<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Denver_August_2008_meeting</id>
		<title>Denver August 2008 meeting - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Denver_August_2008_meeting"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver_August_2008_meeting&amp;action=history"/>
		<updated>2026-04-19T05:11:57Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver_August_2008_meeting&amp;diff=38067&amp;oldid=prev</id>
		<title>Dc: August 2008 meeting: Dan Cornell: Static Analysis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver_August_2008_meeting&amp;diff=38067&amp;oldid=prev"/>
				<updated>2008-09-02T19:18:08Z</updated>
		
		<summary type="html">&lt;p&gt;August 2008 meeting: Dan Cornell: Static Analysis&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;=== Dan Cornell: Static Analysis Techniques for Testing Application Security ===&lt;br /&gt;
&lt;br /&gt;
Static Analysis of software refers to examining source code and other software artifacts without executing them. This presentation looks at how these techniques can be used to identify security defects in applications. Approaches examined will range from simple keyword search methods used to identify calls to banned functions through more sophisticated data flow analysis used to identify more complicated issues such as injection flaws. In addition, a demonstration will be given of two freely-available static analysis tools: FindBugs for the Java platform and FXCop for the .NET platform. Finally, some approaches will be presented on how organizations can start using static analysis tools as part of their development and quality assurance processes.&lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell''' has over ten years of experience architecting and developing web-based software systems. He leads Denim Group’s security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and is currently the San Antonio chapter leader of the Open Web Application Security Project (OWASP). He is a recognized expert in the area of web application security for SearchSoftwareQuality.com and the primary author of [http://www.owasp.org/index.php/Category:OWASP_Sprajax_Project Sprajax], OWASP’s open source tool for assessing the security of AJAX-enabled web applications.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/1/1d/DenimGroup_StaticAnalysisTechniquesForTestingApplicationSecurity_OWASPDenver_20080820.pdf Slide deck (PPT)]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Denver Back to OWASP Denver]&lt;/div&gt;</summary>
		<author><name>Dc</name></author>	</entry>

	</feed>