This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:OWASP IL 2012 Agenda"
| (8 intermediate revisions by the same user not shown) | |||
| Line 6: | Line 6: | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 09:15-09:45 | |style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 09:15-09:45 | ||
| align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''Opening Words''' <br> | | align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''Opening Words''' <br> | ||
| − | ''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP'' | + | ''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP''<br> |
| + | ''Dr. Anat Bremler-Barr, Efi Arazi School of Computer Science, IDC'' | ||
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 09:45-10:10 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 09:45-10:10 | ||
| Line 20: | Line 21: | ||
| align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" | '''The Diviner – Digital Clairvoyance: Getting an Insight<br>Into Server Code & Memory Using Blackbox Techniques''' <br> | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" | '''The Diviner – Digital Clairvoyance: Getting an Insight<br>Into Server Code & Memory Using Blackbox Techniques''' <br> | ||
''Shay Chen, CTO, Hacktics ASC, Ernst & Young''<br> | ''Shay Chen, CTO, Hacktics ASC, Ernst & Young''<br> | ||
| − | ''Eran | + | ''Eran Tamari, Team Leader, Hacktics ASC, Ernst & Young'' |
| − | | align="center" valign="top" style="font-size:11pt" | '''Case Study | + | | align="center" valign="top" style="font-size:11pt" | '''Case Study:<br>Providing Secure SDLC in an Agile Environment Using ESAPI ''' |
''Yair Rovek, Security Specialist, Liveperson'' | ''Yair Rovek, Security Specialist, Liveperson'' | ||
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
| Line 43: | Line 44: | ||
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
|style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 13:30-14:15 | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 13:30-14:15 | ||
| − | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | ''' | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''Advanced Pen-Testing of iPhone Applications''' |
| − | '' | + | ''Chilik Tamir, Chief Scientist, AppSec Labs '' |
| − | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | ''' | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''Positive Logic XSS Detection & Prevention<br>using Generalized JavaScript Assembly ''' |
| − | + | ''Tsvi Cherny, Interdisciplinary Center'' | |
| − | '' | ||
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
| − | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 14: | + | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 14:15-15:00 |
| − | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | ''' | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''Attacking Android Mobile Applications''' |
''Erez Metula, Founder, AppSec Labs'' | ''Erez Metula, Founder, AppSec Labs'' | ||
| − | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | ''' | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''Application Counter Attack''' |
| − | '' | + | ''Ziv Gadot, SOC Team Leader, Radware'' |
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
| − | |style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 15: | + | |style="border-style: solid; border-width: 1px;color:#1F497D" height="40" align="center" valign="center" | 15:00-15:15 |
| valign="center" align="center" style="border-style: solid; border-width: 1px;font-size:12pt" colspan="2" | '''Coffee Break''' | | valign="center" align="center" style="border-style: solid; border-width: 1px;font-size:12pt" colspan="2" | '''Coffee Break''' | ||
|- style="border-style: solid; border-width: 1px;font-size:10pt" | |- style="border-style: solid; border-width: 1px;font-size:10pt" | ||
| − | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 15: | + | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 15:15-15:45 |
| − | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | ''' | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''The Dark World of Mobile Payments''' |
| − | '' | + | ''Nir Valtman, CSO, Retalix'' |
| − | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''Identifying Maladvertisements''' | |
| − | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | ''' | + | ''Maty Siman, CTO, Checkmarx''<br>''Meny Duek, Director of R&D, Mediamind'' |
| − | '' | ||
|- style="font-size:10pt" | |- style="font-size:10pt" | ||
| − | |style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 16:15 | + | |style="border-style: solid; border-width: 1px;color:#1F497D" height="25" align="center" valign="center" | 15:45-16:15 |
| − | | align | + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''Stylish XSS: Fonts Name Injection''' |
| − | '' | + | ''Adi Cohen, Security Researcher, IBM'' |
| + | | align="center" valign="top" style="border-style: solid; border-width: 1px;font-size:11pt" cellpadding=5 | '''My Authentication Album:<br>Adaptive Image-Based Login Mechanism ''' | ||
| + | ''Ronen Margulis, Bar Ilan University'' | ||
|- style="font-size:10pt" | |- style="font-size:10pt" | ||
| − | |style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | | + | |style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 16:15-16:45 |
| + | | align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''Guest Lecture<br> <br>The New art of WAR & PEACE- a REAL FANTASY'''<br> A drill down to the "money time": Was Iran Stuxnet’s main target? how economy is a battle zone?<br> | ||
| + | ''Guy Phillip Goldstein (Author of "Babel Minute Zero")'' | ||
| + | |- style="font-size:10pt" | ||
| + | |style="border-style: solid; border-width: 1px;color:#1F497D" align="center" valign="center" | 16:45-17:00 | ||
| align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''End Notes''' | | align=center valign="center" colspan="2" style="border-style: solid; border-width: 1px;font-size:11pt" | '''End Notes''' | ||
''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP'' | ''Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP'' | ||
|} | |} | ||
Latest revision as of 17:07, 1 September 2012
| 08:45-09:15 | Registration, Gathering, Socializing & Networking | |
| 09:15-09:45 | Opening Words Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP | |
| 09:45-10:10 | OWASP Top 10 Hebrew Edition
Or Katz, OWASP Israel Board | |
| Breakers (Track #1) | Defenders (Track #2) | |
| 10:15-11:00 | The Diviner – Digital Clairvoyance: Getting an Insight Into Server Code & Memory Using Blackbox Techniques Shay Chen, CTO, Hacktics ASC, Ernst & Young |
Case Study: Providing Secure SDLC in an Agile Environment Using ESAPI Yair Rovek, Security Specialist, Liveperson |
| 11:00-11:15 | Coffee Break | |
| 11:15-12:00 | FYI: You've Got LFI
Tal Beery, Web Security Research Team Leader, Imperva |
I>S+D! – Integrated Application Security Testing (IAST), Beyond SAST/DAST Ofer Maor, CTO, Quotium |
| 12:00-12:30 | Zip It! – Owning Archived File Uploads
Alex Landa, Security Researcher, IBM |
Secure Development Lifecycle – Lessons Learned
Boaz Shunami, Founder, Komodo Consulting |
| 12:30-13:30 | Lunch Break | |
| 13:30-14:15 | Advanced Pen-Testing of iPhone Applications
Chilik Tamir, Chief Scientist, AppSec Labs |
Positive Logic XSS Detection & Prevention using Generalized JavaScript Assembly Tsvi Cherny, Interdisciplinary Center |
| 14:15-15:00 | Attacking Android Mobile Applications
Erez Metula, Founder, AppSec Labs |
Application Counter Attack
Ziv Gadot, SOC Team Leader, Radware |
| 15:00-15:15 | Coffee Break | |
| 15:15-15:45 | The Dark World of Mobile Payments
Nir Valtman, CSO, Retalix |
Identifying Maladvertisements
Maty Siman, CTO, Checkmarx |
| 15:45-16:15 | Stylish XSS: Fonts Name Injection
Adi Cohen, Security Researcher, IBM |
My Authentication Album: Adaptive Image-Based Login Mechanism Ronen Margulis, Bar Ilan University |
| 16:15-16:45 | Guest Lecture The New art of WAR & PEACE- a REAL FANTASY A drill down to the "money time": Was Iran Stuxnet’s main target? how economy is a battle zone? Guy Phillip Goldstein (Author of "Babel Minute Zero") | |
| 16:45-17:00 | End Notes
Ofer Maor - Chairman, OWASP Israel; Global Membership Committee, OWASP | |