&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
*'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
*'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree: a new direction in teaching application security at universities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
*'''Dan Cornell, Josh Sokol''' | Architecture | PDF &lt;br /&gt;
&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
*'''Phil Purviance''' | Attack | PDF &lt;br /&gt;
	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
*'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | PDF&lt;br /&gt;
&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
*'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
*'''Jason Chan''' | Cloud | PDF &lt;br /&gt;
 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
*'''Will Urbanski''' | Architecture | PDF &lt;br /&gt;
&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
*'''Antti Rantasaari, Scott Sutherland''' | Attack | PDF &lt;br /&gt;
	&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
*'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
*'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
*'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
*'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs - PDF]&lt;br /&gt;
&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
*'''Shreeraj Shah''' | Attack | PDF &lt;br /&gt;
	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
*'''Jarret Raim, Matt Tesauro''' | Case Studies | PDF&lt;br /&gt;
&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
*'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
*'''Alex Russell''' | Developer | PDF &lt;br /&gt;
 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
*'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
*'''Abraham Kang''' | Attack | PDF&lt;br /&gt;
&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
*'''Travis H''' | Case Studies | PDF&lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm - 4:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
*'''Yvan Boily''' | Developer | PDF&lt;br /&gt;
&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
*'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
*'''Wendy Nather''' | Architecture | PDF &lt;br /&gt;
&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
*'''Fred Donovan''' | Attack | PDF &lt;br /&gt;
	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
*'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Unraveling_some_Mysteries_around_DOM-based_XSS.pdf&amp;diff=139766</id>
		<title>File:Unraveling some Mysteries around DOM-based XSS.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Unraveling_some_Mysteries_around_DOM-based_XSS.pdf&amp;diff=139766"/>
				<updated>2012-11-18T16:00:06Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: Unraveling some Mysteries around DOM-based XSS&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Unraveling some Mysteries around DOM-based XSS&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139765</id>
		<title>AppSecUSA 2012.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012.com&amp;diff=139765"/>
				<updated>2012-11-18T15:58:36Z</updated>
		
		<summary type="html">&lt;p&gt;Nishi: /* Top Strategies to Capture Security Intelligence for Applications */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*AppSecUSA Presentations and Talks&lt;br /&gt;
&lt;br /&gt;
== Thursday 25th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== 	&lt;br /&gt;
*'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
*'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
*'''Dan Amodio''' | Mobile | PDF &lt;br /&gt;
&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
*'''Alejandro Caceres''' | Reverse Engineering | PDF&lt;br /&gt;
	&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
*'''Jeremiah Shirk''' | Rugged devops | PDF&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am  - 11:45 am  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
*'''Ryan Barnett''' | Attack | PDF&lt;br /&gt;
 	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
*'''Sherif Koussa''' | Developer | PDF&lt;br /&gt;
&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
*'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
*'''Jon Mccoy''' | Reverse Engineering | PDF&lt;br /&gt;
&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
*'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm  - 2:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
*'''Vaagn Toukharian''' | Attack | PDF&lt;br /&gt;
 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
*'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | PDF&lt;br /&gt;
&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
*'''Mathew Rowley''' | Mobile | PDF&lt;br /&gt;
	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
*'''Jerry Hoff''' | Developer | PDF&lt;br /&gt;
&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
*'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | PDF &lt;br /&gt;
 &lt;br /&gt;
=== 3:00 pm  - 3:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
*'''Michele Orru''' | Attack | PDF&lt;br /&gt;
 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
*'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
*'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&lt;br /&gt;
&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
*'''Ofer Maor''' | Developer | PDF&lt;br /&gt;
&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
*'''Nick Galbreath''' | Rugged devops | PDF &lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm  - 4:45 pm  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
*'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
*'''John Steven''' | Developer | PDF&lt;br /&gt;
&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
*'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | PDF&lt;br /&gt;
	&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
*'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&lt;br /&gt;
&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
*'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&lt;br /&gt;
&lt;br /&gt;
== Friday 26th Oct ==&lt;br /&gt;
=== 10:00 am - 10:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
*'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
*'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
*'''Simon Roses Femerling''' | Architecture | PDF &lt;br /&gt;
&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
*'''David Kennedy''' | Attack | PDF &lt;br /&gt;
	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
*'''Richard Bejtlich''' | Case Studies | PDF&lt;br /&gt;
&lt;br /&gt;
=== 11:00 am - 11:45 am 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
*'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
*'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree: a new direction in teaching application security at universities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
*'''Dan Cornell, Josh Sokol''' | Architecture | PDF &lt;br /&gt;
&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
*'''Phil Purviance''' | Attack | PDF &lt;br /&gt;
	&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
*'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | PDF&lt;br /&gt;
&lt;br /&gt;
=== 1:00 pm - 1:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
*'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
*'''Jason Chan''' | Cloud | PDF &lt;br /&gt;
 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
*'''Will Urbanski''' | Architecture | PDF &lt;br /&gt;
&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
*'''Antti Rantasaari, Scott Sutherland''' | Attack | PDF &lt;br /&gt;
	&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
*'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&lt;br /&gt;
&lt;br /&gt;
=== 2:00 pm - 2:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
*'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
*'''Dave Wichers''' | Developer | PDF &lt;br /&gt;
 	&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
*'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs - PDF]&lt;br /&gt;
&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
*'''Shreeraj Shah''' | Attack | PDF &lt;br /&gt;
	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
*'''Jarret Raim, Matt Tesauro''' | Case Studies | PDF&lt;br /&gt;
&lt;br /&gt;
=== 3:00 pm - 3:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
*'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
*'''Alex Russell''' | Developer | PDF &lt;br /&gt;
 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
*'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
*'''Abraham Kang''' | Attack | PDF&lt;br /&gt;
&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
*'''Travis H''' | Case Studies | PDF&lt;br /&gt;
&lt;br /&gt;
=== 4:00 pm - 4:45 pm 	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
*'''Yvan Boily''' | Developer | PDF&lt;br /&gt;
&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
*'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&lt;br /&gt;
&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
*'''Wendy Nather''' | Architecture | PDF &lt;br /&gt;
&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
*'''Fred Donovan''' | Attack | PDF &lt;br /&gt;
	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
*'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nishi</name></author>	</entry>

	</feed>