<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rahul</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rahul"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Rahul"/>
		<updated>2026-05-19T16:25:16Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=46446</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=46446"/>
				<updated>2008-11-17T03:25:12Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: /* (2008/10/27) - Day 1 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== NOW AVAILABLE: OWASP AppSec Asia 2008 Session Slides ==&lt;br /&gt;
&lt;br /&gt;
The session slides are now available; please go to SESSION column under [https://www.owasp.org/index.php/OWASP_AppSec_Asia_2008_-_Taiwan#OWASP_AppSec_Asia_2008.2C_Conference_Schedule_.28Oct_27th_-_Oct_28th.29 Conference Schedule] to access to the slides.&lt;br /&gt;
&lt;br /&gt;
== A Note of Thanks ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank this year's 1200+ attendees who came to show support for OWASP App Sec Asia 2008!! As well as our Speakers, Chapter leaders and Sponsors who helped make this year's OWASP Asia Conference a great success!&lt;br /&gt;
[[Image:OWASP_Asia_08.jpg|center|733px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 - Taiwan== &lt;br /&gt;
&lt;br /&gt;
Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-10:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/4/41/OWASP_Asia_2008_YMChen.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00-11:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]''' '''[https://www.owasp.org/images/6/6b/OWASP_Asia_2008_Wayne.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 11:50 - 12:40 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''12:40 - 13:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/14/OWASP_Asia_2008_KK.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''13:40 - 15:40 Asia Chapter Leader Meeting''' &lt;br /&gt;
'''Attendee:''' China, Delhi, HK, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters&lt;br /&gt;
&lt;br /&gt;
'''P.S:''' Meeting with go in parallel to the two of the talk sessions and coffee break.&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''13:40 - 14:30''' || style=&amp;quot;width:33%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:30 - 14:50 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:50 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/6/6a/OWASP_Asia_2008_Fyodor.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/d/d2/OWASP_Asia_2008_FrankFan.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Yuan Fan, OWASP China Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
'''[https://www.owasp.org/images/d/d3/OWASP_Asia_Taiwan_Charmi.pdf Slides]‎'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin (Taiwan Information &amp;amp; Communication Security Technology Center)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:10''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Penetration Test with BackTrack: Art of Exploitation]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/f/f7/OWASP_Asia_2008_Anthony.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Anthony Lai (Dark Floyd), OWASP HK Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/9/9f/OWASP_Asia_2008_RSnake.pdf Slides]''' &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/15/OWASP_Asia_2008_Chenxi.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/7/74/OWASP_Asia_2008_Pukhraj.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/e/e5/OWASP_Asia_2008_TimBass.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]] &lt;br /&gt;
'''[https://www.owasp.org/images/5/5d/AppSecASIA08-BPWAF.pdf Slides]'''&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/0/09/OWASP_Asia_2008_Steven.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Anthony_Lai_(Dark_Floyd)%2C_OWASP_HK_Chapter Anthony], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
== Conference T-Shirt ==&lt;br /&gt;
[[Image:OWAS AppSec Asia Tshirt.png]]&lt;br /&gt;
&lt;br /&gt;
== Conference Venue==&lt;br /&gt;
&lt;br /&gt;
'''Taipei International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' 3rd floor Conference Hall, Xin Yi Road, Section 5, number 1, Taipei, Taiwan R.O.C.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.ticc.com.tw/index_en.aspx Website]'''&lt;br /&gt;
&lt;br /&gt;
== Hotel Information ==&lt;br /&gt;
&lt;br /&gt;
'''San Want Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.172, Sec. 4, ZhongXiao East Road, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel:+886-2-2772-2121 ｜ Fax : +886-2-2721-0302&lt;br /&gt;
&lt;br /&gt;
'''[http://www.sanwant.com/ Website]''' &lt;br /&gt;
&lt;br /&gt;
                                                    &lt;br /&gt;
'''Hope City FuShing Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.275, Sec.1, Fushing S. Rd., Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel : +886-2-2703-9990 ｜ Fax : +886-2-2706-8547&lt;br /&gt;
&lt;br /&gt;
'''[http://www.city-hotel.com.tw/bussiness/b2/b2-en.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
== Taipei City Map - With OWASP Venue and Hotels Marked ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image: Owasp_appsec_asia_2007_tpe_map_new.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Welcome to Taiwan==&lt;br /&gt;
And WELCOME TO TAIWAN! Please check out [http://tw.youtube.com/watch?v=wRc0q9xQEQ4 this video] about interesting places in Taiwan.&lt;br /&gt;
If you need suggestions on how to plan out your trip, please feel free to [mailto:wayne.owasp@gmail.com '''contact us!''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Guide Team:'' ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.moeaidb.gov.tw https://www.owasp.org/images/8/82/IDB.png]&lt;br /&gt;
[http://www.moea.gov.tw/ https://www.owasp.org/images/a/a4/MOEA.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Organizers:'' ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Taiwan https://www.owasp.org/images/2/2b/OWASP_TW.png]&lt;br /&gt;
[http://www.iii.org.tw/english/ https://www.owasp.org/images/7/75/III.png]&lt;br /&gt;
[http://web.cisanet.org.tw/# https://www.owasp.org/images/6/64/CISA.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Platinum Sponsors:'' ===&lt;br /&gt;
&lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png]  -  [http://www.fortify.com/ https://www.owasp.org/images/c/c7/Fortify.png]  -  [http://www.imperva.com/ https://www.owasp.org/images/d/da/IMPERVA.png]  -  &lt;br /&gt;
[http://www.mtechpro.com/ https://www.owasp.org/images/b/be/MTECH.png]  -  &lt;br /&gt;
[http://www.mudynamics.com/ https://www.owasp.org/images/1/17/Mu_Dynamics.png]  -  &lt;br /&gt;
[http://www.systex.com.tw/english/index.asp https://www.owasp.org/images/5/5e/SYSTEX.png]  -  &lt;br /&gt;
[http://www.twisc.ntust.edu.tw/ https://www.owasp.org/images/6/6d/TWISC.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Gold Sponsors:'' ===&lt;br /&gt;
&lt;br /&gt;
[http://www.bluecoat.com/ https://www.owasp.org/images/9/9c/BLUECOAT.png]&lt;br /&gt;
[http://www.eraysecure.com.tw/ https://www.owasp.org/images/e/ea/ERay.png]&lt;br /&gt;
[http://tw.yahoo.com/ https://www.owasp.org/images/a/a9/YahooTw.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Silver Sponsors:'' ===&lt;br /&gt;
&lt;br /&gt;
[http://www.network-box.com.tw/ https://www.owasp.org/images/0/08/NETWORK_BOX.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Media Partners'': ===&lt;br /&gt;
&lt;br /&gt;
[http://www.isecutech.com.tw/main/index.aspx https://www.owasp.org/images/9/97/INFOSECURITY.png]&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Asia_2008_Fyodor.pdf&amp;diff=46445</id>
		<title>File:OWASP Asia 2008 Fyodor.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Asia_2008_Fyodor.pdf&amp;diff=46445"/>
				<updated>2008-11-17T03:24:48Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=46399</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=46399"/>
				<updated>2008-11-14T08:01:41Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: /* (2008/10/27) - Day 1 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== NOW AVAILABLE: OWASP AppSec Asia 2008 Session Slides ==&lt;br /&gt;
&lt;br /&gt;
The session slides are now available; please go to SESSION column under [https://www.owasp.org/index.php/OWASP_AppSec_Asia_2008_-_Taiwan#OWASP_AppSec_Asia_2008.2C_Conference_Schedule_.28Oct_27th_-_Oct_28th.29 Conference Schedule] to access to the slides.&lt;br /&gt;
&lt;br /&gt;
== A Note of Thanks ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank this year's 1200+ attendees who came to show support for OWASP App Sec Asia 2008!! As well as our Speakers, Chapter leaders and Sponsors who helped make this year's OWASP Asia Conference a great success!&lt;br /&gt;
[[Image:OWASP_Asia_08.jpg|center|733px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 - Taiwan== &lt;br /&gt;
&lt;br /&gt;
Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-10:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/4/41/OWASP_Asia_2008_YMChen.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00-11:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]''' '''[https://www.owasp.org/images/6/6b/OWASP_Asia_2008_Wayne.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 11:50 - 12:40 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''12:40 - 13:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/14/OWASP_Asia_2008_KK.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''13:40 - 15:40 Asia Chapter Leader Meeting''' &lt;br /&gt;
'''Attendee:''' China, Delhi, HK, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters&lt;br /&gt;
&lt;br /&gt;
'''P.S:''' Meeting with go in parallel to the two of the talk sessions and coffee break.&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''13:40 - 14:30''' || style=&amp;quot;width:33%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:30 - 14:50 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:50 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/d/d2/OWASP_Asia_2008_FrankFan.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Yuan Fan, OWASP China Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
'''[https://www.owasp.org/images/d/d3/OWASP_Asia_Taiwan_Charmi.pdf Slides]‎'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin (Taiwan Information &amp;amp; Communication Security Technology Center)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:10''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Penetration Test with BackTrack: Art of Exploitation]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/f/f7/OWASP_Asia_2008_Anthony.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Anthony Lai (Dark Floyd), OWASP HK Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/9/9f/OWASP_Asia_2008_RSnake.pdf Slides]''' &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/15/OWASP_Asia_2008_Chenxi.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/7/74/OWASP_Asia_2008_Pukhraj.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/e/e5/OWASP_Asia_2008_TimBass.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]] &lt;br /&gt;
'''[https://www.owasp.org/images/5/5d/AppSecASIA08-BPWAF.pdf Slides]'''&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/0/09/OWASP_Asia_2008_Steven.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Anthony_Lai_(Dark_Floyd)%2C_OWASP_HK_Chapter Anthony], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
== Conference T-Shirt ==&lt;br /&gt;
[[Image:OWAS AppSec Asia Tshirt.png]]&lt;br /&gt;
&lt;br /&gt;
== Conference Venue==&lt;br /&gt;
&lt;br /&gt;
'''Taipei International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' 3rd floor Conference Hall, Xin Yi Road, Section 5, number 1, Taipei, Taiwan R.O.C.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.ticc.com.tw/index_en.aspx Website]'''&lt;br /&gt;
&lt;br /&gt;
== Hotel Information ==&lt;br /&gt;
&lt;br /&gt;
'''San Want Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.172, Sec. 4, ZhongXiao East Road, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel:+886-2-2772-2121 ｜ Fax : +886-2-2721-0302&lt;br /&gt;
&lt;br /&gt;
'''[http://www.sanwant.com/ Website]''' &lt;br /&gt;
&lt;br /&gt;
                                                    &lt;br /&gt;
'''Hope City FuShing Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.275, Sec.1, Fushing S. Rd., Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel : +886-2-2703-9990 ｜ Fax : +886-2-2706-8547&lt;br /&gt;
&lt;br /&gt;
'''[http://www.city-hotel.com.tw/bussiness/b2/b2-en.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
== Taipei City Map - With OWASP Venue and Hotels Marked ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image: Owasp_appsec_asia_2007_tpe_map_new.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Welcome to Taiwan==&lt;br /&gt;
And WELCOME TO TAIWAN! Please check out [http://tw.youtube.com/watch?v=wRc0q9xQEQ4 this video] about interesting places in Taiwan.&lt;br /&gt;
If you need suggestions on how to plan out your trip, please feel free to [mailto:wayne.owasp@gmail.com '''contact us!''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Guide Team:'' ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.moeaidb.gov.tw https://www.owasp.org/images/8/82/IDB.png]&lt;br /&gt;
[http://www.moea.gov.tw/ https://www.owasp.org/images/a/a4/MOEA.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Organizers:'' ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Taiwan https://www.owasp.org/images/2/2b/OWASP_TW.png]&lt;br /&gt;
[http://www.iii.org.tw/english/ https://www.owasp.org/images/7/75/III.png]&lt;br /&gt;
[http://web.cisanet.org.tw/# https://www.owasp.org/images/6/64/CISA.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Platinum Sponsors:'' ===&lt;br /&gt;
&lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png]  -  [http://www.fortify.com/ https://www.owasp.org/images/c/c7/Fortify.png]  -  [http://www.imperva.com/ https://www.owasp.org/images/d/da/IMPERVA.png]  -  &lt;br /&gt;
[http://www.mtechpro.com/ https://www.owasp.org/images/b/be/MTECH.png]  -  &lt;br /&gt;
[http://www.mudynamics.com/ https://www.owasp.org/images/1/17/Mu_Dynamics.png]  -  &lt;br /&gt;
[http://www.systex.com.tw/english/index.asp https://www.owasp.org/images/5/5e/SYSTEX.png]  -  &lt;br /&gt;
[http://www.twisc.ntust.edu.tw/ https://www.owasp.org/images/6/6d/TWISC.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Gold Sponsors:'' ===&lt;br /&gt;
&lt;br /&gt;
[http://www.bluecoat.com/ https://www.owasp.org/images/9/9c/BLUECOAT.png]&lt;br /&gt;
[http://www.eraysecure.com.tw/ https://www.owasp.org/images/e/ea/ERay.png]&lt;br /&gt;
[http://tw.yahoo.com/ https://www.owasp.org/images/a/a9/YahooTw.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Silver Sponsors:'' ===&lt;br /&gt;
&lt;br /&gt;
[http://www.network-box.com.tw/ https://www.owasp.org/images/0/08/NETWORK_BOX.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Media Partners'': ===&lt;br /&gt;
&lt;br /&gt;
[http://www.isecutech.com.tw/main/index.aspx https://www.owasp.org/images/9/97/INFOSECURITY.png]&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=46398</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=46398"/>
				<updated>2008-11-14T07:59:36Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: /* OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== NOW AVAILABLE: OWASP AppSec Asia 2008 Session Slides ==&lt;br /&gt;
&lt;br /&gt;
The session slides are now available; please go to SESSION column under [https://www.owasp.org/index.php/OWASP_AppSec_Asia_2008_-_Taiwan#OWASP_AppSec_Asia_2008.2C_Conference_Schedule_.28Oct_27th_-_Oct_28th.29 Conference Schedule] to access to the slides.&lt;br /&gt;
&lt;br /&gt;
== A Note of Thanks ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank this year's 1200+ attendees who came to show support for OWASP App Sec Asia 2008!! As well as our Speakers, Chapter leaders and Sponsors who helped make this year's OWASP Asia Conference a great success!&lt;br /&gt;
[[Image:OWASP_Asia_08.jpg|center|733px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 - Taiwan== &lt;br /&gt;
&lt;br /&gt;
Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-10:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/4/41/OWASP_Asia_2008_YMChen.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00-11:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]''' '''[https://www.owasp.org/images/6/6b/OWASP_Asia_2008_Wayne.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 11:50 - 12:40 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''12:40 - 13:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/14/OWASP_Asia_2008_KK.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''13:40 - 15:40 Asia Chapter Leader Meeting''' &lt;br /&gt;
'''Attendee:''' China, Delhi, HK, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters&lt;br /&gt;
&lt;br /&gt;
'''P.S:''' Meeting with go in parallel to the two of the talk sessions and coffee break.&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''13:40 - 14:30''' || style=&amp;quot;width:33%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:30 - 14:50 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:50 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/d/d2/OWASP_Asia_2008_FrankFan.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Yuan Fan, OWASP China Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
'''[https://www.owasp.org/images/d/d3/OWASP_Asia_Taiwan_Charmi.pdf]‎'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin (Taiwan Information &amp;amp; Communication Security Technology Center)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:10''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Penetration Test with BackTrack: Art of Exploitation]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/f/f7/OWASP_Asia_2008_Anthony.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Anthony Lai (Dark Floyd), OWASP HK Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/9/9f/OWASP_Asia_2008_RSnake.pdf Slides]''' &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/15/OWASP_Asia_2008_Chenxi.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/7/74/OWASP_Asia_2008_Pukhraj.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/e/e5/OWASP_Asia_2008_TimBass.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]] &lt;br /&gt;
'''[https://www.owasp.org/images/5/5d/AppSecASIA08-BPWAF.pdf Slides]'''&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/0/09/OWASP_Asia_2008_Steven.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Anthony_Lai_(Dark_Floyd)%2C_OWASP_HK_Chapter Anthony], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
== Conference T-Shirt ==&lt;br /&gt;
[[Image:OWAS AppSec Asia Tshirt.png]]&lt;br /&gt;
&lt;br /&gt;
== Conference Venue==&lt;br /&gt;
&lt;br /&gt;
'''Taipei International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' 3rd floor Conference Hall, Xin Yi Road, Section 5, number 1, Taipei, Taiwan R.O.C.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.ticc.com.tw/index_en.aspx Website]'''&lt;br /&gt;
&lt;br /&gt;
== Hotel Information ==&lt;br /&gt;
&lt;br /&gt;
'''San Want Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.172, Sec. 4, ZhongXiao East Road, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel:+886-2-2772-2121 ｜ Fax : +886-2-2721-0302&lt;br /&gt;
&lt;br /&gt;
'''[http://www.sanwant.com/ Website]''' &lt;br /&gt;
&lt;br /&gt;
                                                    &lt;br /&gt;
'''Hope City FuShing Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.275, Sec.1, Fushing S. Rd., Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel : +886-2-2703-9990 ｜ Fax : +886-2-2706-8547&lt;br /&gt;
&lt;br /&gt;
'''[http://www.city-hotel.com.tw/bussiness/b2/b2-en.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
== Taipei City Map - With OWASP Venue and Hotels Marked ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image: Owasp_appsec_asia_2007_tpe_map_new.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Welcome to Taiwan==&lt;br /&gt;
And WELCOME TO TAIWAN! Please check out [http://tw.youtube.com/watch?v=wRc0q9xQEQ4 this video] about interesting places in Taiwan.&lt;br /&gt;
If you need suggestions on how to plan out your trip, please feel free to [mailto:wayne.owasp@gmail.com '''contact us!''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Guide Team:'' ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.moeaidb.gov.tw https://www.owasp.org/images/8/82/IDB.png]&lt;br /&gt;
[http://www.moea.gov.tw/ https://www.owasp.org/images/a/a4/MOEA.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Organizers:'' ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Taiwan https://www.owasp.org/images/2/2b/OWASP_TW.png]&lt;br /&gt;
[http://www.iii.org.tw/english/ https://www.owasp.org/images/7/75/III.png]&lt;br /&gt;
[http://web.cisanet.org.tw/# https://www.owasp.org/images/6/64/CISA.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Platinum Sponsors:'' ===&lt;br /&gt;
&lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png]  -  [http://www.fortify.com/ https://www.owasp.org/images/c/c7/Fortify.png]  -  [http://www.imperva.com/ https://www.owasp.org/images/d/da/IMPERVA.png]  -  &lt;br /&gt;
[http://www.mtechpro.com/ https://www.owasp.org/images/b/be/MTECH.png]  -  &lt;br /&gt;
[http://www.mudynamics.com/ https://www.owasp.org/images/1/17/Mu_Dynamics.png]  -  &lt;br /&gt;
[http://www.systex.com.tw/english/index.asp https://www.owasp.org/images/5/5e/SYSTEX.png]  -  &lt;br /&gt;
[http://www.twisc.ntust.edu.tw/ https://www.owasp.org/images/6/6d/TWISC.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Gold Sponsors:'' ===&lt;br /&gt;
&lt;br /&gt;
[http://www.bluecoat.com/ https://www.owasp.org/images/9/9c/BLUECOAT.png]&lt;br /&gt;
[http://www.eraysecure.com.tw/ https://www.owasp.org/images/e/ea/ERay.png]&lt;br /&gt;
[http://tw.yahoo.com/ https://www.owasp.org/images/a/a9/YahooTw.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Silver Sponsors:'' ===&lt;br /&gt;
&lt;br /&gt;
[http://www.network-box.com.tw/ https://www.owasp.org/images/0/08/NETWORK_BOX.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Media Partners'': ===&lt;br /&gt;
&lt;br /&gt;
[http://www.isecutech.com.tw/main/index.aspx https://www.owasp.org/images/9/97/INFOSECURITY.png]&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Asia_Taiwan_Charmi.pdf&amp;diff=46397</id>
		<title>File:OWASP Asia Taiwan Charmi.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Asia_Taiwan_Charmi.pdf&amp;diff=46397"/>
				<updated>2008-11-14T07:57:47Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=46396</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=46396"/>
				<updated>2008-11-14T07:54:06Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: /* OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== NOW AVAILABLE: OWASP AppSec Asia 2008 Session Slides ==&lt;br /&gt;
&lt;br /&gt;
The session slides are now available; please go to SESSION column under [https://www.owasp.org/index.php/OWASP_AppSec_Asia_2008_-_Taiwan#OWASP_AppSec_Asia_2008.2C_Conference_Schedule_.28Oct_27th_-_Oct_28th.29 Conference Schedule] to access to the slides.&lt;br /&gt;
&lt;br /&gt;
== A Note of Thanks ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank this year's 1200+ attendees who came to show support for OWASP App Sec Asia 2008!! As well as our Speakers, Chapter leaders and Sponsors who helped make this year's OWASP Asia Conference a great success!&lt;br /&gt;
[[Image:OWASP_Asia_08.jpg|center|733px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 - Taiwan== &lt;br /&gt;
&lt;br /&gt;
Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-10:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/4/41/OWASP_Asia_2008_YMChen.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00-11:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]''' '''[https://www.owasp.org/images/6/6b/OWASP_Asia_2008_Wayne.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 11:50 - 12:40 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''12:40 - 13:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/14/OWASP_Asia_2008_KK.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''13:40 - 15:40 Asia Chapter Leader Meeting''' &lt;br /&gt;
'''Attendee:''' China, Delhi, HK, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters&lt;br /&gt;
&lt;br /&gt;
'''P.S:''' Meeting with go in parallel to the two of the talk sessions and coffee break.&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''13:40 - 14:30''' || style=&amp;quot;width:33%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:30 - 14:50 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:50 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/d/d2/OWASP_Asia_2008_FrankFan.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Yuan Fan, OWASP China Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
'''[https://www.owasp.org/images/0/09/OWASP_Asia_2008_Steven.pdf Slides]‎'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin (Taiwan Information &amp;amp; Communication Security Technology Center)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:10''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Penetration Test with BackTrack: Art of Exploitation]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/f/f7/OWASP_Asia_2008_Anthony.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Anthony Lai (Dark Floyd), OWASP HK Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/9/9f/OWASP_Asia_2008_RSnake.pdf Slides]''' &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/15/OWASP_Asia_2008_Chenxi.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/7/74/OWASP_Asia_2008_Pukhraj.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/e/e5/OWASP_Asia_2008_TimBass.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]] &lt;br /&gt;
'''[https://www.owasp.org/images/5/5d/AppSecASIA08-BPWAF.pdf Slides]'''&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/0/09/OWASP_Asia_2008_Steven.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Anthony_Lai_(Dark_Floyd)%2C_OWASP_HK_Chapter Anthony], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
== Conference T-Shirt ==&lt;br /&gt;
[[Image:OWAS AppSec Asia Tshirt.png]]&lt;br /&gt;
&lt;br /&gt;
== Conference Venue==&lt;br /&gt;
&lt;br /&gt;
'''Taipei International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' 3rd floor Conference Hall, Xin Yi Road, Section 5, number 1, Taipei, Taiwan R.O.C.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.ticc.com.tw/index_en.aspx Website]'''&lt;br /&gt;
&lt;br /&gt;
== Hotel Information ==&lt;br /&gt;
&lt;br /&gt;
'''San Want Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.172, Sec. 4, ZhongXiao East Road, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel:+886-2-2772-2121 ｜ Fax : +886-2-2721-0302&lt;br /&gt;
&lt;br /&gt;
'''[http://www.sanwant.com/ Website]''' &lt;br /&gt;
&lt;br /&gt;
                                                    &lt;br /&gt;
'''Hope City FuShing Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.275, Sec.1, Fushing S. Rd., Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel : +886-2-2703-9990 ｜ Fax : +886-2-2706-8547&lt;br /&gt;
&lt;br /&gt;
'''[http://www.city-hotel.com.tw/bussiness/b2/b2-en.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
== Taipei City Map - With OWASP Venue and Hotels Marked ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image: Owasp_appsec_asia_2007_tpe_map_new.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Welcome to Taiwan==&lt;br /&gt;
And WELCOME TO TAIWAN! Please check out [http://tw.youtube.com/watch?v=wRc0q9xQEQ4 this video] about interesting places in Taiwan.&lt;br /&gt;
If you need suggestions on how to plan out your trip, please feel free to [mailto:wayne.owasp@gmail.com '''contact us!''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Guide Team:'' ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.moeaidb.gov.tw https://www.owasp.org/images/8/82/IDB.png]&lt;br /&gt;
[http://www.moea.gov.tw/ https://www.owasp.org/images/a/a4/MOEA.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Organizers:'' ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Taiwan https://www.owasp.org/images/2/2b/OWASP_TW.png]&lt;br /&gt;
[http://www.iii.org.tw/english/ https://www.owasp.org/images/7/75/III.png]&lt;br /&gt;
[http://web.cisanet.org.tw/# https://www.owasp.org/images/6/64/CISA.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Platinum Sponsors:'' ===&lt;br /&gt;
&lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png]  -  [http://www.fortify.com/ https://www.owasp.org/images/c/c7/Fortify.png]  -  [http://www.imperva.com/ https://www.owasp.org/images/d/da/IMPERVA.png]  -  &lt;br /&gt;
[http://www.mtechpro.com/ https://www.owasp.org/images/b/be/MTECH.png]  -  &lt;br /&gt;
[http://www.mudynamics.com/ https://www.owasp.org/images/1/17/Mu_Dynamics.png]  -  &lt;br /&gt;
[http://www.systex.com.tw/english/index.asp https://www.owasp.org/images/5/5e/SYSTEX.png]  -  &lt;br /&gt;
[http://www.twisc.ntust.edu.tw/ https://www.owasp.org/images/6/6d/TWISC.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Gold Sponsors:'' ===&lt;br /&gt;
&lt;br /&gt;
[http://www.bluecoat.com/ https://www.owasp.org/images/9/9c/BLUECOAT.png]&lt;br /&gt;
[http://www.eraysecure.com.tw/ https://www.owasp.org/images/e/ea/ERay.png]&lt;br /&gt;
[http://tw.yahoo.com/ https://www.owasp.org/images/a/a9/YahooTw.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Silver Sponsors:'' ===&lt;br /&gt;
&lt;br /&gt;
[http://www.network-box.com.tw/ https://www.owasp.org/images/0/08/NETWORK_BOX.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Media Partners'': ===&lt;br /&gt;
&lt;br /&gt;
[http://www.isecutech.com.tw/main/index.aspx https://www.owasp.org/images/9/97/INFOSECURITY.png]&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Asia_2008_Steven.pdf&amp;diff=46395</id>
		<title>File:OWASP Asia 2008 Steven.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Asia_2008_Steven.pdf&amp;diff=46395"/>
				<updated>2008-11-14T07:47:43Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: uploaded a new version of &amp;quot;Image:OWASP Asia 2008 Steven.pdf&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45861</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45861"/>
				<updated>2008-11-05T07:46:20Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: /* OWASP AppSec Asia 2008 Conference Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== NOW AVAILABLE: OWASP AppSec Asia 2008 Session Slides ==&lt;br /&gt;
&lt;br /&gt;
The session slides are now available; please go to SESSION column under [https://www.owasp.org/index.php/OWASP_AppSec_Asia_2008_-_Taiwan#OWASP_AppSec_Asia_2008.2C_Conference_Schedule_.28Oct_27th_-_Oct_28th.29 Conference Schedule] to access to the slides.&lt;br /&gt;
&lt;br /&gt;
== A Note of Thanks ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank this year's 1200+ attendees who came to show support for OWASP App Sec Asia 2008!! As well as our Speakers, Chapter leaders and Sponsors who helped make this year's OWASP Asia Conference a great success!&lt;br /&gt;
[[Image:OWASP_Asia_08.jpg|center|733px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 - Taiwan== &lt;br /&gt;
&lt;br /&gt;
Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-10:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/4/41/OWASP_Asia_2008_YMChen.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00-11:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]''' '''[https://www.owasp.org/images/6/6b/OWASP_Asia_2008_Wayne.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 11:50 - 12:40 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''12:40 - 13:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/14/OWASP_Asia_2008_KK.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''13:40 - 15:40 Asia Chapter Leader Meeting''' &lt;br /&gt;
'''Attendee:''' China, Delhi, HK, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters&lt;br /&gt;
&lt;br /&gt;
'''P.S:''' Meeting with go in parallel to the two of the talk sessions and coffee break.&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''13:40 - 14:30''' || style=&amp;quot;width:33%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:30 - 14:50 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:50 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/d/d2/OWASP_Asia_2008_FrankFan.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Yuan Fan, OWASP China Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin (Taiwan Information &amp;amp; Communication Security Technology Center)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:10''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Penetration Test with BackTrack: Art of Exploitation]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/f/f7/OWASP_Asia_2008_Anthony.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Anthony Lai (Dark Floyd), OWASP HK Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/9/9f/OWASP_Asia_2008_RSnake.pdf Slides]''' &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/15/OWASP_Asia_2008_Chenxi.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/7/74/OWASP_Asia_2008_Pukhraj.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/e/e5/OWASP_Asia_2008_TimBass.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]] &lt;br /&gt;
'''[https://www.owasp.org/images/5/5d/AppSecASIA08-BPWAF.pdf Slides]'''&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/0/09/OWASP_Asia_2008_Steven.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Anthony_Lai_(Dark_Floyd)%2C_OWASP_HK_Chapter Anthony], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
== Conference T-Shirt ==&lt;br /&gt;
[[Image:OWAS AppSec Asia Tshirt.png]]&lt;br /&gt;
&lt;br /&gt;
== Conference Venue==&lt;br /&gt;
&lt;br /&gt;
'''Taipei International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' 3rd floor Conference Hall, Xin Yi Road, Section 5, number 1, Taipei, Taiwan R.O.C.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.ticc.com.tw/index_en.aspx Website]'''&lt;br /&gt;
&lt;br /&gt;
== Hotel Information ==&lt;br /&gt;
&lt;br /&gt;
'''San Want Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.172, Sec. 4, ZhongXiao East Road, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel:+886-2-2772-2121 ｜ Fax : +886-2-2721-0302&lt;br /&gt;
&lt;br /&gt;
'''[http://www.sanwant.com/ Website]''' &lt;br /&gt;
&lt;br /&gt;
                                                    &lt;br /&gt;
'''Hope City FuShing Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.275, Sec.1, Fushing S. Rd., Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel : +886-2-2703-9990 ｜ Fax : +886-2-2706-8547&lt;br /&gt;
&lt;br /&gt;
'''[http://www.city-hotel.com.tw/bussiness/b2/b2-en.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
== Taipei City Map - With OWASP Venue and Hotels Marked ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image: Owasp_appsec_asia_2007_tpe_map_new.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Welcome to Taiwan==&lt;br /&gt;
And WELCOME TO TAIWAN! Please check out [http://tw.youtube.com/watch?v=wRc0q9xQEQ4 this video] about interesting places in Taiwan.&lt;br /&gt;
If you need suggestions on how to plan out your trip, please feel free to [mailto:wayne.owasp@gmail.com '''contact us!''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Guide Team:'' ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.moeaidb.gov.tw https://www.owasp.org/images/8/82/IDB.png]&lt;br /&gt;
[http://www.moea.gov.tw/ https://www.owasp.org/images/a/a4/MOEA.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Organizers:'' ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Taiwan https://www.owasp.org/images/2/2b/OWASP_TW.png]&lt;br /&gt;
[http://www.iii.org.tw/english/ https://www.owasp.org/images/7/75/III.png]&lt;br /&gt;
[http://web.cisanet.org.tw/# https://www.owasp.org/images/6/64/CISA.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Platinum Sponsors:'' ===&lt;br /&gt;
&lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png]  -  [http://www.fortify.com/ https://www.owasp.org/images/c/c7/Fortify.png]  -  [http://www.imperva.com/ https://www.owasp.org/images/d/da/IMPERVA.png]  -  &lt;br /&gt;
[http://www.mtechpro.com/ https://www.owasp.org/images/b/be/MTECH.png]  -  &lt;br /&gt;
[http://www.mudynamics.com/ https://www.owasp.org/images/1/17/Mu_Dynamics.png]  -  &lt;br /&gt;
[http://www.systex.com.tw/english/index.asp https://www.owasp.org/images/5/5e/SYSTEX.png]  -  &lt;br /&gt;
[http://www.twisc.ntust.edu.tw/ https://www.owasp.org/images/6/6d/TWISC.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Gold Sponsors:'' ===&lt;br /&gt;
&lt;br /&gt;
[http://www.bluecoat.com/ https://www.owasp.org/images/9/9c/BLUECOAT.png]&lt;br /&gt;
[http://www.eraysecure.com.tw/ https://www.owasp.org/images/e/ea/ERay.png]&lt;br /&gt;
[http://tw.yahoo.com/ https://www.owasp.org/images/a/a9/YahooTw.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Silver Sponsors:'' ===&lt;br /&gt;
&lt;br /&gt;
[http://www.network-box.com.tw/ https://www.owasp.org/images/0/08/NETWORK_BOX.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== ''Media Partners'': ===&lt;br /&gt;
&lt;br /&gt;
[http://www.isecutech.com.tw/main/index.aspx https://www.owasp.org/images/9/97/INFOSECURITY.png]&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45744</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45744"/>
				<updated>2008-11-04T08:15:58Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== NOW AVAILABLE: OWASP AppSec Asia 2008 Session Slides ==&lt;br /&gt;
&lt;br /&gt;
The session slides are now available; please go to SESSION column under [https://www.owasp.org/index.php/OWASP_AppSec_Asia_2008_-_Taiwan#OWASP_AppSec_Asia_2008.2C_Conference_Schedule_.28Oct_27th_-_Oct_28th.29 Conference Schedule] to access to the slides.&lt;br /&gt;
&lt;br /&gt;
== A Note of Thanks ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank this year's 1200+ attendees who came to show support for OWASP App Sec Asia 2008!! As well as our Speakers, Chapter leaders and Sponsors who helped make this year's OWASP Asia Conference a great success!&lt;br /&gt;
[[Image:OWASP_Asia_08.jpg|center|733px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 - Taiwan== &lt;br /&gt;
&lt;br /&gt;
Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-10:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/4/41/OWASP_Asia_2008_YMChen.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00-11:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]''' '''[https://www.owasp.org/images/6/6b/OWASP_Asia_2008_Wayne.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 11:50 - 12:40 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''12:40 - 13:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/14/OWASP_Asia_2008_KK.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''13:40 - 15:40 Asia Chapter Leader Meeting''' &lt;br /&gt;
'''Attendee:''' China, Delhi, HK, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters&lt;br /&gt;
&lt;br /&gt;
'''P.S:''' Meeting with go in parallel to the two of the talk sessions and coffee break.&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''13:40 - 14:30''' || style=&amp;quot;width:33%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:30 - 14:50 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:50 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/d/d2/OWASP_Asia_2008_FrankFan.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Yuan Fan, OWASP China Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin (Taiwan Information &amp;amp; Communication Security Technology Center)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:10''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Penetration Test with BackTrack: Art of Exploitation]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/f/f7/OWASP_Asia_2008_Anthony.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Anthony Lai (Dark Floyd), OWASP HK Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/9/9f/OWASP_Asia_2008_RSnake.pdf Slides]''' &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/15/OWASP_Asia_2008_Chenxi.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/7/74/OWASP_Asia_2008_Pukhraj.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/e/e5/OWASP_Asia_2008_TimBass.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]] &lt;br /&gt;
'''[https://www.owasp.org/images/5/5d/AppSecASIA08-BPWAF.pdf Slides]'''&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/0/09/OWASP_Asia_2008_Steven.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Anthony_Lai_(Dark_Floyd)%2C_OWASP_HK_Chapter Anthony], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
== Conference T-Shirt ==&lt;br /&gt;
[[Image:OWAS AppSec Asia Tshirt.png]]&lt;br /&gt;
&lt;br /&gt;
== Conference Venue==&lt;br /&gt;
&lt;br /&gt;
'''Taipei International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' 3rd floor Conference Hall, Xin Yi Road, Section 5, number 1, Taipei, Taiwan R.O.C.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.ticc.com.tw/index_en.aspx Website]'''&lt;br /&gt;
&lt;br /&gt;
== Hotel Information ==&lt;br /&gt;
&lt;br /&gt;
'''San Want Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.172, Sec. 4, ZhongXiao East Road, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel:+886-2-2772-2121 ｜ Fax : +886-2-2721-0302&lt;br /&gt;
&lt;br /&gt;
'''[http://www.sanwant.com/ Website]''' &lt;br /&gt;
&lt;br /&gt;
                                                    &lt;br /&gt;
'''Hope City FuShing Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.275, Sec.1, Fushing S. Rd., Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel : +886-2-2703-9990 ｜ Fax : +886-2-2706-8547&lt;br /&gt;
&lt;br /&gt;
'''[http://www.city-hotel.com.tw/bussiness/b2/b2-en.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
== Taipei City Map - With OWASP Venue and Hotels Marked ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image: Owasp_appsec_asia_2007_tpe_map_new.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Welcome to Taiwan==&lt;br /&gt;
And WELCOME TO TAIWAN! Please check out [http://tw.youtube.com/watch?v=wRc0q9xQEQ4 this video] about interesting places in Taiwan.&lt;br /&gt;
If you need suggestions on how to plan out your trip, please feel free to [mailto:wayne.owasp@gmail.com '''contact us!''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Guide Team: ===&lt;br /&gt;
&lt;br /&gt;
[http://www.moeaidb.gov.tw https://www.owasp.org/images/8/82/IDB.png]&lt;br /&gt;
[http://www.moea.gov.tw/ https://www.owasp.org/images/a/a4/MOEA.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizers: ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Taiwan https://www.owasp.org/images/2/2b/OWASP_TW.png]&lt;br /&gt;
[http://www.iii.org.tw/english/ https://www.owasp.org/images/7/75/III.png]&lt;br /&gt;
[http://web.cisanet.org.tw/# https://www.owasp.org/images/6/64/CISA.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
&lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png]  -  [http://www.fortify.com/ https://www.owasp.org/images/c/c7/Fortify.png]  -  [http://www.imperva.com/ https://www.owasp.org/images/d/da/IMPERVA.png]  -  &lt;br /&gt;
[http://www.mtechpro.com/ https://www.owasp.org/images/b/be/MTECH.png]  -  &lt;br /&gt;
[http://www.mudynamics.com/ https://www.owasp.org/images/1/17/Mu_Dynamics.png]  -  &lt;br /&gt;
[http://www.systex.com.tw/english/index.asp https://www.owasp.org/images/5/5e/SYSTEX.png]  -  &lt;br /&gt;
[http://www.twisc.ntust.edu.tw/ https://www.owasp.org/images/6/6d/TWISC.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
&lt;br /&gt;
[http://www.bluecoat.com/ https://www.owasp.org/images/9/9c/BLUECOAT.png]&lt;br /&gt;
[http://www.eraysecure.com.tw/ https://www.owasp.org/images/e/ea/ERay.png]&lt;br /&gt;
[http://tw.yahoo.com/ https://www.owasp.org/images/a/a9/YahooTw.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Silver Sponsors: ===&lt;br /&gt;
&lt;br /&gt;
[http://www.network-box.com.tw/ https://www.owasp.org/images/0/08/NETWORK_BOX.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
&lt;br /&gt;
[http://www.isecutech.com.tw/main/index.aspx https://www.owasp.org/images/9/97/INFOSECURITY.png]&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45743</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45743"/>
				<updated>2008-11-04T08:09:00Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== A Note of Thanks ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank this year's 1200+ attendees who came to show support for OWASP App Sec Asia 2008!! As well as our Speakers, Chapter leaders and Sponsors who helped make this year's OWASP Asia Conference a great success!&lt;br /&gt;
[[Image:OWASP_Asia_08.jpg|center|733px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NOW AVAILABLE: OWASP AppSec Asia 2008 Session Slides ==&lt;br /&gt;
&lt;br /&gt;
The session slides are now available; please go to SESSION column under [https://www.owasp.org/index.php/OWASP_AppSec_Asia_2008_-_Taiwan#OWASP_AppSec_Asia_2008.2C_Conference_Schedule_.28Oct_27th_-_Oct_28th.29 Conference Schedule] to access to the slides.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 - Taiwan== &lt;br /&gt;
&lt;br /&gt;
Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-10:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/4/41/OWASP_Asia_2008_YMChen.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00-11:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]''' '''[https://www.owasp.org/images/6/6b/OWASP_Asia_2008_Wayne.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 11:50 - 12:40 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''12:40 - 13:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/14/OWASP_Asia_2008_KK.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''13:40 - 15:40 Asia Chapter Leader Meeting''' &lt;br /&gt;
'''Attendee:''' China, Delhi, HK, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters&lt;br /&gt;
&lt;br /&gt;
'''P.S:''' Meeting with go in parallel to the two of the talk sessions and coffee break.&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''13:40 - 14:30''' || style=&amp;quot;width:33%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:30 - 14:50 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:50 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/d/d2/OWASP_Asia_2008_FrankFan.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Yuan Fan, OWASP China Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin (Taiwan Information &amp;amp; Communication Security Technology Center)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:10''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Penetration Test with BackTrack: Art of Exploitation]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/f/f7/OWASP_Asia_2008_Anthony.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Anthony Lai (Dark Floyd), OWASP HK Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/9/9f/OWASP_Asia_2008_RSnake.pdf Slides]''' &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/15/OWASP_Asia_2008_Chenxi.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/7/74/OWASP_Asia_2008_Pukhraj.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/e/e5/OWASP_Asia_2008_TimBass.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]] &lt;br /&gt;
'''[https://www.owasp.org/images/5/5d/AppSecASIA08-BPWAF.pdf Slides]'''&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/0/09/OWASP_Asia_2008_Steven.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Anthony_Lai_(Dark_Floyd)%2C_OWASP_HK_Chapter Anthony], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
== Conference T-Shirt ==&lt;br /&gt;
[[Image:OWAS AppSec Asia Tshirt.png]]&lt;br /&gt;
&lt;br /&gt;
== Conference Venue==&lt;br /&gt;
&lt;br /&gt;
'''Taipei International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' 3rd floor Conference Hall, Xin Yi Road, Section 5, number 1, Taipei, Taiwan R.O.C.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.ticc.com.tw/index_en.aspx Website]'''&lt;br /&gt;
&lt;br /&gt;
== Hotel Information ==&lt;br /&gt;
&lt;br /&gt;
'''San Want Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.172, Sec. 4, ZhongXiao East Road, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel:+886-2-2772-2121 ｜ Fax : +886-2-2721-0302&lt;br /&gt;
&lt;br /&gt;
'''[http://www.sanwant.com/ Website]''' &lt;br /&gt;
&lt;br /&gt;
                                                    &lt;br /&gt;
'''Hope City FuShing Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.275, Sec.1, Fushing S. Rd., Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel : +886-2-2703-9990 ｜ Fax : +886-2-2706-8547&lt;br /&gt;
&lt;br /&gt;
'''[http://www.city-hotel.com.tw/bussiness/b2/b2-en.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
== Taipei City Map - With OWASP Venue and Hotels Marked ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image: Owasp_appsec_asia_2007_tpe_map_new.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Welcome to Taiwan==&lt;br /&gt;
And WELCOME TO TAIWAN! Please check out [http://tw.youtube.com/watch?v=wRc0q9xQEQ4 this video] about interesting places in Taiwan.&lt;br /&gt;
If you need suggestions on how to plan out your trip, please feel free to [mailto:wayne.owasp@gmail.com '''contact us!''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Guide Team: ===&lt;br /&gt;
&lt;br /&gt;
[http://www.moeaidb.gov.tw https://www.owasp.org/images/8/82/IDB.png]&lt;br /&gt;
[http://www.moea.gov.tw/ https://www.owasp.org/images/a/a4/MOEA.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizers: ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Taiwan https://www.owasp.org/images/2/2b/OWASP_TW.png]&lt;br /&gt;
[http://www.iii.org.tw/english/ https://www.owasp.org/images/7/75/III.png]&lt;br /&gt;
[http://web.cisanet.org.tw/# https://www.owasp.org/images/6/64/CISA.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
&lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png]  -  [http://www.fortify.com/ https://www.owasp.org/images/c/c7/Fortify.png]  -  [http://www.imperva.com/ https://www.owasp.org/images/d/da/IMPERVA.png]  -  &lt;br /&gt;
[http://www.mtechpro.com/ https://www.owasp.org/images/b/be/MTECH.png]  -  &lt;br /&gt;
[http://www.mudynamics.com/ https://www.owasp.org/images/1/17/Mu_Dynamics.png]  -  &lt;br /&gt;
[http://www.systex.com.tw/english/index.asp https://www.owasp.org/images/5/5e/SYSTEX.png]  -  &lt;br /&gt;
[http://www.twisc.ntust.edu.tw/ https://www.owasp.org/images/6/6d/TWISC.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
&lt;br /&gt;
[http://www.bluecoat.com/ https://www.owasp.org/images/9/9c/BLUECOAT.png]&lt;br /&gt;
[http://www.eraysecure.com.tw/ https://www.owasp.org/images/e/ea/ERay.png]&lt;br /&gt;
[http://tw.yahoo.com/ https://www.owasp.org/images/a/a9/YahooTw.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Silver Sponsors: ===&lt;br /&gt;
&lt;br /&gt;
[http://www.network-box.com.tw/ https://www.owasp.org/images/0/08/NETWORK_BOX.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
&lt;br /&gt;
[http://www.isecutech.com.tw/main/index.aspx https://www.owasp.org/images/9/97/INFOSECURITY.png]&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45742</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45742"/>
				<updated>2008-11-04T08:01:10Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: /* OWASP AppSec Asia 2008 Conference Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== A Note of Thanks ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank this year's 1200+ attendees who came to show support for OWASP App Sec Asia 2008!! As well as our Speakers, Chapter leaders and Sponsors who helped make this year's OWASP Asia Conference a great success!&lt;br /&gt;
[[Image:OWASP_Asia_08.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NOW AVAILABLE: OWASP AppSec Asia 2008 Session Slides ==&lt;br /&gt;
&lt;br /&gt;
The session slides are now available; please go to SESSION column under [https://www.owasp.org/index.php/OWASP_AppSec_Asia_2008_-_Taiwan#OWASP_AppSec_Asia_2008.2C_Conference_Schedule_.28Oct_27th_-_Oct_28th.29 Conference Schedule] to access to the slides.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 - Taiwan== &lt;br /&gt;
&lt;br /&gt;
Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-10:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/4/41/OWASP_Asia_2008_YMChen.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00-11:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]''' '''[https://www.owasp.org/images/6/6b/OWASP_Asia_2008_Wayne.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 11:50 - 12:40 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''12:40 - 13:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/14/OWASP_Asia_2008_KK.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''13:40 - 15:40 Asia Chapter Leader Meeting''' &lt;br /&gt;
'''Attendee:''' China, Delhi, HK, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters&lt;br /&gt;
&lt;br /&gt;
'''P.S:''' Meeting with go in parallel to the two of the talk sessions and coffee break.&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''13:40 - 14:30''' || style=&amp;quot;width:33%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:30 - 14:50 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:50 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/d/d2/OWASP_Asia_2008_FrankFan.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Yuan Fan, OWASP China Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin (Taiwan Information &amp;amp; Communication Security Technology Center)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:10''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Penetration Test with BackTrack: Art of Exploitation]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/f/f7/OWASP_Asia_2008_Anthony.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Anthony Lai (Dark Floyd), OWASP HK Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/9/9f/OWASP_Asia_2008_RSnake.pdf Slides]''' &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/15/OWASP_Asia_2008_Chenxi.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/7/74/OWASP_Asia_2008_Pukhraj.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/e/e5/OWASP_Asia_2008_TimBass.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]] &lt;br /&gt;
'''[https://www.owasp.org/images/5/5d/AppSecASIA08-BPWAF.pdf Slides]'''&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/0/09/OWASP_Asia_2008_Steven.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Anthony_Lai_(Dark_Floyd)%2C_OWASP_HK_Chapter Anthony], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
== Conference T-Shirt ==&lt;br /&gt;
[[Image:OWAS AppSec Asia Tshirt.png]]&lt;br /&gt;
&lt;br /&gt;
== Conference Venue==&lt;br /&gt;
&lt;br /&gt;
'''Taipei International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' 3rd floor Conference Hall, Xin Yi Road, Section 5, number 1, Taipei, Taiwan R.O.C.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.ticc.com.tw/index_en.aspx Website]'''&lt;br /&gt;
&lt;br /&gt;
== Hotel Information ==&lt;br /&gt;
&lt;br /&gt;
'''San Want Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.172, Sec. 4, ZhongXiao East Road, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel:+886-2-2772-2121 ｜ Fax : +886-2-2721-0302&lt;br /&gt;
&lt;br /&gt;
'''[http://www.sanwant.com/ Website]''' &lt;br /&gt;
&lt;br /&gt;
                                                    &lt;br /&gt;
'''Hope City FuShing Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.275, Sec.1, Fushing S. Rd., Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel : +886-2-2703-9990 ｜ Fax : +886-2-2706-8547&lt;br /&gt;
&lt;br /&gt;
'''[http://www.city-hotel.com.tw/bussiness/b2/b2-en.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
== Taipei City Map - With OWASP Venue and Hotels Marked ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image: Owasp_appsec_asia_2007_tpe_map_new.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Welcome to Taiwan==&lt;br /&gt;
And WELCOME TO TAIWAN! Please check out [http://tw.youtube.com/watch?v=wRc0q9xQEQ4 this video] about interesting places in Taiwan.&lt;br /&gt;
If you need suggestions on how to plan out your trip, please feel free to [mailto:wayne.owasp@gmail.com '''contact us!''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Guide Team: ===&lt;br /&gt;
&lt;br /&gt;
[http://www.moeaidb.gov.tw https://www.owasp.org/images/8/82/IDB.png]&lt;br /&gt;
[http://www.moea.gov.tw/ https://www.owasp.org/images/a/a4/MOEA.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizers: ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Taiwan https://www.owasp.org/images/2/2b/OWASP_TW.png]&lt;br /&gt;
[http://www.iii.org.tw/english/ https://www.owasp.org/images/7/75/III.png]&lt;br /&gt;
[http://web.cisanet.org.tw/# https://www.owasp.org/images/6/64/CISA.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
&lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png]  -  [http://www.fortify.com/ https://www.owasp.org/images/c/c7/Fortify.png]  -  [http://www.imperva.com/ https://www.owasp.org/images/d/da/IMPERVA.png]  -  &lt;br /&gt;
[http://www.mtechpro.com/ https://www.owasp.org/images/b/be/MTECH.png]  -  &lt;br /&gt;
[http://www.mudynamics.com/ https://www.owasp.org/images/1/17/Mu_Dynamics.png]  -  &lt;br /&gt;
[http://www.systex.com.tw/english/index.asp https://www.owasp.org/images/5/5e/SYSTEX.png]  -  &lt;br /&gt;
[http://www.twisc.ntust.edu.tw/ https://www.owasp.org/images/6/6d/TWISC.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
&lt;br /&gt;
[http://www.bluecoat.com/ https://www.owasp.org/images/9/9c/BLUECOAT.png]&lt;br /&gt;
[http://www.eraysecure.com.tw/ https://www.owasp.org/images/e/ea/ERay.png]&lt;br /&gt;
[http://tw.yahoo.com/ https://www.owasp.org/images/a/a9/YahooTw.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Silver Sponsors: ===&lt;br /&gt;
&lt;br /&gt;
[http://www.network-box.com.tw/ https://www.owasp.org/images/0/08/NETWORK_BOX.png]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
&lt;br /&gt;
[http://www.isecutech.com.tw/main/index.aspx https://www.owasp.org/images/9/97/INFOSECURITY.png]&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45741</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45741"/>
				<updated>2008-11-04T07:52:21Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: /* Guide Team */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== A Note of Thanks ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank this year's 1200+ attendees who came to show support for OWASP App Sec Asia 2008!! As well as our Speakers, Chapter leaders and Sponsors who helped make this year's OWASP Asia Conference a great success!&lt;br /&gt;
[[Image:OWASP_Asia_08.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NOW AVAILABLE: OWASP AppSec Asia 2008 Session Slides ==&lt;br /&gt;
&lt;br /&gt;
The session slides are now available; please go to SESSION column under [https://www.owasp.org/index.php/OWASP_AppSec_Asia_2008_-_Taiwan#OWASP_AppSec_Asia_2008.2C_Conference_Schedule_.28Oct_27th_-_Oct_28th.29 Conference Schedule] to access to the slides.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 - Taiwan== &lt;br /&gt;
&lt;br /&gt;
Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-10:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/4/41/OWASP_Asia_2008_YMChen.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00-11:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]''' '''[https://www.owasp.org/images/6/6b/OWASP_Asia_2008_Wayne.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 11:50 - 12:40 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''12:40 - 13:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/14/OWASP_Asia_2008_KK.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''13:40 - 15:40 Asia Chapter Leader Meeting''' &lt;br /&gt;
'''Attendee:''' China, Delhi, HK, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters&lt;br /&gt;
&lt;br /&gt;
'''P.S:''' Meeting with go in parallel to the two of the talk sessions and coffee break.&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''13:40 - 14:30''' || style=&amp;quot;width:33%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:30 - 14:50 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:50 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/d/d2/OWASP_Asia_2008_FrankFan.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Yuan Fan, OWASP China Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin (Taiwan Information &amp;amp; Communication Security Technology Center)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:10''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Penetration Test with BackTrack: Art of Exploitation]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/f/f7/OWASP_Asia_2008_Anthony.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Anthony Lai (Dark Floyd), OWASP HK Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/9/9f/OWASP_Asia_2008_RSnake.pdf Slides]''' &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/15/OWASP_Asia_2008_Chenxi.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/7/74/OWASP_Asia_2008_Pukhraj.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/e/e5/OWASP_Asia_2008_TimBass.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]] &lt;br /&gt;
'''[https://www.owasp.org/images/5/5d/AppSecASIA08-BPWAF.pdf Slides]'''&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/0/09/OWASP_Asia_2008_Steven.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Anthony_Lai_(Dark_Floyd)%2C_OWASP_HK_Chapter Anthony], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
== Conference T-Shirt ==&lt;br /&gt;
[[Image:OWAS AppSec Asia Tshirt.png]]&lt;br /&gt;
&lt;br /&gt;
== Conference Venue==&lt;br /&gt;
&lt;br /&gt;
'''Taipei International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' 3rd floor Conference Hall, Xin Yi Road, Section 5, number 1, Taipei, Taiwan R.O.C.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.ticc.com.tw/index_en.aspx Website]'''&lt;br /&gt;
&lt;br /&gt;
== Hotel Information ==&lt;br /&gt;
&lt;br /&gt;
'''San Want Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.172, Sec. 4, ZhongXiao East Road, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel:+886-2-2772-2121 ｜ Fax : +886-2-2721-0302&lt;br /&gt;
&lt;br /&gt;
'''[http://www.sanwant.com/ Website]''' &lt;br /&gt;
&lt;br /&gt;
                                                    &lt;br /&gt;
'''Hope City FuShing Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.275, Sec.1, Fushing S. Rd., Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel : +886-2-2703-9990 ｜ Fax : +886-2-2706-8547&lt;br /&gt;
&lt;br /&gt;
'''[http://www.city-hotel.com.tw/bussiness/b2/b2-en.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
== Taipei City Map - With OWASP Venue and Hotels Marked ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image: Owasp_appsec_asia_2007_tpe_map_new.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Welcome to Taiwan==&lt;br /&gt;
And WELCOME TO TAIWAN! Please check out [http://tw.youtube.com/watch?v=wRc0q9xQEQ4 this video] about interesting places in Taiwan.&lt;br /&gt;
If you need suggestions on how to plan out your trip, please feel free to [mailto:wayne.owasp@gmail.com '''contact us!''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
=== Guide Team ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.moeaidb.gov.tw https://www.owasp.org/images/8/82/IDB.png]&lt;br /&gt;
[http://www.moea.gov.tw/ https://www.owasp.org/images/a/a4/MOEA.png]&lt;br /&gt;
&lt;br /&gt;
=== Organizers ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Taiwan https://www.owasp.org/images/2/2b/OWASP_TW.png]&lt;br /&gt;
[http://www.iii.org.tw/english/ https://www.owasp.org/images/7/75/III.png]&lt;br /&gt;
[http://web.cisanet.org.tw/# https://www.owasp.org/images/6/64/CISA.png]&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png]  -  [http://www.fortify.com/ https://www.owasp.org/images/c/c7/Fortify.png]  -  [http://www.imperva.com/ https://www.owasp.org/images/d/da/IMPERVA.png]  -  &lt;br /&gt;
[http://www.mtechpro.com/ https://www.owasp.org/images/b/be/MTECH.png]  -  &lt;br /&gt;
[http://www.mudynamics.com/ https://www.owasp.org/images/1/17/Mu_Dynamics.png]  -  &lt;br /&gt;
[http://www.systex.com.tw/english/index.asp https://www.owasp.org/images/5/5e/SYSTEX.png]  -  &lt;br /&gt;
[http://www.twisc.ntust.edu.tw/ https://www.owasp.org/images/6/6d/TWISC.png]&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[http://www.bluecoat.com/ https://www.owasp.org/images/9/9c/BLUECOAT.png]&lt;br /&gt;
[http://www.eraysecure.com.tw/ https://www.owasp.org/images/e/ea/ERay.png]&lt;br /&gt;
[http://tw.yahoo.com/ https://www.owasp.org/images/a/a9/YahooTw.png]&lt;br /&gt;
&lt;br /&gt;
=== Silver Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[http://www.network-box.com.tw/ https://www.owasp.org/images/0/08/NETWORK_BOX.png]&lt;br /&gt;
&lt;br /&gt;
=== Media Partners ===&lt;br /&gt;
&lt;br /&gt;
[http://www.isecutech.com.tw/main/index.aspx https://www.owasp.org/images/9/97/INFOSECURITY.png]&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45740</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45740"/>
				<updated>2008-11-04T07:51:14Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: /* Platinum Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== A Note of Thanks ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank this year's 1200+ attendees who came to show support for OWASP App Sec Asia 2008!! As well as our Speakers, Chapter leaders and Sponsors who helped make this year's OWASP Asia Conference a great success!&lt;br /&gt;
[[Image:OWASP_Asia_08.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NOW AVAILABLE: OWASP AppSec Asia 2008 Session Slides ==&lt;br /&gt;
&lt;br /&gt;
The session slides are now available; please go to SESSION column under [https://www.owasp.org/index.php/OWASP_AppSec_Asia_2008_-_Taiwan#OWASP_AppSec_Asia_2008.2C_Conference_Schedule_.28Oct_27th_-_Oct_28th.29 Conference Schedule] to access to the slides.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 - Taiwan== &lt;br /&gt;
&lt;br /&gt;
Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-10:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/4/41/OWASP_Asia_2008_YMChen.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00-11:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]''' '''[https://www.owasp.org/images/6/6b/OWASP_Asia_2008_Wayne.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 11:50 - 12:40 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''12:40 - 13:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/14/OWASP_Asia_2008_KK.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''13:40 - 15:40 Asia Chapter Leader Meeting''' &lt;br /&gt;
'''Attendee:''' China, Delhi, HK, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters&lt;br /&gt;
&lt;br /&gt;
'''P.S:''' Meeting with go in parallel to the two of the talk sessions and coffee break.&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''13:40 - 14:30''' || style=&amp;quot;width:33%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:30 - 14:50 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:50 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/d/d2/OWASP_Asia_2008_FrankFan.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Yuan Fan, OWASP China Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin (Taiwan Information &amp;amp; Communication Security Technology Center)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:10''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Penetration Test with BackTrack: Art of Exploitation]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/f/f7/OWASP_Asia_2008_Anthony.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Anthony Lai (Dark Floyd), OWASP HK Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/9/9f/OWASP_Asia_2008_RSnake.pdf Slides]''' &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/15/OWASP_Asia_2008_Chenxi.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/7/74/OWASP_Asia_2008_Pukhraj.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/e/e5/OWASP_Asia_2008_TimBass.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]] &lt;br /&gt;
'''[https://www.owasp.org/images/5/5d/AppSecASIA08-BPWAF.pdf Slides]'''&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/0/09/OWASP_Asia_2008_Steven.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Anthony_Lai_(Dark_Floyd)%2C_OWASP_HK_Chapter Anthony], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
== Conference T-Shirt ==&lt;br /&gt;
[[Image:OWAS AppSec Asia Tshirt.png]]&lt;br /&gt;
&lt;br /&gt;
== Conference Venue==&lt;br /&gt;
&lt;br /&gt;
'''Taipei International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' 3rd floor Conference Hall, Xin Yi Road, Section 5, number 1, Taipei, Taiwan R.O.C.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.ticc.com.tw/index_en.aspx Website]'''&lt;br /&gt;
&lt;br /&gt;
== Hotel Information ==&lt;br /&gt;
&lt;br /&gt;
'''San Want Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.172, Sec. 4, ZhongXiao East Road, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel:+886-2-2772-2121 ｜ Fax : +886-2-2721-0302&lt;br /&gt;
&lt;br /&gt;
'''[http://www.sanwant.com/ Website]''' &lt;br /&gt;
&lt;br /&gt;
                                                    &lt;br /&gt;
'''Hope City FuShing Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.275, Sec.1, Fushing S. Rd., Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel : +886-2-2703-9990 ｜ Fax : +886-2-2706-8547&lt;br /&gt;
&lt;br /&gt;
'''[http://www.city-hotel.com.tw/bussiness/b2/b2-en.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
== Taipei City Map - With OWASP Venue and Hotels Marked ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image: Owasp_appsec_asia_2007_tpe_map_new.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Welcome to Taiwan==&lt;br /&gt;
And WELCOME TO TAIWAN! Please check out [http://tw.youtube.com/watch?v=wRc0q9xQEQ4 this video] about interesting places in Taiwan.&lt;br /&gt;
If you need suggestions on how to plan out your trip, please feel free to [mailto:wayne.owasp@gmail.com '''contact us!''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
=== Guide Team ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.moeaidb.gov.tw https://www.owasp.org/images/8/82/IDB.png]&lt;br /&gt;
[http://www.moea.gov.tw/ https://www.owasp.org/images/a/a4/MOEA.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Organizers ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Taiwan https://www.owasp.org/images/2/2b/OWASP_TW.png]&lt;br /&gt;
[http://www.iii.org.tw/english/ https://www.owasp.org/images/7/75/III.png]&lt;br /&gt;
[http://web.cisanet.org.tw/# https://www.owasp.org/images/6/64/CISA.png]&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png]  -  [http://www.fortify.com/ https://www.owasp.org/images/c/c7/Fortify.png]  -  [http://www.imperva.com/ https://www.owasp.org/images/d/da/IMPERVA.png]  -  &lt;br /&gt;
[http://www.mtechpro.com/ https://www.owasp.org/images/b/be/MTECH.png]  -  &lt;br /&gt;
[http://www.mudynamics.com/ https://www.owasp.org/images/1/17/Mu_Dynamics.png]  -  &lt;br /&gt;
[http://www.systex.com.tw/english/index.asp https://www.owasp.org/images/5/5e/SYSTEX.png]  -  &lt;br /&gt;
[http://www.twisc.ntust.edu.tw/ https://www.owasp.org/images/6/6d/TWISC.png]&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[http://www.bluecoat.com/ https://www.owasp.org/images/9/9c/BLUECOAT.png]&lt;br /&gt;
[http://www.eraysecure.com.tw/ https://www.owasp.org/images/e/ea/ERay.png]&lt;br /&gt;
[http://tw.yahoo.com/ https://www.owasp.org/images/a/a9/YahooTw.png]&lt;br /&gt;
&lt;br /&gt;
=== Silver Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[http://www.network-box.com.tw/ https://www.owasp.org/images/0/08/NETWORK_BOX.png]&lt;br /&gt;
&lt;br /&gt;
=== Media Partners ===&lt;br /&gt;
&lt;br /&gt;
[http://www.isecutech.com.tw/main/index.aspx https://www.owasp.org/images/9/97/INFOSECURITY.png]&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:YahooTw.png&amp;diff=45739</id>
		<title>File:YahooTw.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:YahooTw.png&amp;diff=45739"/>
				<updated>2008-11-04T07:36:28Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: uploaded a new version of &amp;quot;Image:YahooTw.png&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:TWISC.png&amp;diff=45738</id>
		<title>File:TWISC.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:TWISC.png&amp;diff=45738"/>
				<updated>2008-11-04T07:36:00Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: uploaded a new version of &amp;quot;Image:TWISC.png&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:SYSTEX.png&amp;diff=45737</id>
		<title>File:SYSTEX.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:SYSTEX.png&amp;diff=45737"/>
				<updated>2008-11-04T07:35:46Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: uploaded a new version of &amp;quot;Image:SYSTEX.png&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:NETWORK_BOX.png&amp;diff=45736</id>
		<title>File:NETWORK BOX.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:NETWORK_BOX.png&amp;diff=45736"/>
				<updated>2008-11-04T07:35:30Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: uploaded a new version of &amp;quot;Image:NETWORK BOX.png&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Mu_Dynamics.png&amp;diff=45735</id>
		<title>File:Mu Dynamics.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Mu_Dynamics.png&amp;diff=45735"/>
				<updated>2008-11-04T07:35:10Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: uploaded a new version of &amp;quot;Image:Mu Dynamics.png&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:MTECH.png&amp;diff=45734</id>
		<title>File:MTECH.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:MTECH.png&amp;diff=45734"/>
				<updated>2008-11-04T07:34:56Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: uploaded a new version of &amp;quot;Image:MTECH.png&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:MOEA.png&amp;diff=45733</id>
		<title>File:MOEA.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:MOEA.png&amp;diff=45733"/>
				<updated>2008-11-04T07:34:41Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: uploaded a new version of &amp;quot;Image:MOEA.png&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:ERay.png&amp;diff=45732</id>
		<title>File:ERay.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:ERay.png&amp;diff=45732"/>
				<updated>2008-11-04T07:34:23Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: uploaded a new version of &amp;quot;Image:ERay.png&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:BLUECOAT.png&amp;diff=45731</id>
		<title>File:BLUECOAT.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:BLUECOAT.png&amp;diff=45731"/>
				<updated>2008-11-04T07:31:41Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: uploaded a new version of &amp;quot;Image:BLUECOAT.png&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Fortify.png&amp;diff=45730</id>
		<title>File:Fortify.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Fortify.png&amp;diff=45730"/>
				<updated>2008-11-04T07:25:27Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: uploaded a new version of &amp;quot;Image:Fortify.png&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:INFOSECURITY.png&amp;diff=45729</id>
		<title>File:INFOSECURITY.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:INFOSECURITY.png&amp;diff=45729"/>
				<updated>2008-11-04T07:23:23Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: uploaded a new version of &amp;quot;Image:INFOSECURITY.png&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:INFOSECURITY.png&amp;diff=45728</id>
		<title>File:INFOSECURITY.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:INFOSECURITY.png&amp;diff=45728"/>
				<updated>2008-11-04T07:22:16Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: uploaded a new version of &amp;quot;Image:INFOSECURITY.png&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45725</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45725"/>
				<updated>2008-11-04T05:06:06Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: /* OWASP AppSec Asia 2008 Conference Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== A Note of Thanks ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank this year's 1200+ attendees who came to show support for OWASP App Sec Asia 2008!! As well as our Speakers, Chapter leaders and Sponsors who helped make this year's OWASP Asia Conference a great success!&lt;br /&gt;
[[Image:OWASP_Asia_08.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NOW AVAILABLE: OWASP AppSec Asia 2008 Session Slides ==&lt;br /&gt;
&lt;br /&gt;
The session slides are now available; please go to SESSION column under [https://www.owasp.org/index.php/OWASP_AppSec_Asia_2008_-_Taiwan#OWASP_AppSec_Asia_2008.2C_Conference_Schedule_.28Oct_27th_-_Oct_28th.29 Conference Schedule] to access to the slides.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 - Taiwan== &lt;br /&gt;
&lt;br /&gt;
Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-10:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/4/41/OWASP_Asia_2008_YMChen.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00-11:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]''' '''[https://www.owasp.org/images/6/6b/OWASP_Asia_2008_Wayne.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 11:50 - 12:40 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''12:40 - 13:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/14/OWASP_Asia_2008_KK.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''13:40 - 15:40 Asia Chapter Leader Meeting''' &lt;br /&gt;
'''Attendee:''' China, Delhi, HK, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters&lt;br /&gt;
&lt;br /&gt;
'''P.S:''' Meeting with go in parallel to the two of the talk sessions and coffee break.&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''13:40 - 14:30''' || style=&amp;quot;width:33%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:30 - 14:50 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:50 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/d/d2/OWASP_Asia_2008_FrankFan.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Yuan Fan, OWASP China Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin (Taiwan Information &amp;amp; Communication Security Technology Center)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:10''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Penetration Test with BackTrack: Art of Exploitation]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/f/f7/OWASP_Asia_2008_Anthony.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Anthony Lai (Dark Floyd), OWASP HK Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/9/9f/OWASP_Asia_2008_RSnake.pdf Slides]''' &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/15/OWASP_Asia_2008_Chenxi.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/7/74/OWASP_Asia_2008_Pukhraj.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/e/e5/OWASP_Asia_2008_TimBass.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]] &lt;br /&gt;
'''[https://www.owasp.org/images/5/5d/AppSecASIA08-BPWAF.pdf Slides]'''&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/0/09/OWASP_Asia_2008_Steven.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Anthony_Lai_(Dark_Floyd)%2C_OWASP_HK_Chapter Anthony], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
== Conference T-Shirt ==&lt;br /&gt;
[[Image:OWAS AppSec Asia Tshirt.png]]&lt;br /&gt;
&lt;br /&gt;
== Conference Venue==&lt;br /&gt;
&lt;br /&gt;
'''Taipei International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' 3rd floor Conference Hall, Xin Yi Road, Section 5, number 1, Taipei, Taiwan R.O.C.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.ticc.com.tw/index_en.aspx Website]'''&lt;br /&gt;
&lt;br /&gt;
== Hotel Information ==&lt;br /&gt;
&lt;br /&gt;
'''San Want Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.172, Sec. 4, ZhongXiao East Road, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel:+886-2-2772-2121 ｜ Fax : +886-2-2721-0302&lt;br /&gt;
&lt;br /&gt;
'''[http://www.sanwant.com/ Website]''' &lt;br /&gt;
&lt;br /&gt;
                                                    &lt;br /&gt;
'''Hope City FuShing Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.275, Sec.1, Fushing S. Rd., Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel : +886-2-2703-9990 ｜ Fax : +886-2-2706-8547&lt;br /&gt;
&lt;br /&gt;
'''[http://www.city-hotel.com.tw/bussiness/b2/b2-en.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
== Taipei City Map - With OWASP Venue and Hotels Marked ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image: Owasp_appsec_asia_2007_tpe_map_new.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Welcome to Taiwan==&lt;br /&gt;
And WELCOME TO TAIWAN! Please check out [http://tw.youtube.com/watch?v=wRc0q9xQEQ4 this video] about interesting places in Taiwan.&lt;br /&gt;
If you need suggestions on how to plan out your trip, please feel free to [mailto:wayne.owasp@gmail.com '''contact us!''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
=== Guide Team ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.moeaidb.gov.tw https://www.owasp.org/images/8/82/IDB.png]&lt;br /&gt;
[http://www.moea.gov.tw/ https://www.owasp.org/images/a/a4/MOEA.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Organizers ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Taiwan https://www.owasp.org/images/2/2b/OWASP_TW.png]&lt;br /&gt;
[http://www.iii.org.tw/english/ https://www.owasp.org/images/7/75/III.png]&lt;br /&gt;
[http://web.cisanet.org.tw/# https://www.owasp.org/images/6/64/CISA.png]&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png]&lt;br /&gt;
[http://www.fortify.com/ https://www.owasp.org/images/c/c7/Fortify.png]&lt;br /&gt;
[http://www.imperva.com/ https://www.owasp.org/images/d/da/IMPERVA.png]&lt;br /&gt;
[http://www.mtechpro.com/ https://www.owasp.org/images/b/be/MTECH.png]&lt;br /&gt;
[http://www.mudynamics.com/ https://www.owasp.org/images/1/17/Mu_Dynamics.png]&lt;br /&gt;
[http://www.systex.com.tw/english/index.asp https://www.owasp.org/images/5/5e/SYSTEX.png]&lt;br /&gt;
[http://www.twisc.ntust.edu.tw/ https://www.owasp.org/images/6/6d/TWISC.png]&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[http://www.bluecoat.com/ https://www.owasp.org/images/9/9c/BLUECOAT.png]&lt;br /&gt;
[http://www.eraysecure.com.tw/ https://www.owasp.org/images/e/ea/ERay.png]&lt;br /&gt;
[http://tw.yahoo.com/ https://www.owasp.org/images/a/a9/YahooTw.png]&lt;br /&gt;
&lt;br /&gt;
=== Silver Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[http://www.network-box.com.tw/ https://www.owasp.org/images/0/08/NETWORK_BOX.png]&lt;br /&gt;
&lt;br /&gt;
=== Media Partners ===&lt;br /&gt;
&lt;br /&gt;
[http://www.isecutech.com.tw/main/index.aspx https://www.owasp.org/images/9/97/INFOSECURITY.png]&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45724</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45724"/>
				<updated>2008-11-04T05:03:59Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: /* OWASP AppSec Asia 2008 Conference Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== A Note of Thanks ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank this year's 1200+ attendees who came to show support for OWASP App Sec Asia 2008!! As well as our Speakers, Chapter leaders and Sponsors who helped make this year's OWASP Asia Conference a great success!&lt;br /&gt;
[[Image:OWASP_Asia_08.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NOW AVAILABLE: OWASP AppSec Asia 2008 Session Slides ==&lt;br /&gt;
&lt;br /&gt;
The session slides are now available; please go to SESSION column under [https://www.owasp.org/index.php/OWASP_AppSec_Asia_2008_-_Taiwan#OWASP_AppSec_Asia_2008.2C_Conference_Schedule_.28Oct_27th_-_Oct_28th.29 Conference Schedule] to access to the slides.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 - Taiwan== &lt;br /&gt;
&lt;br /&gt;
Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-10:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/4/41/OWASP_Asia_2008_YMChen.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00-11:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]''' '''[https://www.owasp.org/images/6/6b/OWASP_Asia_2008_Wayne.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 11:50 - 12:40 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''12:40 - 13:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/14/OWASP_Asia_2008_KK.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''13:40 - 15:40 Asia Chapter Leader Meeting''' &lt;br /&gt;
'''Attendee:''' China, Delhi, HK, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters&lt;br /&gt;
&lt;br /&gt;
'''P.S:''' Meeting with go in parallel to the two of the talk sessions and coffee break.&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''13:40 - 14:30''' || style=&amp;quot;width:33%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:30 - 14:50 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:50 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/d/d2/OWASP_Asia_2008_FrankFan.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Yuan Fan, OWASP China Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin (Taiwan Information &amp;amp; Communication Security Technology Center)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:10''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Penetration Test with BackTrack: Art of Exploitation]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/f/f7/OWASP_Asia_2008_Anthony.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Anthony Lai (Dark Floyd), OWASP HK Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/9/9f/OWASP_Asia_2008_RSnake.pdf Slides]''' &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/15/OWASP_Asia_2008_Chenxi.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/7/74/OWASP_Asia_2008_Pukhraj.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/e/e5/OWASP_Asia_2008_TimBass.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]] &lt;br /&gt;
'''[https://www.owasp.org/images/5/5d/AppSecASIA08-BPWAF.pdf Slides]'''&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/0/09/OWASP_Asia_2008_Steven.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Anthony_Lai_(Dark_Floyd)%2C_OWASP_HK_Chapter Anthony], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
== Conference T-Shirt ==&lt;br /&gt;
[[Image:OWAS AppSec Asia Tshirt.png]]&lt;br /&gt;
&lt;br /&gt;
== Conference Venue==&lt;br /&gt;
&lt;br /&gt;
'''Taipei International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' 3rd floor Conference Hall, Xin Yi Road, Section 5, number 1, Taipei, Taiwan R.O.C.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.ticc.com.tw/index_en.aspx Website]'''&lt;br /&gt;
&lt;br /&gt;
== Hotel Information ==&lt;br /&gt;
&lt;br /&gt;
'''San Want Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.172, Sec. 4, ZhongXiao East Road, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel:+886-2-2772-2121 ｜ Fax : +886-2-2721-0302&lt;br /&gt;
&lt;br /&gt;
'''[http://www.sanwant.com/ Website]''' &lt;br /&gt;
&lt;br /&gt;
                                                    &lt;br /&gt;
'''Hope City FuShing Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.275, Sec.1, Fushing S. Rd., Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel : +886-2-2703-9990 ｜ Fax : +886-2-2706-8547&lt;br /&gt;
&lt;br /&gt;
'''[http://www.city-hotel.com.tw/bussiness/b2/b2-en.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
== Taipei City Map - With OWASP Venue and Hotels Marked ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image: Owasp_appsec_asia_2007_tpe_map_new.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Welcome to Taiwan==&lt;br /&gt;
And WELCOME TO TAIWAN! Please check out [http://tw.youtube.com/watch?v=wRc0q9xQEQ4 this video] about interesting places in Taiwan.&lt;br /&gt;
If you need suggestions on how to plan out your trip, please feel free to [mailto:wayne.owasp@gmail.com '''contact us!''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Sponsor_Owasp_Asia.png|840px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== '''Guide Team''' ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.moeaidb.gov.tw https://www.owasp.org/images/8/82/IDB.png]&lt;br /&gt;
[http://www.moea.gov.tw/ https://www.owasp.org/images/a/a4/MOEA.png]&lt;br /&gt;
&lt;br /&gt;
'''Organizers'''&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Taiwan https://www.owasp.org/images/2/2b/OWASP_TW.png]&lt;br /&gt;
[http://www.iii.org.tw/english/ https://www.owasp.org/images/7/75/III.png]&lt;br /&gt;
[http://web.cisanet.org.tw/# https://www.owasp.org/images/6/64/CISA.png]&lt;br /&gt;
&lt;br /&gt;
'''Platinum Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png]&lt;br /&gt;
[http://www.fortify.com/ https://www.owasp.org/images/c/c7/Fortify.png]&lt;br /&gt;
[http://www.imperva.com/ https://www.owasp.org/images/d/da/IMPERVA.png]&lt;br /&gt;
[http://www.mtechpro.com/ https://www.owasp.org/images/b/be/MTECH.png]&lt;br /&gt;
[http://www.mudynamics.com/ https://www.owasp.org/images/1/17/Mu_Dynamics.png]&lt;br /&gt;
[http://www.systex.com.tw/english/index.asp https://www.owasp.org/images/5/5e/SYSTEX.png]&lt;br /&gt;
[http://www.twisc.ntust.edu.tw/ https://www.owasp.org/images/6/6d/TWISC.png]&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[http://www.bluecoat.com/ https://www.owasp.org/images/9/9c/BLUECOAT.png]&lt;br /&gt;
[http://www.eraysecure.com.tw/ https://www.owasp.org/images/e/ea/ERay.png]&lt;br /&gt;
[http://tw.yahoo.com/ https://www.owasp.org/images/a/a9/YahooTw.png]&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[http://www.network-box.com.tw/ https://www.owasp.org/images/0/08/NETWORK_BOX.png]&lt;br /&gt;
&lt;br /&gt;
'''Media Partners'''&lt;br /&gt;
&lt;br /&gt;
[http://www.isecutech.com.tw/main/index.aspx https://www.owasp.org/images/9/97/INFOSECURITY.png]&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45723</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45723"/>
				<updated>2008-11-04T05:03:27Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: /* OWASP AppSec Asia 2008 Conference Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== A Note of Thanks ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank this year's 1200+ attendees who came to show support for OWASP App Sec Asia 2008!! As well as our Speakers, Chapter leaders and Sponsors who helped make this year's OWASP Asia Conference a great success!&lt;br /&gt;
[[Image:OWASP_Asia_08.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NOW AVAILABLE: OWASP AppSec Asia 2008 Session Slides ==&lt;br /&gt;
&lt;br /&gt;
The session slides are now available; please go to SESSION column under [https://www.owasp.org/index.php/OWASP_AppSec_Asia_2008_-_Taiwan#OWASP_AppSec_Asia_2008.2C_Conference_Schedule_.28Oct_27th_-_Oct_28th.29 Conference Schedule] to access to the slides.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 - Taiwan== &lt;br /&gt;
&lt;br /&gt;
Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-10:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/4/41/OWASP_Asia_2008_YMChen.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00-11:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]''' '''[https://www.owasp.org/images/6/6b/OWASP_Asia_2008_Wayne.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 11:50 - 12:40 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''12:40 - 13:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/14/OWASP_Asia_2008_KK.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''13:40 - 15:40 Asia Chapter Leader Meeting''' &lt;br /&gt;
'''Attendee:''' China, Delhi, HK, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters&lt;br /&gt;
&lt;br /&gt;
'''P.S:''' Meeting with go in parallel to the two of the talk sessions and coffee break.&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''13:40 - 14:30''' || style=&amp;quot;width:33%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:30 - 14:50 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:50 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/d/d2/OWASP_Asia_2008_FrankFan.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Yuan Fan, OWASP China Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin (Taiwan Information &amp;amp; Communication Security Technology Center)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:10''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Penetration Test with BackTrack: Art of Exploitation]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/f/f7/OWASP_Asia_2008_Anthony.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Anthony Lai (Dark Floyd), OWASP HK Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/9/9f/OWASP_Asia_2008_RSnake.pdf Slides]''' &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/15/OWASP_Asia_2008_Chenxi.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/7/74/OWASP_Asia_2008_Pukhraj.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/e/e5/OWASP_Asia_2008_TimBass.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]] &lt;br /&gt;
'''[https://www.owasp.org/images/5/5d/AppSecASIA08-BPWAF.pdf Slides]'''&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/0/09/OWASP_Asia_2008_Steven.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Anthony_Lai_(Dark_Floyd)%2C_OWASP_HK_Chapter Anthony], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
== Conference T-Shirt ==&lt;br /&gt;
[[Image:OWAS AppSec Asia Tshirt.png]]&lt;br /&gt;
&lt;br /&gt;
== Conference Venue==&lt;br /&gt;
&lt;br /&gt;
'''Taipei International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' 3rd floor Conference Hall, Xin Yi Road, Section 5, number 1, Taipei, Taiwan R.O.C.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.ticc.com.tw/index_en.aspx Website]'''&lt;br /&gt;
&lt;br /&gt;
== Hotel Information ==&lt;br /&gt;
&lt;br /&gt;
'''San Want Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.172, Sec. 4, ZhongXiao East Road, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel:+886-2-2772-2121 ｜ Fax : +886-2-2721-0302&lt;br /&gt;
&lt;br /&gt;
'''[http://www.sanwant.com/ Website]''' &lt;br /&gt;
&lt;br /&gt;
                                                    &lt;br /&gt;
'''Hope City FuShing Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.275, Sec.1, Fushing S. Rd., Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel : +886-2-2703-9990 ｜ Fax : +886-2-2706-8547&lt;br /&gt;
&lt;br /&gt;
'''[http://www.city-hotel.com.tw/bussiness/b2/b2-en.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
== Taipei City Map - With OWASP Venue and Hotels Marked ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image: Owasp_appsec_asia_2007_tpe_map_new.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Welcome to Taiwan==&lt;br /&gt;
And WELCOME TO TAIWAN! Please check out [http://tw.youtube.com/watch?v=wRc0q9xQEQ4 this video] about interesting places in Taiwan.&lt;br /&gt;
If you need suggestions on how to plan out your trip, please feel free to [mailto:wayne.owasp@gmail.com '''contact us!''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Sponsor_Owasp_Asia.png|840px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== '''Guide Team''' ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.moeaidb.gov.tw https://www.owasp.org/images/8/82/IDB.png]&lt;br /&gt;
[http://www.moea.gov.tw/ https://www.owasp.org/images/a/a4/MOEA.png]&lt;br /&gt;
&lt;br /&gt;
'''Organizers'''&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Taiwan https://www.owasp.org/images/2/2b/OWASP_TW.png]&lt;br /&gt;
[http://www.iii.org.tw/english/ https://www.owasp.org/images/7/75/III.png]&lt;br /&gt;
[http://web.cisanet.org.tw/# https://www.owasp.org/images/6/64/CISA.png]&lt;br /&gt;
&lt;br /&gt;
'''Platinum Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png]&lt;br /&gt;
[http://www.fortify.com/ https://www.owasp.org/images/c/c7/Fortify.png]&lt;br /&gt;
[http://www.imperva.com/ https://www.owasp.org/images/d/da/IMPERVA.png]&lt;br /&gt;
[http://www.mtechpro.com/ https://www.owasp.org/images/b/be/MTECH.png]&lt;br /&gt;
[http://www.mudynamics.com/ https://www.owasp.org/images/1/17/Mu_Dynamics.png]&lt;br /&gt;
[http://www.systex.com.tw/english/index.asp https://www.owasp.org/images/5/5e/SYSTEX.png]&lt;br /&gt;
[http://www.twisc.ntust.edu.tw/ https://www.owasp.org/images/6/6d/TWISC.png]&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[http://www.bluecoat.com/ https://www.owasp.org/images/9/9c/BLUECOAT.png]&lt;br /&gt;
[http://www.eraysecure.com.tw/ https://www.owasp.org/images/e/ea/ERay.png]&lt;br /&gt;
[http://tw.yahoo.com/ https://www.owasp.org/images/a/a9/YahooTw.png]&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[http://www.network-box.com.tw/ https://www.owasp.org/images/0/08/NETWORK_BOX.png]&lt;br /&gt;
&lt;br /&gt;
'''Media Partners'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/images/9/97/INFOSECURITY.png&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45722</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45722"/>
				<updated>2008-11-04T05:02:38Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: /* OWASP AppSec Asia 2008 Conference Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== A Note of Thanks ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank this year's 1200+ attendees who came to show support for OWASP App Sec Asia 2008!! As well as our Speakers, Chapter leaders and Sponsors who helped make this year's OWASP Asia Conference a great success!&lt;br /&gt;
[[Image:OWASP_Asia_08.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NOW AVAILABLE: OWASP AppSec Asia 2008 Session Slides ==&lt;br /&gt;
&lt;br /&gt;
The session slides are now available; please go to SESSION column under [https://www.owasp.org/index.php/OWASP_AppSec_Asia_2008_-_Taiwan#OWASP_AppSec_Asia_2008.2C_Conference_Schedule_.28Oct_27th_-_Oct_28th.29 Conference Schedule] to access to the slides.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 - Taiwan== &lt;br /&gt;
&lt;br /&gt;
Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-10:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/4/41/OWASP_Asia_2008_YMChen.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00-11:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]''' '''[https://www.owasp.org/images/6/6b/OWASP_Asia_2008_Wayne.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 11:50 - 12:40 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''12:40 - 13:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/14/OWASP_Asia_2008_KK.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''13:40 - 15:40 Asia Chapter Leader Meeting''' &lt;br /&gt;
'''Attendee:''' China, Delhi, HK, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters&lt;br /&gt;
&lt;br /&gt;
'''P.S:''' Meeting with go in parallel to the two of the talk sessions and coffee break.&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''13:40 - 14:30''' || style=&amp;quot;width:33%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:30 - 14:50 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:50 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/d/d2/OWASP_Asia_2008_FrankFan.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Yuan Fan, OWASP China Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin (Taiwan Information &amp;amp; Communication Security Technology Center)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:10''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Penetration Test with BackTrack: Art of Exploitation]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/f/f7/OWASP_Asia_2008_Anthony.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Anthony Lai (Dark Floyd), OWASP HK Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/9/9f/OWASP_Asia_2008_RSnake.pdf Slides]''' &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/15/OWASP_Asia_2008_Chenxi.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/7/74/OWASP_Asia_2008_Pukhraj.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/e/e5/OWASP_Asia_2008_TimBass.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]] &lt;br /&gt;
'''[https://www.owasp.org/images/5/5d/AppSecASIA08-BPWAF.pdf Slides]'''&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/0/09/OWASP_Asia_2008_Steven.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Anthony_Lai_(Dark_Floyd)%2C_OWASP_HK_Chapter Anthony], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
== Conference T-Shirt ==&lt;br /&gt;
[[Image:OWAS AppSec Asia Tshirt.png]]&lt;br /&gt;
&lt;br /&gt;
== Conference Venue==&lt;br /&gt;
&lt;br /&gt;
'''Taipei International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' 3rd floor Conference Hall, Xin Yi Road, Section 5, number 1, Taipei, Taiwan R.O.C.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.ticc.com.tw/index_en.aspx Website]'''&lt;br /&gt;
&lt;br /&gt;
== Hotel Information ==&lt;br /&gt;
&lt;br /&gt;
'''San Want Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.172, Sec. 4, ZhongXiao East Road, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel:+886-2-2772-2121 ｜ Fax : +886-2-2721-0302&lt;br /&gt;
&lt;br /&gt;
'''[http://www.sanwant.com/ Website]''' &lt;br /&gt;
&lt;br /&gt;
                                                    &lt;br /&gt;
'''Hope City FuShing Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.275, Sec.1, Fushing S. Rd., Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel : +886-2-2703-9990 ｜ Fax : +886-2-2706-8547&lt;br /&gt;
&lt;br /&gt;
'''[http://www.city-hotel.com.tw/bussiness/b2/b2-en.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
== Taipei City Map - With OWASP Venue and Hotels Marked ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image: Owasp_appsec_asia_2007_tpe_map_new.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Welcome to Taiwan==&lt;br /&gt;
And WELCOME TO TAIWAN! Please check out [http://tw.youtube.com/watch?v=wRc0q9xQEQ4 this video] about interesting places in Taiwan.&lt;br /&gt;
If you need suggestions on how to plan out your trip, please feel free to [mailto:wayne.owasp@gmail.com '''contact us!''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Sponsor_Owasp_Asia.png|840px]]&lt;br /&gt;
&lt;br /&gt;
'''Guide Team'''&lt;br /&gt;
&lt;br /&gt;
[http://www.moeaidb.gov.tw https://www.owasp.org/images/8/82/IDB.png]&lt;br /&gt;
[http://www.moea.gov.tw/ https://www.owasp.org/images/a/a4/MOEA.png]&lt;br /&gt;
&lt;br /&gt;
'''Organizers'''&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Taiwan https://www.owasp.org/images/2/2b/OWASP_TW.png]&lt;br /&gt;
[http://www.iii.org.tw/english/ https://www.owasp.org/images/7/75/III.png]&lt;br /&gt;
[http://web.cisanet.org.tw/# https://www.owasp.org/images/6/64/CISA.png]&lt;br /&gt;
&lt;br /&gt;
'''Platinum Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png]&lt;br /&gt;
[http://www.fortify.com/ https://www.owasp.org/images/c/c7/Fortify.png]&lt;br /&gt;
[http://www.imperva.com/ https://www.owasp.org/images/d/da/IMPERVA.png]&lt;br /&gt;
[http://www.mtechpro.com/ https://www.owasp.org/images/b/be/MTECH.png]&lt;br /&gt;
[http://www.mudynamics.com/ https://www.owasp.org/images/1/17/Mu_Dynamics.png]&lt;br /&gt;
[http://www.systex.com.tw/english/index.asp https://www.owasp.org/images/5/5e/SYSTEX.png]&lt;br /&gt;
[http://www.twisc.ntust.edu.tw/ https://www.owasp.org/images/6/6d/TWISC.png]&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[http://www.bluecoat.com/ https://www.owasp.org/images/9/9c/BLUECOAT.png]&lt;br /&gt;
[http://www.eraysecure.com.tw/ https://www.owasp.org/images/e/ea/ERay.png]&lt;br /&gt;
[http://tw.yahoo.com/ https://www.owasp.org/images/a/a9/YahooTw.png]&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[http://www.network-box.com.tw/ https://www.owasp.org/images/0/08/NETWORK_BOX.png]&lt;br /&gt;
&lt;br /&gt;
'''Media Partners'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/images/9/97/INFOSECURITY.png&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45721</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45721"/>
				<updated>2008-11-04T05:01:42Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: /* OWASP AppSec Asia 2008 Conference Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== A Note of Thanks ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank this year's 1200+ attendees who came to show support for OWASP App Sec Asia 2008!! As well as our Speakers, Chapter leaders and Sponsors who helped make this year's OWASP Asia Conference a great success!&lt;br /&gt;
[[Image:OWASP_Asia_08.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NOW AVAILABLE: OWASP AppSec Asia 2008 Session Slides ==&lt;br /&gt;
&lt;br /&gt;
The session slides are now available; please go to SESSION column under [https://www.owasp.org/index.php/OWASP_AppSec_Asia_2008_-_Taiwan#OWASP_AppSec_Asia_2008.2C_Conference_Schedule_.28Oct_27th_-_Oct_28th.29 Conference Schedule] to access to the slides.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 - Taiwan== &lt;br /&gt;
&lt;br /&gt;
Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-10:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/4/41/OWASP_Asia_2008_YMChen.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00-11:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]''' '''[https://www.owasp.org/images/6/6b/OWASP_Asia_2008_Wayne.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 11:50 - 12:40 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''12:40 - 13:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/14/OWASP_Asia_2008_KK.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''13:40 - 15:40 Asia Chapter Leader Meeting''' &lt;br /&gt;
'''Attendee:''' China, Delhi, HK, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters&lt;br /&gt;
&lt;br /&gt;
'''P.S:''' Meeting with go in parallel to the two of the talk sessions and coffee break.&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''13:40 - 14:30''' || style=&amp;quot;width:33%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:30 - 14:50 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:50 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/d/d2/OWASP_Asia_2008_FrankFan.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Yuan Fan, OWASP China Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin (Taiwan Information &amp;amp; Communication Security Technology Center)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:10''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Penetration Test with BackTrack: Art of Exploitation]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/f/f7/OWASP_Asia_2008_Anthony.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Anthony Lai (Dark Floyd), OWASP HK Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/9/9f/OWASP_Asia_2008_RSnake.pdf Slides]''' &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/15/OWASP_Asia_2008_Chenxi.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/7/74/OWASP_Asia_2008_Pukhraj.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/e/e5/OWASP_Asia_2008_TimBass.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]] &lt;br /&gt;
'''[https://www.owasp.org/images/5/5d/AppSecASIA08-BPWAF.pdf Slides]'''&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/0/09/OWASP_Asia_2008_Steven.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Anthony_Lai_(Dark_Floyd)%2C_OWASP_HK_Chapter Anthony], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
== Conference T-Shirt ==&lt;br /&gt;
[[Image:OWAS AppSec Asia Tshirt.png]]&lt;br /&gt;
&lt;br /&gt;
== Conference Venue==&lt;br /&gt;
&lt;br /&gt;
'''Taipei International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' 3rd floor Conference Hall, Xin Yi Road, Section 5, number 1, Taipei, Taiwan R.O.C.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.ticc.com.tw/index_en.aspx Website]'''&lt;br /&gt;
&lt;br /&gt;
== Hotel Information ==&lt;br /&gt;
&lt;br /&gt;
'''San Want Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.172, Sec. 4, ZhongXiao East Road, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel:+886-2-2772-2121 ｜ Fax : +886-2-2721-0302&lt;br /&gt;
&lt;br /&gt;
'''[http://www.sanwant.com/ Website]''' &lt;br /&gt;
&lt;br /&gt;
                                                    &lt;br /&gt;
'''Hope City FuShing Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.275, Sec.1, Fushing S. Rd., Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel : +886-2-2703-9990 ｜ Fax : +886-2-2706-8547&lt;br /&gt;
&lt;br /&gt;
'''[http://www.city-hotel.com.tw/bussiness/b2/b2-en.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
== Taipei City Map - With OWASP Venue and Hotels Marked ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image: Owasp_appsec_asia_2007_tpe_map_new.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Welcome to Taiwan==&lt;br /&gt;
And WELCOME TO TAIWAN! Please check out [http://tw.youtube.com/watch?v=wRc0q9xQEQ4 this video] about interesting places in Taiwan.&lt;br /&gt;
If you need suggestions on how to plan out your trip, please feel free to [mailto:wayne.owasp@gmail.com '''contact us!''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Sponsor_Owasp_Asia.png|840px]]&lt;br /&gt;
&lt;br /&gt;
'''Guide Team'''&lt;br /&gt;
&lt;br /&gt;
[http://www.moeaidb.gov.tw https://www.owasp.org/images/8/82/IDB.png]&lt;br /&gt;
[http://www.moea.gov.tw/ https://www.owasp.org/images/a/a4/MOEA.png]&lt;br /&gt;
&lt;br /&gt;
'''Organizers'''&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Taiwan https://www.owasp.org/images/2/2b/OWASP_TW.png]&lt;br /&gt;
[http://www.iii.org.tw/english/ https://www.owasp.org/images/7/75/III.png]&lt;br /&gt;
[http://web.cisanet.org.tw/# https://www.owasp.org/images/6/64/CISA.png]&lt;br /&gt;
&lt;br /&gt;
'''Platinum Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png]&lt;br /&gt;
[http://www.fortify.com/ https://www.owasp.org/images/c/c7/Fortify.png]&lt;br /&gt;
[http://www.imperva.com/ https://www.owasp.org/images/d/da/IMPERVA.png]&lt;br /&gt;
[http://www.mtechpro.com/ https://www.owasp.org/images/b/be/MTECH.png]&lt;br /&gt;
[http://www.mudynamics.com/ https://www.owasp.org/images/1/17/Mu_Dynamics.png]&lt;br /&gt;
[http://www.systex.com.tw/english/index.asp https://www.owasp.org/images/5/5e/SYSTEX.png]&lt;br /&gt;
[http://www.twisc.ntust.edu.tw/ https://www.owasp.org/images/6/6d/TWISC.png]&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[http://www.bluecoat.com/ https://www.owasp.org/images/9/9c/BLUECOAT.png]&lt;br /&gt;
[http://www.eraysecure.com.tw/ https://www.owasp.org/images/e/ea/ERay.png]&lt;br /&gt;
[http://tw.yahoo.com/ https://www.owasp.org/images/a/a9/YahooTw.png]&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[http://www.network-box.com.tw/ https://www.owasp.org/images/0/08/NETWORK_BOX.png]&lt;br /&gt;
&lt;br /&gt;
'''Media Partners'''&lt;br /&gt;
https://www.owasp.org/images/9/97/INFOSECURITY.png&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:INFOSECURITY.png&amp;diff=45720</id>
		<title>File:INFOSECURITY.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:INFOSECURITY.png&amp;diff=45720"/>
				<updated>2008-11-04T05:01:27Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45719</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45719"/>
				<updated>2008-11-04T04:59:32Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: /* OWASP AppSec Asia 2008 Conference Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== A Note of Thanks ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank this year's 1200+ attendees who came to show support for OWASP App Sec Asia 2008!! As well as our Speakers, Chapter leaders and Sponsors who helped make this year's OWASP Asia Conference a great success!&lt;br /&gt;
[[Image:OWASP_Asia_08.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NOW AVAILABLE: OWASP AppSec Asia 2008 Session Slides ==&lt;br /&gt;
&lt;br /&gt;
The session slides are now available; please go to SESSION column under [https://www.owasp.org/index.php/OWASP_AppSec_Asia_2008_-_Taiwan#OWASP_AppSec_Asia_2008.2C_Conference_Schedule_.28Oct_27th_-_Oct_28th.29 Conference Schedule] to access to the slides.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 - Taiwan== &lt;br /&gt;
&lt;br /&gt;
Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-10:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/4/41/OWASP_Asia_2008_YMChen.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00-11:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]''' '''[https://www.owasp.org/images/6/6b/OWASP_Asia_2008_Wayne.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 11:50 - 12:40 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''12:40 - 13:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/14/OWASP_Asia_2008_KK.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''13:40 - 15:40 Asia Chapter Leader Meeting''' &lt;br /&gt;
'''Attendee:''' China, Delhi, HK, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters&lt;br /&gt;
&lt;br /&gt;
'''P.S:''' Meeting with go in parallel to the two of the talk sessions and coffee break.&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''13:40 - 14:30''' || style=&amp;quot;width:33%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:30 - 14:50 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:50 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/d/d2/OWASP_Asia_2008_FrankFan.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Yuan Fan, OWASP China Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin (Taiwan Information &amp;amp; Communication Security Technology Center)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:10''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Penetration Test with BackTrack: Art of Exploitation]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/f/f7/OWASP_Asia_2008_Anthony.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Anthony Lai (Dark Floyd), OWASP HK Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/9/9f/OWASP_Asia_2008_RSnake.pdf Slides]''' &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/15/OWASP_Asia_2008_Chenxi.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/7/74/OWASP_Asia_2008_Pukhraj.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/e/e5/OWASP_Asia_2008_TimBass.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]] &lt;br /&gt;
'''[https://www.owasp.org/images/5/5d/AppSecASIA08-BPWAF.pdf Slides]'''&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/0/09/OWASP_Asia_2008_Steven.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Anthony_Lai_(Dark_Floyd)%2C_OWASP_HK_Chapter Anthony], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
== Conference T-Shirt ==&lt;br /&gt;
[[Image:OWAS AppSec Asia Tshirt.png]]&lt;br /&gt;
&lt;br /&gt;
== Conference Venue==&lt;br /&gt;
&lt;br /&gt;
'''Taipei International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' 3rd floor Conference Hall, Xin Yi Road, Section 5, number 1, Taipei, Taiwan R.O.C.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.ticc.com.tw/index_en.aspx Website]'''&lt;br /&gt;
&lt;br /&gt;
== Hotel Information ==&lt;br /&gt;
&lt;br /&gt;
'''San Want Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.172, Sec. 4, ZhongXiao East Road, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel:+886-2-2772-2121 ｜ Fax : +886-2-2721-0302&lt;br /&gt;
&lt;br /&gt;
'''[http://www.sanwant.com/ Website]''' &lt;br /&gt;
&lt;br /&gt;
                                                    &lt;br /&gt;
'''Hope City FuShing Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.275, Sec.1, Fushing S. Rd., Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel : +886-2-2703-9990 ｜ Fax : +886-2-2706-8547&lt;br /&gt;
&lt;br /&gt;
'''[http://www.city-hotel.com.tw/bussiness/b2/b2-en.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
== Taipei City Map - With OWASP Venue and Hotels Marked ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image: Owasp_appsec_asia_2007_tpe_map_new.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Welcome to Taiwan==&lt;br /&gt;
And WELCOME TO TAIWAN! Please check out [http://tw.youtube.com/watch?v=wRc0q9xQEQ4 this video] about interesting places in Taiwan.&lt;br /&gt;
If you need suggestions on how to plan out your trip, please feel free to [mailto:wayne.owasp@gmail.com '''contact us!''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Sponsor_Owasp_Asia.png|840px]]&lt;br /&gt;
&lt;br /&gt;
'''Guide Team'''&lt;br /&gt;
&lt;br /&gt;
[http://www.moeaidb.gov.tw https://www.owasp.org/images/8/82/IDB.png]&lt;br /&gt;
[http://www.moea.gov.tw/ https://www.owasp.org/images/a/a4/MOEA.png]&lt;br /&gt;
&lt;br /&gt;
'''Organizers'''&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Taiwan https://www.owasp.org/images/2/2b/OWASP_TW.png]&lt;br /&gt;
[http://www.iii.org.tw/english/ https://www.owasp.org/images/7/75/III.png]&lt;br /&gt;
[http://web.cisanet.org.tw/# https://www.owasp.org/images/6/64/CISA.png]&lt;br /&gt;
&lt;br /&gt;
'''Platinum Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png]&lt;br /&gt;
[http://www.fortify.com/ https://www.owasp.org/images/c/c7/Fortify.png]&lt;br /&gt;
[http://www.imperva.com/ https://www.owasp.org/images/d/da/IMPERVA.png]&lt;br /&gt;
[http://www.mtechpro.com/ https://www.owasp.org/images/b/be/MTECH.png]&lt;br /&gt;
[http://www.mudynamics.com/ https://www.owasp.org/images/1/17/Mu_Dynamics.png]&lt;br /&gt;
[http://www.systex.com.tw/english/index.asp https://www.owasp.org/images/5/5e/SYSTEX.png]&lt;br /&gt;
[http://www.twisc.ntust.edu.tw/ https://www.owasp.org/images/6/6d/TWISC.png]&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[http://www.bluecoat.com/ https://www.owasp.org/images/9/9c/BLUECOAT.png]&lt;br /&gt;
[http://www.eraysecure.com.tw/ https://www.owasp.org/images/e/ea/ERay.png]&lt;br /&gt;
[http://tw.yahoo.com/ https://www.owasp.org/images/a/a9/YahooTw.png]&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[http://www.network-box.com.tw/ https://www.owasp.org/images/0/08/NETWORK_BOX.png]&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45718</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45718"/>
				<updated>2008-11-04T04:58:45Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: /* OWASP AppSec Asia 2008 Conference Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== A Note of Thanks ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank this year's 1200+ attendees who came to show support for OWASP App Sec Asia 2008!! As well as our Speakers, Chapter leaders and Sponsors who helped make this year's OWASP Asia Conference a great success!&lt;br /&gt;
[[Image:OWASP_Asia_08.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NOW AVAILABLE: OWASP AppSec Asia 2008 Session Slides ==&lt;br /&gt;
&lt;br /&gt;
The session slides are now available; please go to SESSION column under [https://www.owasp.org/index.php/OWASP_AppSec_Asia_2008_-_Taiwan#OWASP_AppSec_Asia_2008.2C_Conference_Schedule_.28Oct_27th_-_Oct_28th.29 Conference Schedule] to access to the slides.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 - Taiwan== &lt;br /&gt;
&lt;br /&gt;
Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-10:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/4/41/OWASP_Asia_2008_YMChen.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00-11:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]''' '''[https://www.owasp.org/images/6/6b/OWASP_Asia_2008_Wayne.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 11:50 - 12:40 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''12:40 - 13:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/14/OWASP_Asia_2008_KK.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''13:40 - 15:40 Asia Chapter Leader Meeting''' &lt;br /&gt;
'''Attendee:''' China, Delhi, HK, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters&lt;br /&gt;
&lt;br /&gt;
'''P.S:''' Meeting with go in parallel to the two of the talk sessions and coffee break.&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''13:40 - 14:30''' || style=&amp;quot;width:33%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:30 - 14:50 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:50 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/d/d2/OWASP_Asia_2008_FrankFan.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Yuan Fan, OWASP China Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin (Taiwan Information &amp;amp; Communication Security Technology Center)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:10''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Penetration Test with BackTrack: Art of Exploitation]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/f/f7/OWASP_Asia_2008_Anthony.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Anthony Lai (Dark Floyd), OWASP HK Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/9/9f/OWASP_Asia_2008_RSnake.pdf Slides]''' &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/15/OWASP_Asia_2008_Chenxi.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/7/74/OWASP_Asia_2008_Pukhraj.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/e/e5/OWASP_Asia_2008_TimBass.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]] &lt;br /&gt;
'''[https://www.owasp.org/images/5/5d/AppSecASIA08-BPWAF.pdf Slides]'''&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/0/09/OWASP_Asia_2008_Steven.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Anthony_Lai_(Dark_Floyd)%2C_OWASP_HK_Chapter Anthony], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
== Conference T-Shirt ==&lt;br /&gt;
[[Image:OWAS AppSec Asia Tshirt.png]]&lt;br /&gt;
&lt;br /&gt;
== Conference Venue==&lt;br /&gt;
&lt;br /&gt;
'''Taipei International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' 3rd floor Conference Hall, Xin Yi Road, Section 5, number 1, Taipei, Taiwan R.O.C.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.ticc.com.tw/index_en.aspx Website]'''&lt;br /&gt;
&lt;br /&gt;
== Hotel Information ==&lt;br /&gt;
&lt;br /&gt;
'''San Want Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.172, Sec. 4, ZhongXiao East Road, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel:+886-2-2772-2121 ｜ Fax : +886-2-2721-0302&lt;br /&gt;
&lt;br /&gt;
'''[http://www.sanwant.com/ Website]''' &lt;br /&gt;
&lt;br /&gt;
                                                    &lt;br /&gt;
'''Hope City FuShing Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.275, Sec.1, Fushing S. Rd., Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel : +886-2-2703-9990 ｜ Fax : +886-2-2706-8547&lt;br /&gt;
&lt;br /&gt;
'''[http://www.city-hotel.com.tw/bussiness/b2/b2-en.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
== Taipei City Map - With OWASP Venue and Hotels Marked ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image: Owasp_appsec_asia_2007_tpe_map_new.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Welcome to Taiwan==&lt;br /&gt;
And WELCOME TO TAIWAN! Please check out [http://tw.youtube.com/watch?v=wRc0q9xQEQ4 this video] about interesting places in Taiwan.&lt;br /&gt;
If you need suggestions on how to plan out your trip, please feel free to [mailto:wayne.owasp@gmail.com '''contact us!''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Sponsor_Owasp_Asia.png|840px]]&lt;br /&gt;
&lt;br /&gt;
'''Guide Team'''&lt;br /&gt;
&lt;br /&gt;
[http://www.moeaidb.gov.tw https://www.owasp.org/images/8/82/IDB.png]&lt;br /&gt;
[http://www.moea.gov.tw/ https://www.owasp.org/images/a/a4/MOEA.png]&lt;br /&gt;
&lt;br /&gt;
'''Organizers'''&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Taiwan https://www.owasp.org/images/2/2b/OWASP_TW.png]&lt;br /&gt;
[http://www.iii.org.tw/english/ https://www.owasp.org/images/7/75/III.png]&lt;br /&gt;
[http://web.cisanet.org.tw/# https://www.owasp.org/images/6/64/CISA.png]&lt;br /&gt;
&lt;br /&gt;
'''Platinum Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png]&lt;br /&gt;
[http://www.fortify.com/ https://www.owasp.org/images/c/c7/Fortify.png]&lt;br /&gt;
[http://www.imperva.com/ https://www.owasp.org/images/d/da/IMPERVA.png]&lt;br /&gt;
[http://www.mtechpro.com/ https://www.owasp.org/images/b/be/MTECH.png]&lt;br /&gt;
[http://www.mudynamics.com/ https://www.owasp.org/images/1/17/Mu_Dynamics.png]&lt;br /&gt;
[http://www.systex.com.tw/english/index.asp https://www.owasp.org/images/5/5e/SYSTEX.png]&lt;br /&gt;
[http://www.twisc.ntust.edu.tw/ https://www.owasp.org/images/6/6d/TWISC.png]&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[http://www.bluecoat.com/ https://www.owasp.org/images/9/9c/BLUECOAT.png]&lt;br /&gt;
[http://www.eraysecure.com.tw/ https://www.owasp.org/images/e/ea/ERay.png]&lt;br /&gt;
[http://tw.yahoo.com/ https://www.owasp.org/images/a/a9/YahooTw.png]&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[http://www.network-box.com.tw/01.asp https://www.owasp.org/images/0/08/NETWORK_BOX.png]&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:NETWORK_BOX.png&amp;diff=45717</id>
		<title>File:NETWORK BOX.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:NETWORK_BOX.png&amp;diff=45717"/>
				<updated>2008-11-04T04:55:20Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45716</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45716"/>
				<updated>2008-11-04T04:54:30Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: /* OWASP AppSec Asia 2008 Conference Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== A Note of Thanks ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank this year's 1200+ attendees who came to show support for OWASP App Sec Asia 2008!! As well as our Speakers, Chapter leaders and Sponsors who helped make this year's OWASP Asia Conference a great success!&lt;br /&gt;
[[Image:OWASP_Asia_08.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NOW AVAILABLE: OWASP AppSec Asia 2008 Session Slides ==&lt;br /&gt;
&lt;br /&gt;
The session slides are now available; please go to SESSION column under [https://www.owasp.org/index.php/OWASP_AppSec_Asia_2008_-_Taiwan#OWASP_AppSec_Asia_2008.2C_Conference_Schedule_.28Oct_27th_-_Oct_28th.29 Conference Schedule] to access to the slides.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 - Taiwan== &lt;br /&gt;
&lt;br /&gt;
Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-10:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/4/41/OWASP_Asia_2008_YMChen.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00-11:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]''' '''[https://www.owasp.org/images/6/6b/OWASP_Asia_2008_Wayne.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 11:50 - 12:40 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''12:40 - 13:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/14/OWASP_Asia_2008_KK.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''13:40 - 15:40 Asia Chapter Leader Meeting''' &lt;br /&gt;
'''Attendee:''' China, Delhi, HK, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters&lt;br /&gt;
&lt;br /&gt;
'''P.S:''' Meeting with go in parallel to the two of the talk sessions and coffee break.&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''13:40 - 14:30''' || style=&amp;quot;width:33%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:30 - 14:50 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:50 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/d/d2/OWASP_Asia_2008_FrankFan.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Yuan Fan, OWASP China Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin (Taiwan Information &amp;amp; Communication Security Technology Center)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:10''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Penetration Test with BackTrack: Art of Exploitation]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/f/f7/OWASP_Asia_2008_Anthony.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Anthony Lai (Dark Floyd), OWASP HK Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/9/9f/OWASP_Asia_2008_RSnake.pdf Slides]''' &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/15/OWASP_Asia_2008_Chenxi.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/7/74/OWASP_Asia_2008_Pukhraj.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/e/e5/OWASP_Asia_2008_TimBass.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]] &lt;br /&gt;
'''[https://www.owasp.org/images/5/5d/AppSecASIA08-BPWAF.pdf Slides]'''&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/0/09/OWASP_Asia_2008_Steven.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Anthony_Lai_(Dark_Floyd)%2C_OWASP_HK_Chapter Anthony], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
== Conference T-Shirt ==&lt;br /&gt;
[[Image:OWAS AppSec Asia Tshirt.png]]&lt;br /&gt;
&lt;br /&gt;
== Conference Venue==&lt;br /&gt;
&lt;br /&gt;
'''Taipei International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' 3rd floor Conference Hall, Xin Yi Road, Section 5, number 1, Taipei, Taiwan R.O.C.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.ticc.com.tw/index_en.aspx Website]'''&lt;br /&gt;
&lt;br /&gt;
== Hotel Information ==&lt;br /&gt;
&lt;br /&gt;
'''San Want Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.172, Sec. 4, ZhongXiao East Road, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel:+886-2-2772-2121 ｜ Fax : +886-2-2721-0302&lt;br /&gt;
&lt;br /&gt;
'''[http://www.sanwant.com/ Website]''' &lt;br /&gt;
&lt;br /&gt;
                                                    &lt;br /&gt;
'''Hope City FuShing Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.275, Sec.1, Fushing S. Rd., Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel : +886-2-2703-9990 ｜ Fax : +886-2-2706-8547&lt;br /&gt;
&lt;br /&gt;
'''[http://www.city-hotel.com.tw/bussiness/b2/b2-en.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
== Taipei City Map - With OWASP Venue and Hotels Marked ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image: Owasp_appsec_asia_2007_tpe_map_new.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Welcome to Taiwan==&lt;br /&gt;
And WELCOME TO TAIWAN! Please check out [http://tw.youtube.com/watch?v=wRc0q9xQEQ4 this video] about interesting places in Taiwan.&lt;br /&gt;
If you need suggestions on how to plan out your trip, please feel free to [mailto:wayne.owasp@gmail.com '''contact us!''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Sponsor_Owasp_Asia.png|840px]]&lt;br /&gt;
&lt;br /&gt;
'''Guide Team'''&lt;br /&gt;
&lt;br /&gt;
[http://www.moeaidb.gov.tw https://www.owasp.org/images/8/82/IDB.png]&lt;br /&gt;
[http://www.moea.gov.tw/ https://www.owasp.org/images/a/a4/MOEA.png]&lt;br /&gt;
&lt;br /&gt;
'''Organizers'''&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Taiwan https://www.owasp.org/images/2/2b/OWASP_TW.png]&lt;br /&gt;
[http://www.iii.org.tw/english/ https://www.owasp.org/images/7/75/III.png]&lt;br /&gt;
[http://web.cisanet.org.tw/# https://www.owasp.org/images/6/64/CISA.png]&lt;br /&gt;
&lt;br /&gt;
'''Platinum Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png]&lt;br /&gt;
[http://www.fortify.com/ https://www.owasp.org/images/c/c7/Fortify.png]&lt;br /&gt;
[http://www.imperva.com/ https://www.owasp.org/images/d/da/IMPERVA.png]&lt;br /&gt;
[http://www.mtechpro.com/ https://www.owasp.org/images/b/be/MTECH.png]&lt;br /&gt;
[http://www.mudynamics.com/ https://www.owasp.org/images/1/17/Mu_Dynamics.png]&lt;br /&gt;
[http://www.systex.com.tw/english/index.asp https://www.owasp.org/images/5/5e/SYSTEX.png]&lt;br /&gt;
[http://www.twisc.ntust.edu.tw/ https://www.owasp.org/images/6/6d/TWISC.png]&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[http://www.bluecoat.com/ https://www.owasp.org/images/9/9c/BLUECOAT.png]&lt;br /&gt;
[http://www.eraysecure.com.tw/ https://www.owasp.org/images/e/ea/ERay.png]&lt;br /&gt;
[http://tw.yahoo.com/ https://www.owasp.org/images/a/a9/YahooTw.png]&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:YahooTw.png&amp;diff=45715</id>
		<title>File:YahooTw.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:YahooTw.png&amp;diff=45715"/>
				<updated>2008-11-04T04:53:12Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:ERay.png&amp;diff=45714</id>
		<title>File:ERay.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:ERay.png&amp;diff=45714"/>
				<updated>2008-11-04T04:50:16Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:BLUECOAT.png&amp;diff=45713</id>
		<title>File:BLUECOAT.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:BLUECOAT.png&amp;diff=45713"/>
				<updated>2008-11-04T04:48:43Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45712</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45712"/>
				<updated>2008-11-04T04:47:02Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: /* OWASP AppSec Asia 2008 Conference Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== A Note of Thanks ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank this year's 1200+ attendees who came to show support for OWASP App Sec Asia 2008!! As well as our Speakers, Chapter leaders and Sponsors who helped make this year's OWASP Asia Conference a great success!&lt;br /&gt;
[[Image:OWASP_Asia_08.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NOW AVAILABLE: OWASP AppSec Asia 2008 Session Slides ==&lt;br /&gt;
&lt;br /&gt;
The session slides are now available; please go to SESSION column under [https://www.owasp.org/index.php/OWASP_AppSec_Asia_2008_-_Taiwan#OWASP_AppSec_Asia_2008.2C_Conference_Schedule_.28Oct_27th_-_Oct_28th.29 Conference Schedule] to access to the slides.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 - Taiwan== &lt;br /&gt;
&lt;br /&gt;
Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-10:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/4/41/OWASP_Asia_2008_YMChen.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00-11:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]''' '''[https://www.owasp.org/images/6/6b/OWASP_Asia_2008_Wayne.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 11:50 - 12:40 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''12:40 - 13:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/14/OWASP_Asia_2008_KK.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''13:40 - 15:40 Asia Chapter Leader Meeting''' &lt;br /&gt;
'''Attendee:''' China, Delhi, HK, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters&lt;br /&gt;
&lt;br /&gt;
'''P.S:''' Meeting with go in parallel to the two of the talk sessions and coffee break.&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''13:40 - 14:30''' || style=&amp;quot;width:33%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:30 - 14:50 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:50 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/d/d2/OWASP_Asia_2008_FrankFan.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Yuan Fan, OWASP China Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin (Taiwan Information &amp;amp; Communication Security Technology Center)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:10''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Penetration Test with BackTrack: Art of Exploitation]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/f/f7/OWASP_Asia_2008_Anthony.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Anthony Lai (Dark Floyd), OWASP HK Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/9/9f/OWASP_Asia_2008_RSnake.pdf Slides]''' &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/15/OWASP_Asia_2008_Chenxi.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/7/74/OWASP_Asia_2008_Pukhraj.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/e/e5/OWASP_Asia_2008_TimBass.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]] &lt;br /&gt;
'''[https://www.owasp.org/images/5/5d/AppSecASIA08-BPWAF.pdf Slides]'''&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/0/09/OWASP_Asia_2008_Steven.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Anthony_Lai_(Dark_Floyd)%2C_OWASP_HK_Chapter Anthony], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
== Conference T-Shirt ==&lt;br /&gt;
[[Image:OWAS AppSec Asia Tshirt.png]]&lt;br /&gt;
&lt;br /&gt;
== Conference Venue==&lt;br /&gt;
&lt;br /&gt;
'''Taipei International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' 3rd floor Conference Hall, Xin Yi Road, Section 5, number 1, Taipei, Taiwan R.O.C.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.ticc.com.tw/index_en.aspx Website]'''&lt;br /&gt;
&lt;br /&gt;
== Hotel Information ==&lt;br /&gt;
&lt;br /&gt;
'''San Want Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.172, Sec. 4, ZhongXiao East Road, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel:+886-2-2772-2121 ｜ Fax : +886-2-2721-0302&lt;br /&gt;
&lt;br /&gt;
'''[http://www.sanwant.com/ Website]''' &lt;br /&gt;
&lt;br /&gt;
                                                    &lt;br /&gt;
'''Hope City FuShing Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.275, Sec.1, Fushing S. Rd., Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel : +886-2-2703-9990 ｜ Fax : +886-2-2706-8547&lt;br /&gt;
&lt;br /&gt;
'''[http://www.city-hotel.com.tw/bussiness/b2/b2-en.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
== Taipei City Map - With OWASP Venue and Hotels Marked ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image: Owasp_appsec_asia_2007_tpe_map_new.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Welcome to Taiwan==&lt;br /&gt;
And WELCOME TO TAIWAN! Please check out [http://tw.youtube.com/watch?v=wRc0q9xQEQ4 this video] about interesting places in Taiwan.&lt;br /&gt;
If you need suggestions on how to plan out your trip, please feel free to [mailto:wayne.owasp@gmail.com '''contact us!''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Sponsor_Owasp_Asia.png|840px]]&lt;br /&gt;
&lt;br /&gt;
'''Guide Team'''&lt;br /&gt;
&lt;br /&gt;
[http://www.moeaidb.gov.tw https://www.owasp.org/images/8/82/IDB.png]&lt;br /&gt;
[http://www.moea.gov.tw/ https://www.owasp.org/images/a/a4/MOEA.png]&lt;br /&gt;
&lt;br /&gt;
'''Organizers'''&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Taiwan https://www.owasp.org/images/2/2b/OWASP_TW.png]&lt;br /&gt;
[http://www.iii.org.tw/english/ https://www.owasp.org/images/7/75/III.png]&lt;br /&gt;
[http://web.cisanet.org.tw/# https://www.owasp.org/images/6/64/CISA.png]&lt;br /&gt;
&lt;br /&gt;
'''Platinum Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png]&lt;br /&gt;
[http://www.fortify.com/ https://www.owasp.org/images/c/c7/Fortify.png]&lt;br /&gt;
[http://www.imperva.com/ https://www.owasp.org/images/d/da/IMPERVA.png]&lt;br /&gt;
[http://www.mtechpro.com/ https://www.owasp.org/images/b/be/MTECH.png]&lt;br /&gt;
[http://www.mudynamics.com/ https://www.owasp.org/images/1/17/Mu_Dynamics.png]&lt;br /&gt;
[http://www.systex.com.tw/english/index.asp https://www.owasp.org/images/5/5e/SYSTEX.png]&lt;br /&gt;
[http://www.twisc.ntust.edu.tw/ https://www.owasp.org/images/6/6d/TWISC.png]&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:TWISC.png&amp;diff=45711</id>
		<title>File:TWISC.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:TWISC.png&amp;diff=45711"/>
				<updated>2008-11-04T04:46:04Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45710</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45710"/>
				<updated>2008-11-04T04:45:24Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: /* OWASP AppSec Asia 2008 Conference Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== A Note of Thanks ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank this year's 1200+ attendees who came to show support for OWASP App Sec Asia 2008!! As well as our Speakers, Chapter leaders and Sponsors who helped make this year's OWASP Asia Conference a great success!&lt;br /&gt;
[[Image:OWASP_Asia_08.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NOW AVAILABLE: OWASP AppSec Asia 2008 Session Slides ==&lt;br /&gt;
&lt;br /&gt;
The session slides are now available; please go to SESSION column under [https://www.owasp.org/index.php/OWASP_AppSec_Asia_2008_-_Taiwan#OWASP_AppSec_Asia_2008.2C_Conference_Schedule_.28Oct_27th_-_Oct_28th.29 Conference Schedule] to access to the slides.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 - Taiwan== &lt;br /&gt;
&lt;br /&gt;
Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-10:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/4/41/OWASP_Asia_2008_YMChen.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00-11:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]''' '''[https://www.owasp.org/images/6/6b/OWASP_Asia_2008_Wayne.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 11:50 - 12:40 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''12:40 - 13:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/14/OWASP_Asia_2008_KK.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''13:40 - 15:40 Asia Chapter Leader Meeting''' &lt;br /&gt;
'''Attendee:''' China, Delhi, HK, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters&lt;br /&gt;
&lt;br /&gt;
'''P.S:''' Meeting with go in parallel to the two of the talk sessions and coffee break.&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''13:40 - 14:30''' || style=&amp;quot;width:33%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:30 - 14:50 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:50 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/d/d2/OWASP_Asia_2008_FrankFan.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Yuan Fan, OWASP China Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin (Taiwan Information &amp;amp; Communication Security Technology Center)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:10''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Penetration Test with BackTrack: Art of Exploitation]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/f/f7/OWASP_Asia_2008_Anthony.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Anthony Lai (Dark Floyd), OWASP HK Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/9/9f/OWASP_Asia_2008_RSnake.pdf Slides]''' &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/15/OWASP_Asia_2008_Chenxi.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/7/74/OWASP_Asia_2008_Pukhraj.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/e/e5/OWASP_Asia_2008_TimBass.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]] &lt;br /&gt;
'''[https://www.owasp.org/images/5/5d/AppSecASIA08-BPWAF.pdf Slides]'''&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/0/09/OWASP_Asia_2008_Steven.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Anthony_Lai_(Dark_Floyd)%2C_OWASP_HK_Chapter Anthony], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
== Conference T-Shirt ==&lt;br /&gt;
[[Image:OWAS AppSec Asia Tshirt.png]]&lt;br /&gt;
&lt;br /&gt;
== Conference Venue==&lt;br /&gt;
&lt;br /&gt;
'''Taipei International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' 3rd floor Conference Hall, Xin Yi Road, Section 5, number 1, Taipei, Taiwan R.O.C.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.ticc.com.tw/index_en.aspx Website]'''&lt;br /&gt;
&lt;br /&gt;
== Hotel Information ==&lt;br /&gt;
&lt;br /&gt;
'''San Want Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.172, Sec. 4, ZhongXiao East Road, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel:+886-2-2772-2121 ｜ Fax : +886-2-2721-0302&lt;br /&gt;
&lt;br /&gt;
'''[http://www.sanwant.com/ Website]''' &lt;br /&gt;
&lt;br /&gt;
                                                    &lt;br /&gt;
'''Hope City FuShing Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.275, Sec.1, Fushing S. Rd., Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel : +886-2-2703-9990 ｜ Fax : +886-2-2706-8547&lt;br /&gt;
&lt;br /&gt;
'''[http://www.city-hotel.com.tw/bussiness/b2/b2-en.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
== Taipei City Map - With OWASP Venue and Hotels Marked ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image: Owasp_appsec_asia_2007_tpe_map_new.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Welcome to Taiwan==&lt;br /&gt;
And WELCOME TO TAIWAN! Please check out [http://tw.youtube.com/watch?v=wRc0q9xQEQ4 this video] about interesting places in Taiwan.&lt;br /&gt;
If you need suggestions on how to plan out your trip, please feel free to [mailto:wayne.owasp@gmail.com '''contact us!''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Sponsor_Owasp_Asia.png|840px]]&lt;br /&gt;
&lt;br /&gt;
'''Guide Team'''&lt;br /&gt;
&lt;br /&gt;
[http://www.moeaidb.gov.tw https://www.owasp.org/images/8/82/IDB.png]&lt;br /&gt;
[http://www.moea.gov.tw/ https://www.owasp.org/images/a/a4/MOEA.png]&lt;br /&gt;
&lt;br /&gt;
'''Organizers'''&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Taiwan https://www.owasp.org/images/2/2b/OWASP_TW.png]&lt;br /&gt;
[http://www.iii.org.tw/english/ https://www.owasp.org/images/7/75/III.png]&lt;br /&gt;
[http://web.cisanet.org.tw/# https://www.owasp.org/images/6/64/CISA.png]&lt;br /&gt;
&lt;br /&gt;
'''Platinum Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png]&lt;br /&gt;
[http://www.fortify.com/ https://www.owasp.org/images/c/c7/Fortify.png]&lt;br /&gt;
[http://www.imperva.com/ https://www.owasp.org/images/d/da/IMPERVA.png]&lt;br /&gt;
[http://www.mtechpro.com/ https://www.owasp.org/images/b/be/MTECH.png]&lt;br /&gt;
[http://www.mudynamics.com/ https://www.owasp.org/images/1/17/Mu_Dynamics.png]&lt;br /&gt;
[http://www.systex.com.tw/english/index.asp https://www.owasp.org/images/5/5e/SYSTEX.png]&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:SYSTEX.png&amp;diff=45709</id>
		<title>File:SYSTEX.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:SYSTEX.png&amp;diff=45709"/>
				<updated>2008-11-04T04:43:44Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45708</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45708"/>
				<updated>2008-11-04T04:43:18Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: /* OWASP AppSec Asia 2008 Conference Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== A Note of Thanks ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank this year's 1200+ attendees who came to show support for OWASP App Sec Asia 2008!! As well as our Speakers, Chapter leaders and Sponsors who helped make this year's OWASP Asia Conference a great success!&lt;br /&gt;
[[Image:OWASP_Asia_08.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NOW AVAILABLE: OWASP AppSec Asia 2008 Session Slides ==&lt;br /&gt;
&lt;br /&gt;
The session slides are now available; please go to SESSION column under [https://www.owasp.org/index.php/OWASP_AppSec_Asia_2008_-_Taiwan#OWASP_AppSec_Asia_2008.2C_Conference_Schedule_.28Oct_27th_-_Oct_28th.29 Conference Schedule] to access to the slides.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 - Taiwan== &lt;br /&gt;
&lt;br /&gt;
Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-10:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/4/41/OWASP_Asia_2008_YMChen.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00-11:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]''' '''[https://www.owasp.org/images/6/6b/OWASP_Asia_2008_Wayne.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 11:50 - 12:40 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''12:40 - 13:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/14/OWASP_Asia_2008_KK.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''13:40 - 15:40 Asia Chapter Leader Meeting''' &lt;br /&gt;
'''Attendee:''' China, Delhi, HK, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters&lt;br /&gt;
&lt;br /&gt;
'''P.S:''' Meeting with go in parallel to the two of the talk sessions and coffee break.&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''13:40 - 14:30''' || style=&amp;quot;width:33%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:30 - 14:50 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:50 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/d/d2/OWASP_Asia_2008_FrankFan.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Yuan Fan, OWASP China Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin (Taiwan Information &amp;amp; Communication Security Technology Center)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:10''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Penetration Test with BackTrack: Art of Exploitation]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/f/f7/OWASP_Asia_2008_Anthony.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Anthony Lai (Dark Floyd), OWASP HK Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/9/9f/OWASP_Asia_2008_RSnake.pdf Slides]''' &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/15/OWASP_Asia_2008_Chenxi.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/7/74/OWASP_Asia_2008_Pukhraj.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/e/e5/OWASP_Asia_2008_TimBass.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]] &lt;br /&gt;
'''[https://www.owasp.org/images/5/5d/AppSecASIA08-BPWAF.pdf Slides]'''&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/0/09/OWASP_Asia_2008_Steven.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Anthony_Lai_(Dark_Floyd)%2C_OWASP_HK_Chapter Anthony], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
== Conference T-Shirt ==&lt;br /&gt;
[[Image:OWAS AppSec Asia Tshirt.png]]&lt;br /&gt;
&lt;br /&gt;
== Conference Venue==&lt;br /&gt;
&lt;br /&gt;
'''Taipei International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' 3rd floor Conference Hall, Xin Yi Road, Section 5, number 1, Taipei, Taiwan R.O.C.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.ticc.com.tw/index_en.aspx Website]'''&lt;br /&gt;
&lt;br /&gt;
== Hotel Information ==&lt;br /&gt;
&lt;br /&gt;
'''San Want Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.172, Sec. 4, ZhongXiao East Road, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel:+886-2-2772-2121 ｜ Fax : +886-2-2721-0302&lt;br /&gt;
&lt;br /&gt;
'''[http://www.sanwant.com/ Website]''' &lt;br /&gt;
&lt;br /&gt;
                                                    &lt;br /&gt;
'''Hope City FuShing Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.275, Sec.1, Fushing S. Rd., Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel : +886-2-2703-9990 ｜ Fax : +886-2-2706-8547&lt;br /&gt;
&lt;br /&gt;
'''[http://www.city-hotel.com.tw/bussiness/b2/b2-en.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
== Taipei City Map - With OWASP Venue and Hotels Marked ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image: Owasp_appsec_asia_2007_tpe_map_new.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Welcome to Taiwan==&lt;br /&gt;
And WELCOME TO TAIWAN! Please check out [http://tw.youtube.com/watch?v=wRc0q9xQEQ4 this video] about interesting places in Taiwan.&lt;br /&gt;
If you need suggestions on how to plan out your trip, please feel free to [mailto:wayne.owasp@gmail.com '''contact us!''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Sponsor_Owasp_Asia.png|840px]]&lt;br /&gt;
&lt;br /&gt;
'''Guide Team'''&lt;br /&gt;
&lt;br /&gt;
[http://www.moeaidb.gov.tw https://www.owasp.org/images/8/82/IDB.png]&lt;br /&gt;
[http://www.moea.gov.tw/ https://www.owasp.org/images/a/a4/MOEA.png]&lt;br /&gt;
&lt;br /&gt;
'''Organizers'''&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Taiwan https://www.owasp.org/images/2/2b/OWASP_TW.png]&lt;br /&gt;
[http://www.iii.org.tw/english/ https://www.owasp.org/images/7/75/III.png]&lt;br /&gt;
[http://web.cisanet.org.tw/# https://www.owasp.org/images/6/64/CISA.png]&lt;br /&gt;
&lt;br /&gt;
'''Platinum Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png]&lt;br /&gt;
[http://www.fortify.com/ https://www.owasp.org/images/c/c7/Fortify.png]&lt;br /&gt;
[http://www.imperva.com/ https://www.owasp.org/images/d/da/IMPERVA.png]&lt;br /&gt;
[http://www.mtechpro.com/ https://www.owasp.org/images/b/be/MTECH.png]&lt;br /&gt;
[http://www.mudynamics.com/ https://www.owasp.org/images/1/17/Mu_Dynamics.png]&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Mu_Dynamics.png&amp;diff=45707</id>
		<title>File:Mu Dynamics.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Mu_Dynamics.png&amp;diff=45707"/>
				<updated>2008-11-04T04:40:47Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45706</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45706"/>
				<updated>2008-11-04T04:40:02Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: /* OWASP AppSec Asia 2008 Conference Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== A Note of Thanks ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank this year's 1200+ attendees who came to show support for OWASP App Sec Asia 2008!! As well as our Speakers, Chapter leaders and Sponsors who helped make this year's OWASP Asia Conference a great success!&lt;br /&gt;
[[Image:OWASP_Asia_08.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NOW AVAILABLE: OWASP AppSec Asia 2008 Session Slides ==&lt;br /&gt;
&lt;br /&gt;
The session slides are now available; please go to SESSION column under [https://www.owasp.org/index.php/OWASP_AppSec_Asia_2008_-_Taiwan#OWASP_AppSec_Asia_2008.2C_Conference_Schedule_.28Oct_27th_-_Oct_28th.29 Conference Schedule] to access to the slides.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 - Taiwan== &lt;br /&gt;
&lt;br /&gt;
Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-10:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/4/41/OWASP_Asia_2008_YMChen.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00-11:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]''' '''[https://www.owasp.org/images/6/6b/OWASP_Asia_2008_Wayne.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 11:50 - 12:40 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''12:40 - 13:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/14/OWASP_Asia_2008_KK.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''13:40 - 15:40 Asia Chapter Leader Meeting''' &lt;br /&gt;
'''Attendee:''' China, Delhi, HK, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters&lt;br /&gt;
&lt;br /&gt;
'''P.S:''' Meeting with go in parallel to the two of the talk sessions and coffee break.&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''13:40 - 14:30''' || style=&amp;quot;width:33%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:30 - 14:50 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:50 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/d/d2/OWASP_Asia_2008_FrankFan.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Yuan Fan, OWASP China Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin (Taiwan Information &amp;amp; Communication Security Technology Center)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:10''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Penetration Test with BackTrack: Art of Exploitation]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/f/f7/OWASP_Asia_2008_Anthony.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Anthony Lai (Dark Floyd), OWASP HK Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/9/9f/OWASP_Asia_2008_RSnake.pdf Slides]''' &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/15/OWASP_Asia_2008_Chenxi.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/7/74/OWASP_Asia_2008_Pukhraj.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/e/e5/OWASP_Asia_2008_TimBass.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]] &lt;br /&gt;
'''[https://www.owasp.org/images/5/5d/AppSecASIA08-BPWAF.pdf Slides]'''&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/0/09/OWASP_Asia_2008_Steven.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Anthony_Lai_(Dark_Floyd)%2C_OWASP_HK_Chapter Anthony], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
== Conference T-Shirt ==&lt;br /&gt;
[[Image:OWAS AppSec Asia Tshirt.png]]&lt;br /&gt;
&lt;br /&gt;
== Conference Venue==&lt;br /&gt;
&lt;br /&gt;
'''Taipei International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' 3rd floor Conference Hall, Xin Yi Road, Section 5, number 1, Taipei, Taiwan R.O.C.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.ticc.com.tw/index_en.aspx Website]'''&lt;br /&gt;
&lt;br /&gt;
== Hotel Information ==&lt;br /&gt;
&lt;br /&gt;
'''San Want Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.172, Sec. 4, ZhongXiao East Road, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel:+886-2-2772-2121 ｜ Fax : +886-2-2721-0302&lt;br /&gt;
&lt;br /&gt;
'''[http://www.sanwant.com/ Website]''' &lt;br /&gt;
&lt;br /&gt;
                                                    &lt;br /&gt;
'''Hope City FuShing Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.275, Sec.1, Fushing S. Rd., Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel : +886-2-2703-9990 ｜ Fax : +886-2-2706-8547&lt;br /&gt;
&lt;br /&gt;
'''[http://www.city-hotel.com.tw/bussiness/b2/b2-en.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
== Taipei City Map - With OWASP Venue and Hotels Marked ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image: Owasp_appsec_asia_2007_tpe_map_new.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Welcome to Taiwan==&lt;br /&gt;
And WELCOME TO TAIWAN! Please check out [http://tw.youtube.com/watch?v=wRc0q9xQEQ4 this video] about interesting places in Taiwan.&lt;br /&gt;
If you need suggestions on how to plan out your trip, please feel free to [mailto:wayne.owasp@gmail.com '''contact us!''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Sponsor_Owasp_Asia.png|840px]]&lt;br /&gt;
&lt;br /&gt;
'''Guide Team'''&lt;br /&gt;
&lt;br /&gt;
[http://www.moeaidb.gov.tw https://www.owasp.org/images/8/82/IDB.png]&lt;br /&gt;
[http://www.moea.gov.tw/ https://www.owasp.org/images/a/a4/MOEA.png]&lt;br /&gt;
&lt;br /&gt;
'''Organizers'''&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Taiwan https://www.owasp.org/images/2/2b/OWASP_TW.png]&lt;br /&gt;
[http://www.iii.org.tw/english/ https://www.owasp.org/images/7/75/III.png]&lt;br /&gt;
[http://web.cisanet.org.tw/# https://www.owasp.org/images/6/64/CISA.png]&lt;br /&gt;
&lt;br /&gt;
'''Platinum Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png]&lt;br /&gt;
[http://www.fortify.com/ https://www.owasp.org/images/c/c7/Fortify.png]&lt;br /&gt;
[http://www.imperva.com/ https://www.owasp.org/images/d/da/IMPERVA.png]&lt;br /&gt;
[http://www.mtechpro.com/ https://www.owasp.org/images/b/be/MTECH.png]&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:MTECH.png&amp;diff=45705</id>
		<title>File:MTECH.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:MTECH.png&amp;diff=45705"/>
				<updated>2008-11-04T04:38:40Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45704</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=45704"/>
				<updated>2008-11-04T04:36:19Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: /* OWASP AppSec Asia 2008 Conference Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== A Note of Thanks ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank this year's 1200+ attendees who came to show support for OWASP App Sec Asia 2008!! As well as our Speakers, Chapter leaders and Sponsors who helped make this year's OWASP Asia Conference a great success!&lt;br /&gt;
[[Image:OWASP_Asia_08.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NOW AVAILABLE: OWASP AppSec Asia 2008 Session Slides ==&lt;br /&gt;
&lt;br /&gt;
The session slides are now available; please go to SESSION column under [https://www.owasp.org/index.php/OWASP_AppSec_Asia_2008_-_Taiwan#OWASP_AppSec_Asia_2008.2C_Conference_Schedule_.28Oct_27th_-_Oct_28th.29 Conference Schedule] to access to the slides.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 - Taiwan== &lt;br /&gt;
&lt;br /&gt;
Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-10:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/4/41/OWASP_Asia_2008_YMChen.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00-11:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]''' '''[https://www.owasp.org/images/6/6b/OWASP_Asia_2008_Wayne.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 11:50 - 12:40 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''12:40 - 13:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/14/OWASP_Asia_2008_KK.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''13:40 - 15:40 Asia Chapter Leader Meeting''' &lt;br /&gt;
'''Attendee:''' China, Delhi, HK, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters&lt;br /&gt;
&lt;br /&gt;
'''P.S:''' Meeting with go in parallel to the two of the talk sessions and coffee break.&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''13:40 - 14:30''' || style=&amp;quot;width:33%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
  |-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:30 - 14:50 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:50 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/d/d2/OWASP_Asia_2008_FrankFan.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Yuan Fan, OWASP China Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin (Taiwan Information &amp;amp; Communication Security Technology Center)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:10''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Penetration Test with BackTrack: Art of Exploitation]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/f/f7/OWASP_Asia_2008_Anthony.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Anthony Lai (Dark Floyd), OWASP HK Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/9/9f/OWASP_Asia_2008_RSnake.pdf Slides]''' &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/1/15/OWASP_Asia_2008_Chenxi.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/7/74/OWASP_Asia_2008_Pukhraj.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/e/e5/OWASP_Asia_2008_TimBass.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]] &lt;br /&gt;
'''[https://www.owasp.org/images/5/5d/AppSecASIA08-BPWAF.pdf Slides]'''&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;''' '''[https://www.owasp.org/images/0/09/OWASP_Asia_2008_Steven.pdf Slides]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Anthony_Lai_(Dark_Floyd)%2C_OWASP_HK_Chapter Anthony], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
== Conference T-Shirt ==&lt;br /&gt;
[[Image:OWAS AppSec Asia Tshirt.png]]&lt;br /&gt;
&lt;br /&gt;
== Conference Venue==&lt;br /&gt;
&lt;br /&gt;
'''Taipei International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' 3rd floor Conference Hall, Xin Yi Road, Section 5, number 1, Taipei, Taiwan R.O.C.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.ticc.com.tw/index_en.aspx Website]'''&lt;br /&gt;
&lt;br /&gt;
== Hotel Information ==&lt;br /&gt;
&lt;br /&gt;
'''San Want Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.172, Sec. 4, ZhongXiao East Road, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel:+886-2-2772-2121 ｜ Fax : +886-2-2721-0302&lt;br /&gt;
&lt;br /&gt;
'''[http://www.sanwant.com/ Website]''' &lt;br /&gt;
&lt;br /&gt;
                                                    &lt;br /&gt;
'''Hope City FuShing Hotel'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No.275, Sec.1, Fushing S. Rd., Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
Tel : +886-2-2703-9990 ｜ Fax : +886-2-2706-8547&lt;br /&gt;
&lt;br /&gt;
'''[http://www.city-hotel.com.tw/bussiness/b2/b2-en.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
== Taipei City Map - With OWASP Venue and Hotels Marked ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image: Owasp_appsec_asia_2007_tpe_map_new.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Welcome to Taiwan==&lt;br /&gt;
And WELCOME TO TAIWAN! Please check out [http://tw.youtube.com/watch?v=wRc0q9xQEQ4 this video] about interesting places in Taiwan.&lt;br /&gt;
If you need suggestions on how to plan out your trip, please feel free to [mailto:wayne.owasp@gmail.com '''contact us!''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008 Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Sponsor_Owasp_Asia.png|840px]]&lt;br /&gt;
&lt;br /&gt;
'''Guide Team'''&lt;br /&gt;
&lt;br /&gt;
[http://www.moeaidb.gov.tw https://www.owasp.org/images/8/82/IDB.png]&lt;br /&gt;
[http://www.moea.gov.tw/ https://www.owasp.org/images/a/a4/MOEA.png]&lt;br /&gt;
&lt;br /&gt;
'''Organizers'''&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Taiwan https://www.owasp.org/images/2/2b/OWASP_TW.png]&lt;br /&gt;
[http://www.iii.org.tw/english/ https://www.owasp.org/images/7/75/III.png]&lt;br /&gt;
[http://web.cisanet.org.tw/# https://www.owasp.org/images/6/64/CISA.png]&lt;br /&gt;
&lt;br /&gt;
'''Platinum Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png]&lt;br /&gt;
[http://www.fortify.com/ https://www.owasp.org/images/c/c7/Fortify.png]&lt;br /&gt;
[http://www.imperva.com/ https://www.owasp.org/images/d/da/IMPERVA.png]&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:IMPERVA.png&amp;diff=45703</id>
		<title>File:IMPERVA.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:IMPERVA.png&amp;diff=45703"/>
				<updated>2008-11-04T04:35:36Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Fortify.png&amp;diff=45702</id>
		<title>File:Fortify.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Fortify.png&amp;diff=45702"/>
				<updated>2008-11-04T04:33:33Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Armorize.png&amp;diff=45701</id>
		<title>File:Armorize.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Armorize.png&amp;diff=45701"/>
				<updated>2008-11-04T04:31:20Z</updated>
		
		<summary type="html">&lt;p&gt;Rahul: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rahul</name></author>	</entry>

	</feed>