<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Talal+Albacha</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Talal+Albacha"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Talal_Albacha"/>
		<updated>2026-05-08T13:06:53Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=242897</id>
		<title>OWASP Top 5 Machine Learning Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=242897"/>
				<updated>2018-08-28T19:50:47Z</updated>
		
		<summary type="html">&lt;p&gt;Talal Albacha: seba added as co-leader&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
==The OWASP Top 5 Machine Learning Risks==&lt;br /&gt;
The idea is to build the required resources which help software security community to understand the emerging technology of machine learning and how it is related to security, warn them about the risk associated with using ML, and discuss the defending techniques.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Machine Learning has recently re-emerged as a powerful tool in multiple business sectors. It also becomes vital when it is harnessed for the Security services and applications like Fraud Detection, Anomaly Detection, Behavioral Analysis, etc.&lt;br /&gt;
&lt;br /&gt;
Although these applications have huge success, there are still security risks associated with the learning technique especially the security of the learning phase; which can still be vulnerable to threats originated by potential adversaries, and consequently it has considerable impact on their prediction results &lt;br /&gt;
&lt;br /&gt;
This project will list these risks and the defending techniques&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 5 Machine Learning Risks project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project News ==&lt;br /&gt;
June 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* Project was discussed in Open Security Summit 2018 with wider team. https://open-security-summit.org/tracks/owasp-projects/working-sessions/owasp-top-5-machine-learning-risks/. stay tuned for outcomes.&lt;br /&gt;
* The first draft document is now available on Github https://github.com/OWASP/Top-5-Machine-Learning-Risks/&lt;br /&gt;
* Please raise issues in github for any comments or suggestions&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
March 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* New member joined: Sereysethy Touch: Teaching Assistant in Faculty of Computer Science at University of Namur, Belgium.&lt;br /&gt;
* Second meeting held (Talal, Prabhant and Sethy)&lt;br /&gt;
&lt;br /&gt;
February 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* First meeting held (Talal, Jean- Noël and Prabhant)&lt;br /&gt;
* Project content to be updated on google docs until we come up with the first draft, then it will be available on the wiki and github pages.&lt;br /&gt;
&lt;br /&gt;
January 2018:&amp;lt;br /&amp;gt;&lt;br /&gt;
2 members joined the team: &lt;br /&gt;
* Jean-Noël Colin: Professor in CS Faculty of University of Namur, Belgium, working in the broad field of information security, and more recently, looking at using ML methods for security purposes&lt;br /&gt;
* Prabhant Singh: Master student at University of Tartu, currently researching on secure and reliable machine learning. have been associated with owasp from last 2 years. &lt;br /&gt;
&lt;br /&gt;
September 2017:&amp;lt;br /&amp;gt;&lt;br /&gt;
* Project introduction in webinar (attached)&lt;br /&gt;
[[File:https://www.owasp.org/images/c/cc/Machine_Learning_for_Application_Security_Professionals.pdf|thumb]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
{| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
This project requires a lot of participations from data scientists, ML experts, software developers, risk managers and application security specialists. Please make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. The first contributors to the project were: &lt;br /&gt;
&lt;br /&gt;
* Project Leader: [[User:Talal Albacha|Talal Albacha]]&lt;br /&gt;
* Project Co-leader : [[User: Sdeleersnyder|Sebastien Deleersnyder]]&lt;br /&gt;
* [Https://www.linkedin.com/in/jncolin/|Prof. Jean-Noël Colin]&lt;br /&gt;
* [Https://twitter.com/prabhantsingh Prabhant Singh]  &lt;br /&gt;
* Sereysethy Touch  &lt;br /&gt;
* ..[your name]..  &lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
We will have ANNUAL release of the up-to-date top 5 risks, organized as following:&lt;br /&gt;
* Draft version (https://github.com/OWASP/Top-5-Machine-Learning-Risks/)&lt;br /&gt;
* Community responses&lt;br /&gt;
* Validate in AppSec conference&lt;br /&gt;
* Release final list for the year.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Talal Albacha</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=241579</id>
		<title>OWASP Top 5 Machine Learning Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=241579"/>
				<updated>2018-06-30T17:39:24Z</updated>
		
		<summary type="html">&lt;p&gt;Talal Albacha: adding Seba&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
==The OWASP Top 5 Machine Learning Risks==&lt;br /&gt;
The idea is to build the required resources which help software security community to understand the emerging technology of machine learning and how it is related to security, warn them about the risk associated with using ML, and discuss the defending techniques.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Machine Learning has recently re-emerged as a powerful tool in multiple business sectors. It also becomes vital when it is harnessed for the Security services and applications like Fraud Detection, Anomaly Detection, Behavioral Analysis, etc.&lt;br /&gt;
&lt;br /&gt;
Although these applications have huge success, there are still security risks associated with the learning technique especially the security of the learning phase; which can still be vulnerable to threats originated by potential adversaries, and consequently it has considerable impact on their prediction results &lt;br /&gt;
&lt;br /&gt;
This project will list these risks and the defending techniques&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 5 Machine Learning Risks project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project News ==&lt;br /&gt;
June 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* Project was discussed in Open Security Summit 2018 with wider team. https://open-security-summit.org/tracks/owasp-projects/working-sessions/owasp-top-5-machine-learning-risks/. stay tuned for outcomes.&lt;br /&gt;
* The first draft document is now available on Github https://github.com/OWASP/Top-5-Machine-Learning-Risks/&lt;br /&gt;
* Please raise issues in github for any comments or suggestions&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
March 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* New member joined: Sereysethy Touch: Teaching Assistant in Faculty of Computer Science at University of Namur, Belgium.&lt;br /&gt;
* Second meeting held (Talal, Prabhant and Sethy)&lt;br /&gt;
&lt;br /&gt;
February 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* First meeting held (Talal, Jean- Noël and Prabhant)&lt;br /&gt;
* Project content to be updated on google docs until we come up with the first draft, then it will be available on the wiki and github pages.&lt;br /&gt;
&lt;br /&gt;
January 2018:&amp;lt;br /&amp;gt;&lt;br /&gt;
2 members joined the team: &lt;br /&gt;
* Jean-Noël Colin: Professor in CS Faculty of University of Namur, Belgium, working in the broad field of information security, and more recently, looking at using ML methods for security purposes&lt;br /&gt;
* Prabhant Singh: Master student at University of Tartu, currently researching on secure and reliable machine learning. have been associated with owasp from last 2 years. &lt;br /&gt;
&lt;br /&gt;
September 2017:&amp;lt;br /&amp;gt;&lt;br /&gt;
* Project introduction in webinar (attached)&lt;br /&gt;
[[File:https://www.owasp.org/images/c/cc/Machine_Learning_for_Application_Security_Professionals.pdf|thumb]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
{| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
This project requires a lot of participations from data scientists, ML experts, software developers, risk managers and application security specialists. Please make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. The first contributors to the project were: &lt;br /&gt;
&lt;br /&gt;
* Project Leader: [[User:Talal Albacha|Talal Albacha]]&lt;br /&gt;
* [[Https://www.linkedin.com/in/jncolin/|Prof. Jean-Noël Colin]]&lt;br /&gt;
* [Https://twitter.com/prabhantsingh Prabhant Singh]  &lt;br /&gt;
* Sereysethy Touch  &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Sdeleersnyder Seba Deleersnyder]  &lt;br /&gt;
* ..[your name]..  &lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
We will have ANNUAL release of the up-to-date top 5 risks, organized as following:&lt;br /&gt;
* Draft version (https://github.com/OWASP/Top-5-Machine-Learning-Risks/)&lt;br /&gt;
* Community responses&lt;br /&gt;
* Validate in AppSec conference&lt;br /&gt;
* Release final list for the year.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Talal Albacha</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=241214</id>
		<title>OWASP Top 5 Machine Learning Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=241214"/>
				<updated>2018-06-08T12:38:34Z</updated>
		
		<summary type="html">&lt;p&gt;Talal Albacha: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
==The OWASP Top 5 Machine Learning Risks==&lt;br /&gt;
The idea is to build the required resources which help software security community to understand the emerging technology of machine learning and how it is related to security, warn them about the risk associated with using ML, and discuss the defending techniques.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Machine Learning has recently re-emerged as a powerful tool in multiple business sectors. It also becomes vital when it is harnessed for the Security services and applications like Fraud Detection, Anomaly Detection, Behavioral Analysis, etc.&lt;br /&gt;
&lt;br /&gt;
Although these applications have huge success, there are still security risks associated with the learning technique especially the security of the learning phase; which can still be vulnerable to threats originated by potential adversaries, and consequently it has considerable impact on their prediction results &lt;br /&gt;
&lt;br /&gt;
This project will list these risks and the defending techniques&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 5 Machine Learning Risks project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project News ==&lt;br /&gt;
June 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* Project was discussed in Open Security Summit 2018 with wider team. https://open-security-summit.org/tracks/owasp-projects/working-sessions/owasp-top-5-machine-learning-risks/. stay tuned for outcomes.&lt;br /&gt;
* The first draft document is now available on Github https://github.com/OWASP/Top-5-Machine-Learning-Risks/&lt;br /&gt;
* Please raise issues in github for any comments or suggestions&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
March 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* New member joined: Sereysethy Touch: Teaching Assistant in Faculty of Computer Science at University of Namur, Belgium.&lt;br /&gt;
* Second meeting held (Talal, Prabhant and Sethy)&lt;br /&gt;
&lt;br /&gt;
February 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* First meeting held (Talal, Jean- Noël and Prabhant)&lt;br /&gt;
* Project content to be updated on google docs until we come up with the first draft, then it will be available on the wiki and github pages.&lt;br /&gt;
&lt;br /&gt;
January 2018:&amp;lt;br /&amp;gt;&lt;br /&gt;
2 members joined the team: &lt;br /&gt;
* Jean-Noël Colin: Professor in CS Faculty of University of Namur, Belgium, working in the broad field of information security, and more recently, looking at using ML methods for security purposes&lt;br /&gt;
* Prabhant Singh: Master student at University of Tartu, currently researching on secure and reliable machine learning. have been associated with owasp from last 2 years. &lt;br /&gt;
&lt;br /&gt;
September 2017:&amp;lt;br /&amp;gt;&lt;br /&gt;
* Project introduction in webinar (attached)&lt;br /&gt;
[[File:https://www.owasp.org/images/c/cc/Machine_Learning_for_Application_Security_Professionals.pdf|thumb]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
{| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
This project requires a lot of participations from data scientists, ML experts, software developers, risk managers and application security specialists. Please make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. The first contributors to the project were: &lt;br /&gt;
&lt;br /&gt;
* Project Leader: [[User:Talal Albacha|Talal Albacha]]&lt;br /&gt;
* [[Https://www.linkedin.com/in/jncolin/|Prof. Jean-Noël Colin]]&lt;br /&gt;
* [Https://twitter.com/prabhantsingh Prabhant Singh]  &lt;br /&gt;
* Sereysethy Touch  &lt;br /&gt;
* ..[your name]..  &lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
We will have ANNUAL release of the up-to-date top 5 risks, organized as following:&lt;br /&gt;
* Draft version (https://github.com/OWASP/Top-5-Machine-Learning-Risks/)&lt;br /&gt;
* Community responses&lt;br /&gt;
* Validate in AppSec conference&lt;br /&gt;
* Release final list for the year.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Talal Albacha</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=241213</id>
		<title>OWASP Top 5 Machine Learning Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=241213"/>
				<updated>2018-06-08T12:36:19Z</updated>
		
		<summary type="html">&lt;p&gt;Talal Albacha: update the github link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
==The OWASP Top 5 Machine Learning Risks==&lt;br /&gt;
The idea is to build the required resources which help software security community to understand the emerging technology of machine learning and how it is related to security, warn them about the risk associated with using ML, and discuss the defending techniques.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Machine Learning has recently re-emerged as a powerful tool in multiple business sectors. It also becomes vital when it is harnessed for the Security services and applications like Fraud Detection, Anomaly Detection, Behavioral Analysis, etc.&lt;br /&gt;
&lt;br /&gt;
Although these applications have huge success, there are still security risks associated with the learning technique especially the security of the learning phase; which can still be vulnerable to threats originated by potential adversaries, and consequently it has considerable impact on their prediction results &lt;br /&gt;
&lt;br /&gt;
This project will list these risks and the defending techniques&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 5 Machine Learning Risks project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project News ==&lt;br /&gt;
June 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* Project was discussed in Open Security Summit 2018 with wider team. https://open-security-summit.org/tracks/owasp-projects/working-sessions/owasp-top-5-machine-learning-risks/. stay tuned for outcomes.&lt;br /&gt;
* The first draft document is now available on Github https://github.com/OWASP/Top-5-Machine-Learning-Risks/&lt;br /&gt;
* Please raise issues in github for any comments or suggestions&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
March 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* New member joined: Sereysethy Touch: Teaching Assistant in Faculty of Computer Science at University of Namur, Belgium.&lt;br /&gt;
* Second meeting held (Talal, Prabhant and Sethy)&lt;br /&gt;
&lt;br /&gt;
February 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* First meeting held (Talal, Jean- Noël and Prabhant)&lt;br /&gt;
* Project content to be updated on google docs until we come up with the first draft, then it will be available on the wiki and github pages.&lt;br /&gt;
&lt;br /&gt;
January 2018:&amp;lt;br /&amp;gt;&lt;br /&gt;
2 members joined the team: &lt;br /&gt;
* Jean-Noël Colin: Professor in CS Faculty of University of Namur, Belgium, working in the broad field of information security, and more recently, looking at using ML methods for security purposes&lt;br /&gt;
* Prabhant Singh: Master student at University of Tartu, currently researching on secure and reliable machine learning. have been associated with owasp from last 2 years. &lt;br /&gt;
&lt;br /&gt;
September 2017:&amp;lt;br /&amp;gt;&lt;br /&gt;
* Project introduction in webinar (attached)&lt;br /&gt;
[[File:https://www.owasp.org/images/c/cc/Machine_Learning_for_Application_Security_Professionals.pdf|thumb]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
{| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
This project requires a lot of participations from data scientists, ML experts, software developers, risk managers and application security specialists. Please make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. The first contributors to the project were: &lt;br /&gt;
&lt;br /&gt;
* Project Leader: [[User:Talal Albacha|Talal Albacha]]&lt;br /&gt;
* [[Https://www.linkedin.com/in/jncolin/|Prof. Jean-Noël Colin]]&lt;br /&gt;
* [Https://twitter.com/prabhantsingh Prabhant Singh]  &lt;br /&gt;
* Sereysethy Touch  &lt;br /&gt;
* ..[your name]..  &lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
We will have ANNUAL release of the up-to-date top 5 risks, organized as following:&lt;br /&gt;
* Draft version (https://github.com/OWASP/Top-5-Machine-Learning-Risks/) &lt;br /&gt;
* Community responses&lt;br /&gt;
* Validate in AppSec conference&lt;br /&gt;
* Release final list for the year.&lt;br /&gt;
&lt;br /&gt;
NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Talal Albacha</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=241212</id>
		<title>OWASP Top 5 Machine Learning Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=241212"/>
				<updated>2018-06-08T12:33:24Z</updated>
		
		<summary type="html">&lt;p&gt;Talal Albacha: adding latest update&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
==The OWASP Top 5 Machine Learning Risks==&lt;br /&gt;
The idea is to build the required resources which help software security community to understand the emerging technology of machine learning and how it is related to security, warn them about the risk associated with using ML, and discuss the defending techniques.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Machine Learning has recently re-emerged as a powerful tool in multiple business sectors. It also becomes vital when it is harnessed for the Security services and applications like Fraud Detection, Anomaly Detection, Behavioral Analysis, etc.&lt;br /&gt;
&lt;br /&gt;
Although these applications have huge success, there are still security risks associated with the learning technique especially the security of the learning phase; which can still be vulnerable to threats originated by potential adversaries, and consequently it has considerable impact on their prediction results &lt;br /&gt;
&lt;br /&gt;
This project will list these risks and the defending techniques&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 5 Machine Learning Risks project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project News ==&lt;br /&gt;
June 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* Project was discussed in Open Security Summit 2018 with wider team. https://open-security-summit.org/tracks/owasp-projects/working-sessions/owasp-top-5-machine-learning-risks/. stay tuned for outcomes.&lt;br /&gt;
* The first draft document is now available on Github https://github.com/OWASP/Top-5-Machine-Learning-Risks/&lt;br /&gt;
* Please raise issues in github for any comments or suggestions&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
March 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* New member joined: Sereysethy Touch: Teaching Assistant in Faculty of Computer Science at University of Namur, Belgium.&lt;br /&gt;
* Second meeting held (Talal, Prabhant and Sethy)&lt;br /&gt;
&lt;br /&gt;
February 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* First meeting held (Talal, Jean- Noël and Prabhant)&lt;br /&gt;
* Project content to be updated on google docs until we come up with the first draft, then it will be available on the wiki and github pages.&lt;br /&gt;
&lt;br /&gt;
January 2018:&amp;lt;br /&amp;gt;&lt;br /&gt;
2 members joined the team: &lt;br /&gt;
* Jean-Noël Colin: Professor in CS Faculty of University of Namur, Belgium, working in the broad field of information security, and more recently, looking at using ML methods for security purposes&lt;br /&gt;
* Prabhant Singh: Master student at University of Tartu, currently researching on secure and reliable machine learning. have been associated with owasp from last 2 years. &lt;br /&gt;
&lt;br /&gt;
September 2017:&amp;lt;br /&amp;gt;&lt;br /&gt;
* Project introduction in webinar (attached)&lt;br /&gt;
[[File:https://www.owasp.org/images/c/cc/Machine_Learning_for_Application_Security_Professionals.pdf|thumb]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
{| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
This project requires a lot of participations from data scientists, ML experts, software developers, risk managers and application security specialists. Please make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. The first contributors to the project were: &lt;br /&gt;
&lt;br /&gt;
* Project Leader: [[User:Talal Albacha|Talal Albacha]]&lt;br /&gt;
* [[Https://www.linkedin.com/in/jncolin/|Prof. Jean-Noël Colin]]&lt;br /&gt;
* [Https://twitter.com/prabhantsingh Prabhant Singh]  &lt;br /&gt;
* Sereysethy Touch  &lt;br /&gt;
* ..[your name]..  &lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
We will have ANNUAL release of the up-to-date top 5 risks, organized as following:&lt;br /&gt;
* Draft version&lt;br /&gt;
* Community responses&lt;br /&gt;
* Validate in AppSec conference&lt;br /&gt;
* Release final list for the year.&lt;br /&gt;
&lt;br /&gt;
As of September 2017, the topics priorities are:&lt;br /&gt;
** Machine Learning Introduction&lt;br /&gt;
*** What are the available machine learning platforms?&lt;br /&gt;
*** Are there any security vulnerabilities associated with these platforms?&lt;br /&gt;
** Usage of Machine Learning in Security&lt;br /&gt;
*** Can AI be used to reduce false positive findings in security scanners?&lt;br /&gt;
*** Fraud Detection...&lt;br /&gt;
** Security  of Machine learning&lt;br /&gt;
*** ML Learning phase&lt;br /&gt;
*** How to securely feed data to ML and AI tools&lt;br /&gt;
*** How to make learning algorithms aware of malicious data?&lt;br /&gt;
** Top 5 risks&lt;br /&gt;
** Defending techniques&lt;br /&gt;
** References and Additional Resources&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Talal Albacha</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=241211</id>
		<title>OWASP Top 5 Machine Learning Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=241211"/>
				<updated>2018-06-08T12:26:45Z</updated>
		
		<summary type="html">&lt;p&gt;Talal Albacha: correct the link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
==The OWASP Top 5 Machine Learning Risks==&lt;br /&gt;
The idea is to build the required resources which help software security community to understand the emerging technology of machine learning and how it is related to security, warn them about the risk associated with using ML, and discuss the defending techniques.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Machine Learning has recently re-emerged as a powerful tool in multiple business sectors. It also becomes vital when it is harnessed for the Security services and applications like Fraud Detection, Anomaly Detection, Behavioral Analysis, etc.&lt;br /&gt;
&lt;br /&gt;
Although these applications have huge success, there are still security risks associated with the learning technique especially the security of the learning phase; which can still be vulnerable to threats originated by potential adversaries, and consequently it has considerable impact on their prediction results &lt;br /&gt;
&lt;br /&gt;
This project will list these risks and the defending techniques&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 5 Machine Learning Risks project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project News ==&lt;br /&gt;
&lt;br /&gt;
March 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* New member joined: Sereysethy Touch: Teaching Assistant in Faculty of Computer Science at University of Namur, Belgium.&lt;br /&gt;
* Second meeting held (Talal, Prabhant and Sethy)&lt;br /&gt;
&lt;br /&gt;
February 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* First meeting held (Talal, Jean- Noël and Prabhant)&lt;br /&gt;
* Project content to be updated on google docs until we come up with the first draft, then it will be available on the wiki and github pages.&lt;br /&gt;
&lt;br /&gt;
January 2018:&amp;lt;br /&amp;gt;&lt;br /&gt;
2 members joined the team: &lt;br /&gt;
* Jean-Noël Colin: Professor in CS Faculty of University of Namur, Belgium, working in the broad field of information security, and more recently, looking at using ML methods for security purposes&lt;br /&gt;
* Prabhant Singh: Master student at University of Tartu, currently researching on secure and reliable machine learning. have been associated with owasp from last 2 years. &lt;br /&gt;
&lt;br /&gt;
September 2017:&amp;lt;br /&amp;gt;&lt;br /&gt;
* Project introduction in webinar (attached)&lt;br /&gt;
[[File:https://www.owasp.org/images/c/cc/Machine_Learning_for_Application_Security_Professionals.pdf|thumb]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
{| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
This project requires a lot of participations from data scientists, ML experts, software developers, risk managers and application security specialists. Please make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. The first contributors to the project were: &lt;br /&gt;
&lt;br /&gt;
* Project Leader: [[User:Talal Albacha|Talal Albacha]]&lt;br /&gt;
* [[Https://www.linkedin.com/in/jncolin/|Prof. Jean-Noël Colin]]&lt;br /&gt;
* [Https://twitter.com/prabhantsingh Prabhant Singh]  &lt;br /&gt;
* Sereysethy Touch  &lt;br /&gt;
* ..[your name]..  &lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
We will have ANNUAL release of the up-to-date top 5 risks, organized as following:&lt;br /&gt;
* Draft version&lt;br /&gt;
* Community responses&lt;br /&gt;
* Validate in AppSec conference&lt;br /&gt;
* Release final list for the year.&lt;br /&gt;
&lt;br /&gt;
As of September 2017, the topics priorities are:&lt;br /&gt;
** Machine Learning Introduction&lt;br /&gt;
*** What are the available machine learning platforms?&lt;br /&gt;
*** Are there any security vulnerabilities associated with these platforms?&lt;br /&gt;
** Usage of Machine Learning in Security&lt;br /&gt;
*** Can AI be used to reduce false positive findings in security scanners?&lt;br /&gt;
*** Fraud Detection...&lt;br /&gt;
** Security  of Machine learning&lt;br /&gt;
*** ML Learning phase&lt;br /&gt;
*** How to securely feed data to ML and AI tools&lt;br /&gt;
*** How to make learning algorithms aware of malicious data?&lt;br /&gt;
** Top 5 risks&lt;br /&gt;
** Defending techniques&lt;br /&gt;
** References and Additional Resources&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Talal Albacha</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=241095</id>
		<title>OWASP Top 5 Machine Learning Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=241095"/>
				<updated>2018-06-02T19:25:31Z</updated>
		
		<summary type="html">&lt;p&gt;Talal Albacha: /* FAQs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
==The OWASP Top 5 Machine Learning Risks==&lt;br /&gt;
The idea is to build the required resources which help software security community to understand the emerging technology of machine learning and how it is related to security, warn them about the risk associated with using ML, and discuss the defending techniques.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Machine Learning has recently re-emerged as a powerful tool in multiple business sectors. It also becomes vital when it is harnessed for the Security services and applications like Fraud Detection, Anomaly Detection, Behavioral Analysis, etc.&lt;br /&gt;
&lt;br /&gt;
Although these applications have huge success, there are still security risks associated with the learning technique especially the security of the learning phase; which can still be vulnerable to threats originated by potential adversaries, and consequently it has considerable impact on their prediction results &lt;br /&gt;
&lt;br /&gt;
This project will list these risks and the defending techniques&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 5 Machine Learning Risks project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project News ==&lt;br /&gt;
&lt;br /&gt;
March 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* New member joined: Sereysethy Touch: Teaching Assistant in Faculty of Computer Science at University of Namur, Belgium.&lt;br /&gt;
* Second meeting held (Talal, Prabhant and Sethy)&lt;br /&gt;
&lt;br /&gt;
February 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* First meeting held (Talal, Jean- Noël and Prabhant)&lt;br /&gt;
* Project content to be updated on google docs until we come up with the first draft, then it will be available on the wiki and github pages.&lt;br /&gt;
&lt;br /&gt;
January 2018:&amp;lt;br /&amp;gt;&lt;br /&gt;
2 members joined the team: &lt;br /&gt;
* Jean-Noël Colin: Professor in CS Faculty of University of Namur, Belgium, working in the broad field of information security, and more recently, looking at using ML methods for security purposes&lt;br /&gt;
* Prabhant Singh: Master student at University of Tartu, currently researching on secure and reliable machine learning. have been associated with owasp from last 2 years. &lt;br /&gt;
&lt;br /&gt;
September 2017:&amp;lt;br /&amp;gt;&lt;br /&gt;
* Project introduction in webinar (attached)&lt;br /&gt;
[[File:Https://www.owasp.org/index.php/File:Machine Learning for Application Security Professionals.pdf|thumb]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
{| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
This project requires a lot of participations from data scientists, ML experts, software developers, risk managers and application security specialists. Please make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. The first contributors to the project were: &lt;br /&gt;
&lt;br /&gt;
* Project Leader: [[User:Talal Albacha|Talal Albacha]]&lt;br /&gt;
* [[Https://www.linkedin.com/in/jncolin/|Prof. Jean-Noël Colin]]&lt;br /&gt;
* [Https://twitter.com/prabhantsingh Prabhant Singh]  &lt;br /&gt;
* Sereysethy Touch  &lt;br /&gt;
* ..[your name]..  &lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
We will have ANNUAL release of the up-to-date top 5 risks, organized as following:&lt;br /&gt;
* Draft version&lt;br /&gt;
* Community responses&lt;br /&gt;
* Validate in AppSec conference&lt;br /&gt;
* Release final list for the year.&lt;br /&gt;
&lt;br /&gt;
As of September 2017, the topics priorities are:&lt;br /&gt;
** Machine Learning Introduction&lt;br /&gt;
*** What are the available machine learning platforms?&lt;br /&gt;
*** Are there any security vulnerabilities associated with these platforms?&lt;br /&gt;
** Usage of Machine Learning in Security&lt;br /&gt;
*** Can AI be used to reduce false positive findings in security scanners?&lt;br /&gt;
*** Fraud Detection...&lt;br /&gt;
** Security  of Machine learning&lt;br /&gt;
*** ML Learning phase&lt;br /&gt;
*** How to securely feed data to ML and AI tools&lt;br /&gt;
*** How to make learning algorithms aware of malicious data?&lt;br /&gt;
** Top 5 risks&lt;br /&gt;
** Defending techniques&lt;br /&gt;
** References and Additional Resources&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Talal Albacha</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=238484</id>
		<title>OWASP Top 5 Machine Learning Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=238484"/>
				<updated>2018-03-11T07:18:05Z</updated>
		
		<summary type="html">&lt;p&gt;Talal Albacha: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
==The OWASP Top 5 Machine Learning Risks==&lt;br /&gt;
The idea is to build the required resources which help software security community to understand the emerging technology of machine learning and how it is related to security, warn them about the risk associated with using ML, and discuss the defending techniques.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Machine Learning has recently re-emerged as a powerful tool in multiple business sectors. It also becomes vital when it is harnessed for the Security services and applications like Fraud Detection, Anomaly Detection, Behavioral Analysis, etc.&lt;br /&gt;
&lt;br /&gt;
Although these applications have huge success, there are still security risks associated with the learning technique especially the security of the learning phase; which can still be vulnerable to threats originated by potential adversaries, and consequently it has considerable impact on their prediction results &lt;br /&gt;
&lt;br /&gt;
This project will list these risks and the defending techniques&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 5 Machine Learning Risks project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project News ==&lt;br /&gt;
&lt;br /&gt;
March 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* New member joined: Sereysethy Touch: Teaching Assistant in Faculty of Computer Science at University of Namur, Belgium.&lt;br /&gt;
* Second meeting held (Talal, Prabhant and Sethy)&lt;br /&gt;
&lt;br /&gt;
February 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* First meeting held (Talal, Jean- Noël and Prabhant)&lt;br /&gt;
* Project content to be updated on google docs until we come up with the first draft, then it will be available on the wiki and github pages.&lt;br /&gt;
&lt;br /&gt;
January 2018:&amp;lt;br /&amp;gt;&lt;br /&gt;
2 members joined the team: &lt;br /&gt;
* Jean-Noël Colin: Professor in CS Faculty of University of Namur, Belgium, working in the broad field of information security, and more recently, looking at using ML methods for security purposes&lt;br /&gt;
* Prabhant Singh: Master student at University of Tartu, currently researching on secure and reliable machine learning. have been associated with owasp from last 2 years. &lt;br /&gt;
&lt;br /&gt;
September 2017:&amp;lt;br /&amp;gt;&lt;br /&gt;
* Project introduction in webinar (attached)&lt;br /&gt;
[[File:Https://www.owasp.org/index.php/File:Machine Learning for Application Security Professionals.pdf|thumb]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
{| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
This project requires a lot of participations from data scientists, ML experts, software developers, risk managers and application security specialists. Please make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. The first contributors to the project were: &lt;br /&gt;
&lt;br /&gt;
* Project Leader: [[User:Talal Albacha|Talal Albacha]]&lt;br /&gt;
* [[Https://www.linkedin.com/in/jncolin/|Prof. Jean-Noël Colin]]&lt;br /&gt;
* [Https://twitter.com/prabhantsingh Prabhant Singh]  &lt;br /&gt;
* ..[your name]..  &lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
We will have ANNUAL release of the up-to-date top 5 risks, organized as following:&lt;br /&gt;
* Draft version&lt;br /&gt;
* Community responses&lt;br /&gt;
* Validate in AppSec conference&lt;br /&gt;
* Release final list for the year.&lt;br /&gt;
&lt;br /&gt;
As of September 2017, the topics priorities are:&lt;br /&gt;
** Machine Learning Introduction&lt;br /&gt;
*** What are the available machine learning platforms?&lt;br /&gt;
*** Are there any security vulnerabilities associated with these platforms?&lt;br /&gt;
** Usage of Machine Learning in Security&lt;br /&gt;
*** Can AI be used to reduce false positive findings in security scanners?&lt;br /&gt;
*** Fraud Detection...&lt;br /&gt;
** Security  of Machine learning&lt;br /&gt;
*** ML Learning phase&lt;br /&gt;
*** How to securely feed data to ML and AI tools&lt;br /&gt;
*** How to make learning algorithms aware of malicious data?&lt;br /&gt;
** Top 5 risks&lt;br /&gt;
** Defending techniques&lt;br /&gt;
** References and Additional Resources&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Talal Albacha</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=238483</id>
		<title>OWASP Top 5 Machine Learning Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=238483"/>
				<updated>2018-03-11T06:50:26Z</updated>
		
		<summary type="html">&lt;p&gt;Talal Albacha: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
==The OWASP Top 5 Machine Learning Risks==&lt;br /&gt;
The idea is to build the required resources which help software security community to understand the emerging technology of machine learning and how it is related to security, warn them about the risk associated with using ML, and discuss the defending techniques.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Machine Learning has recently re-emerged as a powerful tool in multiple business sectors. It also becomes vital when it is harnessed for the Security services and applications like Fraud Detection, Anomaly Detection, Behavioral Analysis, etc.&lt;br /&gt;
&lt;br /&gt;
Although these applications have huge success, there are still security risks associated with the learning technique especially the security of the learning phase; which can still be vulnerable to threats originated by potential adversaries, and consequently it has considerable impact on their prediction results &lt;br /&gt;
&lt;br /&gt;
This project will list these risks and the defending techniques&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 5 Machine Learning Risks project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Project News ==&lt;br /&gt;
&lt;br /&gt;
March 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* New member joined: Sereysethy Touch: Teaching Assistant in Faculty of Computer Science at University of Namur, Belgium.&lt;br /&gt;
* Second meeting held (Talal, Prabhant and Sethy)&lt;br /&gt;
&lt;br /&gt;
February 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* First meeting held (Talal, Jean- Noël and Prabhant)&lt;br /&gt;
* Project content to be updated on google docs until we come up with the first draft, then it will be available on the wiki and github pages.&lt;br /&gt;
&lt;br /&gt;
January 2018:&amp;lt;br /&amp;gt;&lt;br /&gt;
2 members joined the team: &lt;br /&gt;
* Jean-Noël Colin: Professor in CS Faculty of University of Namur, Belgium, working in the broad field of information security, and more recently, looking at using ML methods for security purposes&lt;br /&gt;
* Prabhant Singh: Master student at University of Tartu, currently researching on secure and reliable machine learning. have been associated with owasp from last 2 years. &lt;br /&gt;
&lt;br /&gt;
September 2017:&amp;lt;br /&amp;gt;&lt;br /&gt;
* Project introduction in webinar (attached)&lt;br /&gt;
[[File:Https://www.owasp.org/index.php/File:Machine Learning for Application Security Professionals.pdf|thumb]]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
{| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
This project requires a lot of participations from data scientists, ML experts, software developers, risk managers and application security specialists. Please make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. The first contributors to the project were: &lt;br /&gt;
&lt;br /&gt;
* Project Leader: [[User:Talal Albacha|Talal Albacha]]&lt;br /&gt;
* [[Https://www.linkedin.com/in/jncolin/|Prof. Jean-Noël Colin]]&lt;br /&gt;
* [Https://twitter.com/prabhantsingh Prabhant Singh]  &lt;br /&gt;
* ..[your name]..  &lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
We will have ANNUAL release of the up-to-date top 5 risks, organized as following:&lt;br /&gt;
* Draft version&lt;br /&gt;
* Community responses&lt;br /&gt;
* Validate in AppSec conference&lt;br /&gt;
* Release final list for the year.&lt;br /&gt;
&lt;br /&gt;
As of September 2017, the topics priorities are:&lt;br /&gt;
** Machine Learning Introduction&lt;br /&gt;
*** What are the available machine learning platforms?&lt;br /&gt;
*** Are there any security vulnerabilities associated with these platforms?&lt;br /&gt;
** Usage of Machine Learning in Security&lt;br /&gt;
*** Can AI be used to reduce false positive findings in security scanners?&lt;br /&gt;
*** Fraud Detection...&lt;br /&gt;
** Security  of Machine learning&lt;br /&gt;
*** ML Learning phase&lt;br /&gt;
*** How to securely feed data to ML and AI tools&lt;br /&gt;
*** How to make learning algorithms aware of malicious data?&lt;br /&gt;
** Top 5 risks&lt;br /&gt;
** Defending techniques&lt;br /&gt;
** References and Additional Resources&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Talal Albacha</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=238482</id>
		<title>OWASP Top 5 Machine Learning Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=238482"/>
				<updated>2018-03-11T06:49:43Z</updated>
		
		<summary type="html">&lt;p&gt;Talal Albacha: add latest news&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
==The OWASP Top 5 Machine Learning Risks==&lt;br /&gt;
The idea is to build the required resources which help software security community to understand the emerging technology of machine learning and how it is related to security, warn them about the risk associated with using ML, and discuss the defending techniques.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Machine Learning has recently re-emerged as a powerful tool in multiple business sectors. It also becomes vital when it is harnessed for the Security services and applications like Fraud Detection, Anomaly Detection, Behavioral Analysis, etc.&lt;br /&gt;
&lt;br /&gt;
Although these applications have huge success, there are still security risks associated with the learning technique especially the security of the learning phase; which can still be vulnerable to threats originated by potential adversaries, and consequently it has considerable impact on their prediction results &lt;br /&gt;
&lt;br /&gt;
This project will list these risks and the defending techniques&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 5 Machine Learning Risks project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
Project News:&amp;lt;br /&amp;gt;&lt;br /&gt;
March 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* New member joined: Sereysethy Touch: Teaching Assistant in Faculty of Computer Science at University of Namur, Belgium.&lt;br /&gt;
* Second meeting held (Talal, Prabhant and Sethy)&lt;br /&gt;
&lt;br /&gt;
February 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* First meeting held (Talal, Jean- Noël and Prabhant)&lt;br /&gt;
* Project content to be updated on google docs until we come up with the first draft, then it will be available on the wiki and github pages.&lt;br /&gt;
&lt;br /&gt;
January 2018:&amp;lt;br /&amp;gt;&lt;br /&gt;
2 members joined the team: &lt;br /&gt;
* Jean-Noël Colin: Professor in CS Faculty of University of Namur, Belgium, working in the broad field of information security, and more recently, looking at using ML methods for security purposes&lt;br /&gt;
* Prabhant Singh: Master student at University of Tartu, currently researching on secure and reliable machine learning. have been associated with owasp from last 2 years. &lt;br /&gt;
&lt;br /&gt;
September 2017:&amp;lt;br /&amp;gt;&lt;br /&gt;
* Project introduction in webinar (attached)&lt;br /&gt;
[[File:Https://www.owasp.org/index.php/File:Machine Learning for Application Security Professionals.pdf|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
{| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
This project requires a lot of participations from data scientists, ML experts, software developers, risk managers and application security specialists. Please make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. The first contributors to the project were: &lt;br /&gt;
&lt;br /&gt;
* Project Leader: [[User:Talal Albacha|Talal Albacha]]&lt;br /&gt;
* [[Https://www.linkedin.com/in/jncolin/|Prof. Jean-Noël Colin]]&lt;br /&gt;
* [Https://twitter.com/prabhantsingh Prabhant Singh]  &lt;br /&gt;
* ..[your name]..  &lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
We will have ANNUAL release of the up-to-date top 5 risks, organized as following:&lt;br /&gt;
* Draft version&lt;br /&gt;
* Community responses&lt;br /&gt;
* Validate in AppSec conference&lt;br /&gt;
* Release final list for the year.&lt;br /&gt;
&lt;br /&gt;
As of September 2017, the topics priorities are:&lt;br /&gt;
** Machine Learning Introduction&lt;br /&gt;
*** What are the available machine learning platforms?&lt;br /&gt;
*** Are there any security vulnerabilities associated with these platforms?&lt;br /&gt;
** Usage of Machine Learning in Security&lt;br /&gt;
*** Can AI be used to reduce false positive findings in security scanners?&lt;br /&gt;
*** Fraud Detection...&lt;br /&gt;
** Security  of Machine learning&lt;br /&gt;
*** ML Learning phase&lt;br /&gt;
*** How to securely feed data to ML and AI tools&lt;br /&gt;
*** How to make learning algorithms aware of malicious data?&lt;br /&gt;
** Top 5 risks&lt;br /&gt;
** Defending techniques&lt;br /&gt;
** References and Additional Resources&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Talal Albacha</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=238481</id>
		<title>OWASP Top 5 Machine Learning Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=238481"/>
				<updated>2018-03-11T06:46:47Z</updated>
		
		<summary type="html">&lt;p&gt;Talal Albacha: /* News and Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
==The OWASP Top 5 Machine Learning Risks==&lt;br /&gt;
The idea is to build the required resources which help software security community to understand the emerging technology of machine learning and how it is related to security, warn them about the risk associated with using ML, and discuss the defending techniques.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Machine Learning has recently re-emerged as a powerful tool in multiple business sectors. It also becomes vital when it is harnessed for the Security services and applications like Fraud Detection, Anomaly Detection, Behavioral Analysis, etc.&lt;br /&gt;
&lt;br /&gt;
Although these applications have huge success, there are still security risks associated with the learning technique especially the security of the learning phase; which can still be vulnerable to threats originated by potential adversaries, and consequently it has considerable impact on their prediction results &lt;br /&gt;
&lt;br /&gt;
This project will list these risks and the defending techniques&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 5 Machine Learning Risks project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
Project News:&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
September 2017:&amp;lt;br /&amp;gt;&lt;br /&gt;
* Project introduction in webinar (attached)&lt;br /&gt;
[[File:Https://www.owasp.org/index.php/File:Machine Learning for Application Security Professionals.pdf|thumb]]&lt;br /&gt;
&lt;br /&gt;
January 2018:&amp;lt;br /&amp;gt;&lt;br /&gt;
2 members joined the team: &lt;br /&gt;
* Jean-Noël Colin: Professor in CS Faculty of University of Namur, Belgium, working in the broad field of information security, and more recently, looking at using ML methods for security purposes&lt;br /&gt;
* Prabhant Singh: Master student at University of Tartu, currently researching on secure and reliable machine learning. have been associated with owasp from last 2 years. &lt;br /&gt;
&lt;br /&gt;
February 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* First meeting held (Talal, Jean- Noël and Prabhant)&lt;br /&gt;
* Project content to be updated on google docs until we come up with the first draft, then it will be available on the wiki and github pages.&lt;br /&gt;
&lt;br /&gt;
March 2018: &amp;lt;br /&amp;gt;&lt;br /&gt;
* New member joined: Sereysethy Touch: Teaching Assistant in Faculty of Computer Science at University of Namur, Belgium.&lt;br /&gt;
* Second meeting held (Talal, Prabhant and Sethy)&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
{| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
This project requires a lot of participations from data scientists, ML experts, software developers, risk managers and application security specialists. Please make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. The first contributors to the project were: &lt;br /&gt;
&lt;br /&gt;
* Project Leader: [[User:Talal Albacha|Talal Albacha]]&lt;br /&gt;
* [[Https://www.linkedin.com/in/jncolin/|Prof. Jean-Noël Colin]]&lt;br /&gt;
* [Https://twitter.com/prabhantsingh Prabhant Singh]  &lt;br /&gt;
* ..[your name]..  &lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
We will have ANNUAL release of the up-to-date top 5 risks, organized as following:&lt;br /&gt;
* Draft version&lt;br /&gt;
* Community responses&lt;br /&gt;
* Validate in AppSec conference&lt;br /&gt;
* Release final list for the year.&lt;br /&gt;
&lt;br /&gt;
As of September 2017, the topics priorities are:&lt;br /&gt;
** Machine Learning Introduction&lt;br /&gt;
*** What are the available machine learning platforms?&lt;br /&gt;
*** Are there any security vulnerabilities associated with these platforms?&lt;br /&gt;
** Usage of Machine Learning in Security&lt;br /&gt;
*** Can AI be used to reduce false positive findings in security scanners?&lt;br /&gt;
*** Fraud Detection...&lt;br /&gt;
** Security  of Machine learning&lt;br /&gt;
*** ML Learning phase&lt;br /&gt;
*** How to securely feed data to ML and AI tools&lt;br /&gt;
*** How to make learning algorithms aware of malicious data?&lt;br /&gt;
** Top 5 risks&lt;br /&gt;
** Defending techniques&lt;br /&gt;
** References and Additional Resources&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Talal Albacha</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Machine_Learning_for_Application_Security_Professionals.pdf&amp;diff=238480</id>
		<title>File:Machine Learning for Application Security Professionals.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Machine_Learning_for_Application_Security_Professionals.pdf&amp;diff=238480"/>
				<updated>2018-03-11T01:18:51Z</updated>
		
		<summary type="html">&lt;p&gt;Talal Albacha: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;webinar about the project&lt;/div&gt;</summary>
		<author><name>Talal Albacha</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Talal_Albacha&amp;diff=238472</id>
		<title>User:Talal Albacha</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Talal_Albacha&amp;diff=238472"/>
				<updated>2018-03-10T09:23:44Z</updated>
		
		<summary type="html">&lt;p&gt;Talal Albacha: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Talal has more than 15 years of experince in Software Industry. He created and managed highly successful teams in two main areas of Enterprise Applications Development and Application Security Consulting in EMEA region. In addition, he has strong academic background on Artificial Intelligence and Machine Learning. &lt;br /&gt;
Some of the roles he did: developer, senior developer, product manager, applications development manager, lecturer, researcher, speaker, senior applications security consultant, manager of application security consulting service in chief security office. &lt;br /&gt;
&lt;br /&gt;
Specialties:&lt;br /&gt;
- Software Intelligence (Machine Learning, Predictive algorithms)&lt;br /&gt;
- Application Security (Security Solutions, Secure Code Reviews, Design Security Review..)&lt;br /&gt;
- Software Development Management (Strategic planning, Agile methodology..)&lt;br /&gt;
&lt;br /&gt;
OWASP contributions include:&lt;br /&gt;
* Organized Machine Learning and Security working session in OWASP Summit 2017 (https://owaspsummit.org/Working-Sessions/Research/Using-ML-and-AI-to-detect-attacks.html)  &lt;br /&gt;
* [OWASP Projects Review during OWASP AppSec EU 2017 in Belfast] (&amp;lt;nowiki&amp;gt;https://2017.appsec.eu/program/project-reviews&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
* &amp;quot;Cyber Security for Financial Industry&amp;quot; talk in TSAM London 2017.&lt;br /&gt;
* OWASP GSOC 2014 Mentor (review initial stage projects).&lt;br /&gt;
* OWASP Syria Chapter Leader (2010-2015)&lt;br /&gt;
* &amp;quot;OWASP top ten &amp;amp; Payments Application Security&amp;quot; talk (Payment Risk Forum - Beirut - April/2011)&lt;br /&gt;
* Arabic translation for couple of OWASP newsletters in 2010&lt;br /&gt;
* &amp;quot;Application Security &amp;amp; OWASP top ten&amp;quot; talk (6th ICT Security Forum - Damascus - October/2010)&lt;/div&gt;</summary>
		<author><name>Talal Albacha</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Talal_Albacha&amp;diff=238471</id>
		<title>User:Talal Albacha</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Talal_Albacha&amp;diff=238471"/>
				<updated>2018-03-10T08:50:24Z</updated>
		
		<summary type="html">&lt;p&gt;Talal Albacha: minor update&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Talal has more than 15 years of experince in Software Industry and Academia. He created and managed Enterprise Applications Development and Application Security Consulting teams in EMEA region. He has also strong academic background on Artificial Intelligence and Machine Learning. &lt;br /&gt;
Some of the roles he did: developer, senior developer, product manager, applications development manager, lecturer, researcher, speaker, senior applications security consultant, manager of application security consulting service in chief security office. &lt;br /&gt;
&lt;br /&gt;
Specialties:&lt;br /&gt;
- Software Intelligence (Machine Learning, Predictive algorithms)&lt;br /&gt;
- Application Security (Security Solutions, Secure Code Reviews, Design Security Review..)&lt;br /&gt;
- Software Development Management (Strategic planning, Agile methodology..)&lt;br /&gt;
&lt;br /&gt;
OWASP contributions include:&lt;br /&gt;
* Organized Machine Learning and Security working session in OWASP Summit 2017 (https://owaspsummit.org/Working-Sessions/Research/Using-ML-and-AI-to-detect-attacks.html)  &lt;br /&gt;
* [OWASP Projects Review during OWASP AppSec EU 2017 in Belfast] (&amp;lt;nowiki&amp;gt;https://2017.appsec.eu/program/project-reviews&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
* &amp;quot;Cyber Security for Financial Industry&amp;quot; talk in TSAM London 2017.&lt;br /&gt;
* OWASP GSOC 2014 Mentor (review initial stage projects).&lt;br /&gt;
* OWASP Syria Chapter Leader (2010-2015)&lt;br /&gt;
* &amp;quot;OWASP top ten &amp;amp; Payments Application Security&amp;quot; talk (Payment Risk Forum - Beirut - April/2011)&lt;br /&gt;
* Arabic translation for couple of OWASP newsletters in 2010&lt;br /&gt;
* &amp;quot;Application Security &amp;amp; OWASP top ten&amp;quot; talk (6th ICT Security Forum - Damascus - October/2010)&lt;/div&gt;</summary>
		<author><name>Talal Albacha</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=238182</id>
		<title>OWASP Top 5 Machine Learning Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=238182"/>
				<updated>2018-02-28T20:31:29Z</updated>
		
		<summary type="html">&lt;p&gt;Talal Albacha: /* Classifications */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
==The OWASP Top 5 Machine Learning Risks==&lt;br /&gt;
The idea is to build the required resources which help software security community to understand the emerging technology of machine learning and how it is related to security, warn them about the risk associated with using ML, and discuss the defending techniques.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Machine Learning has recently re-emerged as a powerful tool in multiple business sectors. It also becomes vital when it is harnessed for the Security services and applications like Fraud Detection, Anomaly Detection, Behavioral Analysis, etc.&lt;br /&gt;
&lt;br /&gt;
Although these applications have huge success, there are still security risks associated with the learning technique especially the security of the learning phase; which can still be vulnerable to threats originated by potential adversaries, and consequently it has considerable impact on their prediction results &lt;br /&gt;
&lt;br /&gt;
This project will list these risks and the defending techniques&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 5 Machine Learning Risks project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
{| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
This project requires a lot of participations from data scientists, ML experts, software developers, risk managers and application security specialists. Please make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. The first contributors to the project were: &lt;br /&gt;
&lt;br /&gt;
* Project Leader: [[User:Talal Albacha|Talal Albacha]]&lt;br /&gt;
* [[Https://www.linkedin.com/in/jncolin/|Prof. Jean-Noël Colin]]&lt;br /&gt;
* [Https://twitter.com/prabhantsingh Prabhant Singh]  &lt;br /&gt;
* ..[your name]..  &lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
We will have ANNUAL release of the up-to-date top 5 risks, organized as following:&lt;br /&gt;
* Draft version&lt;br /&gt;
* Community responses&lt;br /&gt;
* Validate in AppSec conference&lt;br /&gt;
* Release final list for the year.&lt;br /&gt;
&lt;br /&gt;
As of September 2017, the topics priorities are:&lt;br /&gt;
** Machine Learning Introduction&lt;br /&gt;
*** What are the available machine learning platforms?&lt;br /&gt;
*** Are there any security vulnerabilities associated with these platforms?&lt;br /&gt;
** Usage of Machine Learning in Security&lt;br /&gt;
*** Can AI be used to reduce false positive findings in security scanners?&lt;br /&gt;
*** Fraud Detection...&lt;br /&gt;
** Security  of Machine learning&lt;br /&gt;
*** ML Learning phase&lt;br /&gt;
*** How to securely feed data to ML and AI tools&lt;br /&gt;
*** How to make learning algorithms aware of malicious data?&lt;br /&gt;
** Top 5 risks&lt;br /&gt;
** Defending techniques&lt;br /&gt;
** References and Additional Resources&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Talal Albacha</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=238059</id>
		<title>OWASP Top 5 Machine Learning Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=238059"/>
				<updated>2018-02-23T23:47:40Z</updated>
		
		<summary type="html">&lt;p&gt;Talal Albacha: /* Presentation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
==The OWASP Top 5 Machine Learning Risks==&lt;br /&gt;
The idea is to build the required resources which help software security community to understand the emerging technology of machine learning and how it is related to security, warn them about the risk associated with using ML, and discuss the defending techniques.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Machine Learning has recently re-emerged as a powerful tool in multiple business sectors. It also becomes vital when it is harnessed for the Security services and applications like Fraud Detection, Anomaly Detection, Behavioral Analysis, etc.&lt;br /&gt;
&lt;br /&gt;
Although these applications have huge success, there are still security risks associated with the learning technique especially the security of the learning phase; which can still be vulnerable to threats originated by potential adversaries, and consequently it has considerable impact on their prediction results &lt;br /&gt;
&lt;br /&gt;
This project will list these risks and the defending techniques&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 5 Machine Learning Risks project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
{| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
This project requires a lot of participations from data scientists, ML experts, software developers, risk managers and application security specialists. Please make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. The first contributors to the project were: &lt;br /&gt;
&lt;br /&gt;
* Project Leader: [[User:Talal Albacha|Talal Albacha]]&lt;br /&gt;
* [[Https://www.linkedin.com/in/jncolin/|Prof. Jean-Noël Colin]]&lt;br /&gt;
* [Https://twitter.com/prabhantsingh Prabhant Singh]  &lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
We will have ANNUAL release of the up-to-date top 5 risks, organized as following:&lt;br /&gt;
* Draft version&lt;br /&gt;
* Community responses&lt;br /&gt;
* Validate in AppSec conference&lt;br /&gt;
* Release final list for the year.&lt;br /&gt;
&lt;br /&gt;
As of September 2017, the topics priorities are:&lt;br /&gt;
** Machine Learning Introduction&lt;br /&gt;
*** What are the available machine learning platforms?&lt;br /&gt;
*** Are there any security vulnerabilities associated with these platforms?&lt;br /&gt;
** Usage of Machine Learning in Security&lt;br /&gt;
*** Can AI be used to reduce false positive findings in security scanners?&lt;br /&gt;
*** Fraud Detection...&lt;br /&gt;
** Security  of Machine learning&lt;br /&gt;
*** ML Learning phase&lt;br /&gt;
*** How to securely feed data to ML and AI tools&lt;br /&gt;
*** How to make learning algorithms aware of malicious data?&lt;br /&gt;
** Top 5 risks&lt;br /&gt;
** Defending techniques&lt;br /&gt;
** References and Additional Resources&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Talal Albacha</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=237845</id>
		<title>OWASP Top 5 Machine Learning Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=237845"/>
				<updated>2018-02-16T23:00:22Z</updated>
		
		<summary type="html">&lt;p&gt;Talal Albacha: /* Presentation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
==The OWASP Top 5 Machine Learning Risks==&lt;br /&gt;
The idea is to build the required resources which help software security community to understand the emerging technology of machine learning and how it is related to security, warn them about the risk associated with using ML, and discuss the defending techniques.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Machine Learning has recently re-emerged as a powerful tool in multiple business sectors. It also becomes vital when it is harnessed for the Security services and applications like Fraud Detection, Anomaly Detection, Behavioral Analysis, etc.&lt;br /&gt;
&lt;br /&gt;
Although these applications have huge success, there are still security risks associated with the learning technique especially the security of the learning phase; which can still be vulnerable to threats originated by potential adversaries, and consequently it has considerable impact on their prediction results &lt;br /&gt;
&lt;br /&gt;
This project will list these risks and the defending techniques&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 5 Machine Learning Risks project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Talal Albacha]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
{| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
This project requires a lot of participations from data scientists, ML experts, software developers, risk managers and application security specialists. Please make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. The first contributors to the project were: &lt;br /&gt;
&lt;br /&gt;
* [[User:Talal Albacha]]&lt;br /&gt;
* [[Https://www.linkedin.com/in/jncolin/|Prof. Jean-Noël Colin]]&lt;br /&gt;
* [Https://twitter.com/prabhantsingh Prabhant Singh]  &lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
We will have ANNUAL release of the up-to-date top 5 risks, organized as following:&lt;br /&gt;
* Draft version&lt;br /&gt;
* Community responses&lt;br /&gt;
* Validate in AppSec conference&lt;br /&gt;
* Release final list for the year.&lt;br /&gt;
&lt;br /&gt;
As of September 2017, the topics priorities are:&lt;br /&gt;
** Machine Learning Introduction&lt;br /&gt;
*** What are the available machine learning platforms?&lt;br /&gt;
*** Are there any security vulnerabilities associated with these platforms?&lt;br /&gt;
** Usage of Machine Learning in Security&lt;br /&gt;
*** Can AI be used to reduce false positive findings in security scanners?&lt;br /&gt;
*** Fraud Detection...&lt;br /&gt;
** Security  of Machine learning&lt;br /&gt;
*** ML Learning phase&lt;br /&gt;
*** How to securely feed data to ML and AI tools&lt;br /&gt;
*** How to make learning algorithms aware of malicious data?&lt;br /&gt;
** Top 5 risks&lt;br /&gt;
** Defending techniques&lt;br /&gt;
** References and Additional Resources&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Talal Albacha</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=237844</id>
		<title>OWASP Top 5 Machine Learning Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=237844"/>
				<updated>2018-02-16T22:57:45Z</updated>
		
		<summary type="html">&lt;p&gt;Talal Albacha: /* FAQs */ adding the contributors&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
==The OWASP Top 5 Machine Learning Risks==&lt;br /&gt;
The idea is to build the required resources which help software security community to understand the emerging technology of machine learning and how it is related to security, warn them about the risk associated with using ML, and discuss the defending techniques.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Machine Learning has recently re-emerged as a powerful tool in multiple business sectors. It also becomes vital when it is harnessed for the Security services and applications like Fraud Detection, Anomaly Detection, Behavioral Analysis, etc.&lt;br /&gt;
&lt;br /&gt;
Although these applications have huge success, there are still security risks associated with the learning technique especially the security of the learning phase; which can still be vulnerable to threats originated by potential adversaries, and consequently it has considerable impact on their prediction results &lt;br /&gt;
&lt;br /&gt;
This project will list these risks and the defending techniques&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 5 Machine Learning Risks project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Talal Albacha: I have long experience in the application security field and I have strong academic background in machine learning.&lt;br /&gt;
* [[User:Talal Albacha]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
{| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
This project requires a lot of participations from data scientists, ML experts, software developers, risk managers and application security specialists. Please make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. The first contributors to the project were: &lt;br /&gt;
&lt;br /&gt;
* [[User:Talal Albacha]]&lt;br /&gt;
* [[Https://www.linkedin.com/in/jncolin/|Prof. Jean-Noël Colin]]&lt;br /&gt;
* [Https://twitter.com/prabhantsingh Prabhant Singh]  &lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
We will have ANNUAL release of the up-to-date top 5 risks, organized as following:&lt;br /&gt;
* Draft version&lt;br /&gt;
* Community responses&lt;br /&gt;
* Validate in AppSec conference&lt;br /&gt;
* Release final list for the year.&lt;br /&gt;
&lt;br /&gt;
As of September 2017, the topics priorities are:&lt;br /&gt;
** Machine Learning Introduction&lt;br /&gt;
*** What are the available machine learning platforms?&lt;br /&gt;
*** Are there any security vulnerabilities associated with these platforms?&lt;br /&gt;
** Usage of Machine Learning in Security&lt;br /&gt;
*** Can AI be used to reduce false positive findings in security scanners?&lt;br /&gt;
*** Fraud Detection...&lt;br /&gt;
** Security  of Machine learning&lt;br /&gt;
*** ML Learning phase&lt;br /&gt;
*** How to securely feed data to ML and AI tools&lt;br /&gt;
*** How to make learning algorithms aware of malicious data?&lt;br /&gt;
** Top 5 risks&lt;br /&gt;
** Defending techniques&lt;br /&gt;
** References and Additional Resources&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Talal Albacha</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Talal_Albacha&amp;diff=232912</id>
		<title>User:Talal Albacha</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Talal_Albacha&amp;diff=232912"/>
				<updated>2017-09-06T07:21:05Z</updated>
		
		<summary type="html">&lt;p&gt;Talal Albacha: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Long experience in Enterprise Applications Development Management, Application Security and Software Intelligence in EMEA region. &lt;br /&gt;
Consultant roles in multiple projects.&lt;br /&gt;
Strong Academic background&lt;br /&gt;
Distinctive training, conferences and certificates&lt;br /&gt;
Speaker in regional conferences&lt;br /&gt;
&lt;br /&gt;
Specialties:&lt;br /&gt;
- Software Intelligence (Machine Learning, Predictive algorithms)&lt;br /&gt;
- Application Security (Security Solutions, Secure Code Reviews, Design Security Review..)&lt;br /&gt;
- Software Development Management (Strategic planning, Agile methodology..)&lt;br /&gt;
&lt;br /&gt;
OWASP contributions include:&lt;br /&gt;
* Organized Machine Learning and Security working session in OWASP Summit 2017 (https://owaspsummit.org/Working-Sessions/Research/Using-ML-and-AI-to-detect-attacks.html)  &lt;br /&gt;
* [OWASP Projects Review during OWASP AppSec EU 2017 in Belfast] (&amp;lt;nowiki&amp;gt;https://2017.appsec.eu/program/project-reviews&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
* &amp;quot;Cyber Security for Financial Industry&amp;quot; talk in TSAM London 2017.&lt;br /&gt;
* OWASP GSOC 2014 Mentor (review initial stage projects).&lt;br /&gt;
* OWASP Syria Chapter Leader (2010-2015)&lt;br /&gt;
* &amp;quot;OWASP top ten &amp;amp; Payments Application Security&amp;quot; talk (Payment Risk Forum - Beirut - April/2011)&lt;br /&gt;
* Arabic translation for couple of OWASP newsletters in 2010&lt;br /&gt;
* &amp;quot;Application Security &amp;amp; OWASP top ten&amp;quot; talk (6th ICT Security Forum - Damascus - October/2010)&lt;/div&gt;</summary>
		<author><name>Talal Albacha</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=232911</id>
		<title>OWASP Top 5 Machine Learning Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=232911"/>
				<updated>2017-09-06T07:08:23Z</updated>
		
		<summary type="html">&lt;p&gt;Talal Albacha: updated the FAQs section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
==The OWASP Top 5 Machine Learning Risks==&lt;br /&gt;
The idea is to build the required resources which help software security community to understand the emerging technology of machine learning and how it is related to security, warn them about the risk associated with using ML, and discuss the defending techniques.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Machine Learning has recently re-emerged as a powerful tool in multiple business sectors, especially when it is used for Predictive Analytics at the scale of Big Data. This technique becomes vital when it is harnessed for the Security services and applications like Fraud Detection, Anomaly Detection, Behavioral Analysis, etc.&lt;br /&gt;
&lt;br /&gt;
Although these applications have huge success, there are security risks associated with the learning technique especially the security of the learning phase; which can still be vulnerable to threats originated by potential adversaries, and consequently it has considerable impact on their prediction results &lt;br /&gt;
&lt;br /&gt;
This project will list these risks and the defending techniques&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 5 Machine Learning Risks project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Talal Albacha: I have long experience in the application security field and I have strong academic background in machine learning.&lt;br /&gt;
* [[User:Talal Albacha]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
{| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
This project requires a lot of participations from data scientists, ML experts, software developers, risk managers and application security specialists. Please make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key.  &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. The first contributors to the project were: &lt;br /&gt;
&lt;br /&gt;
* [[User:Talal Albacha]]&lt;br /&gt;
* '''YOUR NAME BELONGS HERE'''&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
We will have ANNUAL release of the up-to-date top 5 risks, organized as following:&lt;br /&gt;
* Draft version&lt;br /&gt;
* Community responses&lt;br /&gt;
* Validate in AppSec conference&lt;br /&gt;
* Release final list for the year.&lt;br /&gt;
&lt;br /&gt;
As of September 2017, the topics priorities are:&lt;br /&gt;
** Machine Learning Introduction&lt;br /&gt;
*** What are the available machine learning platforms?&lt;br /&gt;
*** Are there any security vulnerabilities associated with these platforms?&lt;br /&gt;
** Usage of Machine Learning in Security&lt;br /&gt;
*** Can AI be used to reduce false positive findings in security scanners?&lt;br /&gt;
*** Fraud Detection...&lt;br /&gt;
** Security  of Machine learning&lt;br /&gt;
*** ML Learning phase&lt;br /&gt;
*** How to securely feed data to ML and AI tools&lt;br /&gt;
*** How to make learning algorithms aware of malicious data?&lt;br /&gt;
** Top 5 risks&lt;br /&gt;
** Defending techniques&lt;br /&gt;
** References and Additional Resources&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Talal Albacha</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=232828</id>
		<title>OWASP Top 5 Machine Learning Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=232828"/>
				<updated>2017-09-03T03:25:03Z</updated>
		
		<summary type="html">&lt;p&gt;Talal Albacha: updated more sections&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
==The OWASP Top 5 Machine Learning Risks==&lt;br /&gt;
The idea is to build the required resources which help software security community to understand the emerging technology of machine learning and how it is related to security, warn them about the risk associated with using ML, and discuss the defending techniques.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Machine Learning has recently re-emerged as a powerful tool in multiple business sectors, especially when it is used for Predictive Analytics at the scale of Big Data. This technique becomes vital when it is harnessed for the Security services and applications like Fraud Detection, Anomaly Detection, Behavioral Analysis, etc.&lt;br /&gt;
&lt;br /&gt;
Although these applications have huge success, there are security risks associated with the learning technique especially the security of the learning phase; which can still be vulnerable to threats originated by potential adversaries, and consequently it has considerable impact on their prediction results &lt;br /&gt;
&lt;br /&gt;
This project will list these risks and the defending techniques&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 5 Machine Learning Risks project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Talal Albacha: I have long experience in the application security field and I have strong academic background in machine learning.&lt;br /&gt;
* [[User:Talal Albacha]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
{| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. The first contributors to the project were: &lt;br /&gt;
&lt;br /&gt;
* [[User:Talal Albacha]]&lt;br /&gt;
* '''YOUR NAME BELONGS HERE'''&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
We will have ANNUAL release of the up-to-date top 5 risks, organized as following:&lt;br /&gt;
* Draft version&lt;br /&gt;
* Community responses&lt;br /&gt;
* Validate in AppSec conference&lt;br /&gt;
* Release final list for the year.&lt;br /&gt;
&lt;br /&gt;
As of September 2017, the topics priorities are:&lt;br /&gt;
** Machine Learning Introduction&lt;br /&gt;
*** What are the available machine learning platforms?&lt;br /&gt;
*** Are there any security vulnerabilities associated with these platforms?&lt;br /&gt;
** Usage of Machine Learning in Security&lt;br /&gt;
*** Can AI be used to reduce false positive findings in security scanners?&lt;br /&gt;
*** Fraud Detection...&lt;br /&gt;
** Security  of Machine learning&lt;br /&gt;
*** ML Learning phase&lt;br /&gt;
*** How to securely feed data to ML and AI tools&lt;br /&gt;
*** How to make learning algorithms aware of malicious data?&lt;br /&gt;
** Top 5 risks&lt;br /&gt;
** Defending techniques&lt;br /&gt;
** References and Additional Resources&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Talal Albacha</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=232824</id>
		<title>OWASP Top 5 Machine Learning Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_5_Machine_Learning_Risks&amp;diff=232824"/>
				<updated>2017-09-02T00:12:27Z</updated>
		
		<summary type="html">&lt;p&gt;Talal Albacha: Update major parts of the page.. still some sections needs to be updated&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
==The OWASP Top 5 Machine Learning Risks==&lt;br /&gt;
The idea is to build the required resources which help software security community to understand the emerging technology of machine learning and how it is related to security, warn them about the risk associated with using ML, and discuss the defending techniques.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Machine Learning has recently re-emerged as a powerful tool in multiple business sectors, especially when it is used for Predictive Analytics at the scale of Big Data. This technique becomes vital when it is harnessed for the Security services and applications like Fraud Detection, Anomaly Detection, Behavioral Analysis, etc.&lt;br /&gt;
&lt;br /&gt;
Although these applications have huge success, there are security risks associated with the learning technique especially the security of the learning phase; which can still be vulnerable to threats originated by potential adversaries, and consequently it has considerable impact on their prediction results &lt;br /&gt;
&lt;br /&gt;
This project will list these risks and the defending techniques&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 5 Machine Learning Risks project is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* Talal Albacha: I have long experience in the application security field and I have strong academic background in machine learning.&lt;br /&gt;
* [[User:Talal Albacha]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
{| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. The first contributors to the project were: &lt;br /&gt;
&lt;br /&gt;
* [[User:Talal Albacha]]&lt;br /&gt;
* '''YOUR NAME BELONGS HERE'''&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project roadmap is the envisioned plan for the project. The purpose of the roadmap is to help others understand where the project is going. It gives the community a chance to understand the context and the vision for the goal of the project. Additionally, if a project becomes inactive, or if the project is abandoned, a roadmap can help ensure a project can be adopted and continued under new leadership.&lt;br /&gt;
&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Roadmaps vary in detail from a broad outline to a fully detailed project charter. Generally speaking, projects with detailed roadmaps have tended to develop into successful projects. Some details that leaders may consider placing in the roadmap include: envisioned milestones, planned feature enhancements, essential conditions, project assumptions, development timelines, etc. You are required to have at least 4 milestones for every year the project is active. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We will have ANNUAL release of the up-to-date top 5 risks, organized as following:&lt;br /&gt;
* Draft version&lt;br /&gt;
* Community responses&lt;br /&gt;
* Validate in AppSec conference&lt;br /&gt;
* Release final list for the year.&lt;br /&gt;
As of October 2013, the priorities are:&lt;br /&gt;
* Finish the referencing for each principle.&lt;br /&gt;
* Update the Project Template.&lt;br /&gt;
* Use the OWASP Press to develop a book.&lt;br /&gt;
* Finish and publish the book on Lulu.&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Principles Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some of the principles.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing support for the book. &lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_Example_Project_About_Page}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Talal Albacha</name></author>	</entry>

	</feed>