This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "AppSec Europe 2006/Agenda"
(→OWASP Europe 2006 Conference Schedule) |
m (Protected "AppSec Europe 2006/Agenda" [edit=sysop:move=sysop]) |
||
(37 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
== OWASP Training Courses == | == OWASP Training Courses == | ||
− | The tutorials and the conference itself | + | The tutorials and the conference itself were held at KU in the College De Valk. The specific rooms are specified below. |
Line 20: | Line 20: | ||
! colspan="3" align="center" style="background:#4058A0; color:white" | Day 1 - May 30, 2006 | ! colspan="3" align="center" style="background:#4058A0; color:white" | Day 1 - May 30, 2006 | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | || style="width:40%; background:#BC857A | + | | style="width:10%; background:#7B8ABD" | || style="width:40%; background:#BC857A" | Track 1: Auditorium Zeger Van Hee (Room DV1 91.56) |
| style="width:40%; background:#BCA57A" | Track 2: Auditorium 2 (Room DV1 91.54) | | style="width:40%; background:#BCA57A" | Track 2: Auditorium 2 (Room DV1 91.54) | ||
|- | |- | ||
Line 27: | Line 27: | ||
| style="width:10%; background:#7B8ABD" | 09:00 - 09:10 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Welcome to AppSec Europe 2006: Dave Wichers, OWASP Conferences Chair | | style="width:10%; background:#7B8ABD" | 09:00 - 09:10 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Welcome to AppSec Europe 2006: Dave Wichers, OWASP Conferences Chair | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 09:10 - 10:00 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Keynote: OWASP 2.0 - A new vision for OWASP: Enabling organizations to develop, maintain, and acquire applications they can trust - | + | | style="width:10%; background:#7B8ABD" | 09:10 - 10:00 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | [http://www.owasp.org/index.php/Image:OWASPAppSecEU2006_Day1Keynote-OWASP2.0.ppt Keynote: OWASP 2.0 - A new vision for OWASP: Enabling organizations to develop, maintain, and acquire applications they can trust] - Dinis Cruz - OWASP .Net Project Lead |
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 10:00 - 11:10 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Panel: "Should companies be emulating Microsoft’s Security Development Lifecycle (SDL)?” | + | | style="width:10%; background:#7B8ABD" | 10:00 - 11:10 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Panel: [http://www.artima.com/weblogs/viewpost.jsp?thread=162577 "Should companies be emulating Microsoft’s Security Development Lifecycle (SDL)?”] |
Moderator: Johan Peeters, Program Director secappdev.org | Moderator: Johan Peeters, Program Director secappdev.org | ||
Panelists: Dinis Cruz, Andrew Van Der Stock, Pravir Chandra - Chief Security Architect - Secure Software, Alex Lucas - Security Engineer - Microsoft | Panelists: Dinis Cruz, Andrew Van Der Stock, Pravir Chandra - Chief Security Architect - Secure Software, Alex Lucas - Security Engineer - Microsoft | ||
Line 35: | Line 35: | ||
| style="width:10%; background:#7B8ABD" | 11:10 - 11:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break | | style="width:10%; background:#7B8ABD" | 11:10 - 11:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 11:30 - 12:30 || style="width:40%; background:#BC857A" align="left" | OWASP | + | | style="width:10%; background:#7B8ABD" | 11:30 - 12:30 || style="width:40%; background:#BC857A" align="left" | [http://www.owasp.org/index.php/Image:OWASPAppSecEU2006_CLASP_Project.ppt OWASP CLASP Project] – Pravir Chandra, Chief Security Architect, Secure Software |
− | | style="width:40%; background:#BCA57A" align="left" | Can (Automated) Testing Tools Really Find the OWASP Top 10?, Erwin Geirnaert, Partner ZION Security | + | | style="width:40%; background:#BCA57A" align="left" | [http://www.owasp.org/index.php/Image:OWASPAppSecEU2006_CanTestingToolsReallyFindOWASPTop10.ppt Can (Automated) Testing Tools Really Find the OWASP Top 10?], Erwin Geirnaert, Partner ZION Security |
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 12:30 - 13:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch | | style="width:10%; background:#7B8ABD" | 12:30 - 13:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 13:45 - 15:00 || style="width:40%; background:#BC857A" align="left" | Bootstrapping a Software Security Assurance Process – Sebastien Deleersnyder, OWASP Belgium Chapter Lead | + | | style="width:10%; background:#7B8ABD" | 13:45 - 15:00 || style="width:40%; background:#BC857A" align="left" | [http://www.owasp.org/index.php/Image:OWASPAppSecEU2006_Bootstrapping_the_Application_Assurance_Process.ppt Bootstrapping a Software Security Assurance Process] – Sebastien Deleersnyder, OWASP Belgium Chapter Lead |
− | | style="width:40%; background:#BCA57A" align="left" | AJAX Security – Andrew Van Der Stock, Security Engineer - NAB and OWASP Guide Project Lead | + | | style="width:40%; background:#BCA57A" align="left" | [http://www.owasp.org/index.php/Image:OWASPAppSecEU2006_AJAX_Security.ppt AJAX Security] – Andrew Van Der Stock, Security Engineer - NAB and OWASP Guide Project Lead |
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 15:00 - 15:20 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break | | style="width:10%; background:#7B8ABD" | 15:00 - 15:20 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 15:20-16:30 || style="width:40%; background:#BC857A" align="left" | From Theory to Reality: Seven Practical Steps to Delivering More Secure Software – Roger Thornton, CTO Fortify | | style="width:10%; background:#7B8ABD" | 15:20-16:30 || style="width:40%; background:#BC857A" align="left" | From Theory to Reality: Seven Practical Steps to Delivering More Secure Software – Roger Thornton, CTO Fortify | ||
− | | style="width:40%; background:#BCA57A" align="left" | HTTP Message Splitting, Smuggling and Other Animals [1]- Amit Klein, Internationally Recognized Web Application Security Researcher and OWASP Israel Chapter Leader | + | | style="width:40%; background:#BCA57A" align="left" | [http://www.owasp.org/index.php/Image:OWASPAppSecEU2006_HTTPMessageSplittingSmugglingEtc.ppt HTTP Message Splitting, Smuggling and Other Animals] [1]- Amit Klein, Internationally Recognized Web Application Security Researcher and OWASP Israel Chapter Leader |
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 16:30-16:50 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break | | style="width:10%; background:#7B8ABD" | 16:30-16:50 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break | ||
Line 57: | Line 57: | ||
| style="width:10%; background:#7B8ABD" | 18:00 - 19:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Walking Tour of Leuven on the way to the Faculty Club | | style="width:10%; background:#7B8ABD" | 18:00 - 19:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Walking Tour of Leuven on the way to the Faculty Club | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 18:40 - 19:20 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Chapter Leads Meeting at the Faculty Club: Led by Sebastien Deleersnyder | + | | style="width:10%; background:#7B8ABD" | 18:40 - 19:20 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | [http://www.owasp.org/index.php/Chapter_Leader_Meeting_AppSec_Europe_2006 Chapter Leads Meeting at the Faculty Club]: Led by Sebastien Deleersnyder |
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 19:00 - 21:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Social Gathering: Dinner and Drinks at the Faculty Club | | style="width:10%; background:#7B8ABD" | 19:00 - 21:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Social Gathering: Dinner and Drinks at the Faculty Club | ||
Line 63: | Line 63: | ||
! colspan="3" align="center" style="background:#4058A0; color:white" | Day 2 - May 31, 2006 | ! colspan="3" align="center" style="background:#4058A0; color:white" | Day 2 - May 31, 2006 | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | || style="width:40%; background:#BC857A | + | | style="width:10%; background:#7B8ABD" | || style="width:40%; background:#BC857A" | Track 1: Auditorium Zeger Van Hee (Room DV1 91.56) |
| style="width:40%; background:#BCA57A" | Track 2: Auditorium 2 (Room DV1 91.54) | | style="width:40%; background:#BCA57A" | Track 2: Auditorium 2 (Room DV1 91.54) | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 08:00 - 09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Coffee | | style="width:10%; background:#7B8ABD" | 08:00 - 09:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Coffee | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 09:00 - 09:50 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Keynote: Taking OWASP to the next level, Andrew Van Der Stock, Security Engineer - NAB and OWASP Guide Project Lead | + | | style="width:10%; background:#7B8ABD" | 09:00 - 09:50 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | [http://www.owasp.org/index.php/Image:OWASPAppSecEU2006_Day2Keynote-OWASP_TNG.ppt Keynote: Taking OWASP to the next level], Andrew Van Der Stock, Security Engineer - NAB and OWASP Guide Project Lead |
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 09:50 - 10:50 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | Web Application Firewalls: When are they useful? - Ivan Ristic, Founder Thinking Stone | + | | style="width:10%; background:#7B8ABD" | 09:50 - 10:50 || colspan="2" style="width:80%; background:#F2F2F2" align="left" | [http://www.owasp.org/index.php/Image:OWASPAppSecEU2006_WAFs_WhenAreTheyUseful.ppt Web Application Firewalls: When are they useful?] - Ivan Ristic, Founder Thinking Stone |
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 10:50 - 11:10 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break | | style="width:10%; background:#7B8ABD" | 10:50 - 11:10 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 11:10 - 12:30 || style="width:40%; background:#BC857A" align="left" | Exposing cryptography for software developers: common pitfalls & countermeasures that every developer should follow when writing crypto-aware applications, Shay Zalalichin, Application Security Unit Manager, Comsec Security Consulting B.V. | + | | style="width:10%; background:#7B8ABD" | 11:10 - 12:30 || style="width:40%; background:#BC857A" align="left" | [http://www.owasp.org/index.php/OWASPAppSecEU2006_ExposingCryptographyforSoftwareDevelopers.ppt Exposing cryptography for software developers: common pitfalls & countermeasures that every developer should follow when writing crypto-aware applications], Shay Zalalichin, Application Security Unit Manager, Comsec Security Consulting B.V. |
| style="width:40%; background:#BCA57A" align="left" | Refereed Papers Track – Slot 1: Research Papers | | style="width:40%; background:#BCA57A" align="left" | Refereed Papers Track – Slot 1: Research Papers | ||
− | 1)RequestRodeo: Client Side Protection against Session Riding, Martin Johns and Justus Winter | + | |
− | 2)An Inline Approach for Secure SOAP Requests and Early Validation, Mohammad Ashiqur Rahaman, Maarten Rits and Andreas Schaad | + | 1) [http://www.owasp.org/index.php/Image:OWASPAppSecEU2006_RequestRodeo.ppt RequestRodeo: Client Side Protection against Session Riding], Martin Johns and Justus Winter ([http://www.owasp.org/index.php/Image:RequestRodeo-MartinJohns.pdf paper]) |
+ | |||
+ | 2) [http://www.owasp.org/index.php/Image:OWASPAppSecEU2006_InlineApproachforSecureSOAPRequests.ppt An Inline Approach for Secure SOAP Requests and Early Validation], Mohammad Ashiqur Rahaman, Maarten Rits and Andreas Schaad ([http://www.owasp.org/index.php/Image:AnInlineSOAPValidationApproach-MohammadAshiqurRahaman.pdf paper]) | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 12:30 - 13:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch | | style="width:10%; background:#7B8ABD" | 12:30 - 13:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Lunch | ||
Line 83: | Line 85: | ||
| style="width:10%; background:#7B8ABD" | 13:45 - 15:10 || style="width:40%; background:#BC857A" align="left" | SiteGenerator, VulnReport and the other OWASP .Net tools, Dinis Cruz, OWASP .Net Projects Lead | | style="width:10%; background:#7B8ABD" | 13:45 - 15:10 || style="width:40%; background:#BC857A" align="left" | SiteGenerator, VulnReport and the other OWASP .Net tools, Dinis Cruz, OWASP .Net Projects Lead | ||
| style="width:40%; background:#BCA57A" align="left" | Refereed Papers Track – Slot 2: Experience Papers | | style="width:40%; background:#BCA57A" align="left" | Refereed Papers Track – Slot 2: Experience Papers | ||
− | 3)Security Testing Web Applications through Unit Tests, Stephen de Vries | + | |
− | 4)Protecting Web Services against Security Threats, Rix Groenboom | + | 3) [http://www.owasp.org/index.php/Image:OWASPAppSecEU2006_SecurityTestingthruAutomatedSWTests.ppt Security Testing Web Applications through Unit Tests], Stephen de Vries ([http://www.owasp.org/index.php/Image:AutomatedSecurityTestingofWebApplications-StephendeVries.pdf paper]) |
+ | |||
+ | 4) [http://www.owasp.org/index.php/Image:OWASPAppSecEU2006_ProtectingWebServicesAndAapplications.ppt Protecting Web Services against Security Threats], Rix Groenboom | ||
+ | ([http://www.owasp.org/index.php/Image:SecuringWebServices-RixGroenboom.pdf paper]) | ||
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 15:10 - 15:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break | | style="width:10%; background:#7B8ABD" | 15:10 - 15:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break | ||
Line 90: | Line 95: | ||
| style="width:10%; background:#7B8ABD" | 15:30 - 16:30 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Panel: “Are we winning the war?” - Are we actually getting a handle on application security issues and making things better, or are things still getting worse? | | style="width:10%; background:#7B8ABD" | 15:30 - 16:30 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | Panel: “Are we winning the war?” - Are we actually getting a handle on application security issues and making things better, or are things still getting worse? | ||
Moderator: Gunnar Peterson | Moderator: Gunnar Peterson | ||
− | Panelists: Roger Thornton - CTO Fortify; Dave Wichers - COO Aspect Security; André Mariën - Consulting Director - CyberTrust EMEA | + | Panelists: Roger Thornton - CTO Fortify; Dave Wichers - COO Aspect Security; André Mariën - Consulting Director - CyberTrust EMEA; Charlie Cano - F5 |
|- | |- | ||
| style="width:10%; background:#7B8ABD" | 16:30 - 16:50 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break | | style="width:10%; background:#7B8ABD" | 16:30 - 16:50 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | Break | ||
|- | |- | ||
− | | style="width:10%; background:#7B8ABD" | 16:50 - 17:30 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | | + | | style="width:10%; background:#7B8ABD" | 16:50 - 17:30 || colspan="2" style="width:40%; background:#F2F2F2" align="left" | [http://www.owasp.org/index.php/Image:AppSec2006EU_Wrapup.ppt Conference Wrap Up] - Dave Wichers, OWASP Conferences Chair |
|} | |} | ||
+ | |||
+ | == References == | ||
+ | |||
+ | All four papers from the Refereed Papers Track can be downloaded as one document [http://www.cs.kuleuven.be/publicaties/rapporten/cw/CW448.pdf here]. | ||
+ | |||
+ | * Papers that Amit Klein's "HTTP Message Splitting, Smuggling and Other Animals" presentation is based on: | ||
+ | :# [http://www.securityfocus.com/archive/1/401866 “Meanwhile, on the other side of the web server” (Amit Klein, June 2005)] | ||
+ | :# [http://www.packetstormsecurity.org/papers/general/whitepaper_httpresponse.pdf “Divide and Conquer - HTTP Response Splitting, Web Cache Poisoning Attacks, and Other Topics” (Amit Klein, March 2004)] | ||
+ | :# [http://www.cgisecurity.com/lib/HTTP-Request-Smuggling.pdf “HTTP Request Smuggling” (Chaim Linhart, Amit Klein, Ronen Heled, Steve Orrin, June 2005)] |
Latest revision as of 21:18, 4 December 2007
OWASP Training Courses
The tutorials and the conference itself were held at KU in the College De Valk. The specific rooms are specified below.
T1. Foundations of Web Application Security - One Day Course - May 29th, 2006 |
---|
This powerful one day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code. Read more here! This class will be held in room DV3 01.08 |
T2. WebServices and XML Security - One Day Course - May 29th, 2006 |
Many enterprises are currently developing new Web Services and/or adding and acquiring Web Services functionality into existing applications -- now is the time to build security into the system! Read more here! This class will be held in room DV3 01.10 |
OWASP Europe 2006 Conference Schedule
Day 1 - May 30, 2006 | ||
---|---|---|
Track 1: Auditorium Zeger Van Hee (Room DV1 91.56) | Track 2: Auditorium 2 (Room DV1 91.54) | |
08:00 - 09:00 | Registration and Coffee | |
09:00 - 09:10 | Welcome to AppSec Europe 2006: Dave Wichers, OWASP Conferences Chair | |
09:10 - 10:00 | Keynote: OWASP 2.0 - A new vision for OWASP: Enabling organizations to develop, maintain, and acquire applications they can trust - Dinis Cruz - OWASP .Net Project Lead | |
10:00 - 11:10 | Panel: "Should companies be emulating Microsoft’s Security Development Lifecycle (SDL)?”
Moderator: Johan Peeters, Program Director secappdev.org Panelists: Dinis Cruz, Andrew Van Der Stock, Pravir Chandra - Chief Security Architect - Secure Software, Alex Lucas - Security Engineer - Microsoft | |
11:10 - 11:30 | Break | |
11:30 - 12:30 | OWASP CLASP Project – Pravir Chandra, Chief Security Architect, Secure Software | Can (Automated) Testing Tools Really Find the OWASP Top 10?, Erwin Geirnaert, Partner ZION Security |
12:30 - 13:45 | Lunch | |
13:45 - 15:00 | Bootstrapping a Software Security Assurance Process – Sebastien Deleersnyder, OWASP Belgium Chapter Lead | AJAX Security – Andrew Van Der Stock, Security Engineer - NAB and OWASP Guide Project Lead |
15:00 - 15:20 | Break | |
15:20-16:30 | From Theory to Reality: Seven Practical Steps to Delivering More Secure Software – Roger Thornton, CTO Fortify | HTTP Message Splitting, Smuggling and Other Animals [1]- Amit Klein, Internationally Recognized Web Application Security Researcher and OWASP Israel Chapter Leader |
16:30-16:50 | Break | |
16:50 - 18:00 | Panel: "The role of Sandboxing in creating secure .Net and Java applications.”
Organizer: Dinis Cruz Panelists: Stephen de Vries - Corsaire, Roger Thornton - CTO Fortify | |
18:00 - 19:00 | Walking Tour of Leuven on the way to the Faculty Club | |
18:40 - 19:20 | Chapter Leads Meeting at the Faculty Club: Led by Sebastien Deleersnyder | |
19:00 - 21:00 | Social Gathering: Dinner and Drinks at the Faculty Club | |
Day 2 - May 31, 2006 | ||
Track 1: Auditorium Zeger Van Hee (Room DV1 91.56) | Track 2: Auditorium 2 (Room DV1 91.54) | |
08:00 - 09:00 | Coffee | |
09:00 - 09:50 | Keynote: Taking OWASP to the next level, Andrew Van Der Stock, Security Engineer - NAB and OWASP Guide Project Lead | |
09:50 - 10:50 | Web Application Firewalls: When are they useful? - Ivan Ristic, Founder Thinking Stone | |
10:50 - 11:10 | Break | |
11:10 - 12:30 | Exposing cryptography for software developers: common pitfalls & countermeasures that every developer should follow when writing crypto-aware applications, Shay Zalalichin, Application Security Unit Manager, Comsec Security Consulting B.V. | Refereed Papers Track – Slot 1: Research Papers
1) RequestRodeo: Client Side Protection against Session Riding, Martin Johns and Justus Winter (paper) 2) An Inline Approach for Secure SOAP Requests and Early Validation, Mohammad Ashiqur Rahaman, Maarten Rits and Andreas Schaad (paper) |
12:30 - 13:45 | Lunch | |
13:45 - 15:10 | SiteGenerator, VulnReport and the other OWASP .Net tools, Dinis Cruz, OWASP .Net Projects Lead | Refereed Papers Track – Slot 2: Experience Papers
3) Security Testing Web Applications through Unit Tests, Stephen de Vries (paper) 4) Protecting Web Services against Security Threats, Rix Groenboom (paper) |
15:10 - 15:30 | Break | |
15:30 - 16:30 | Panel: “Are we winning the war?” - Are we actually getting a handle on application security issues and making things better, or are things still getting worse?
Moderator: Gunnar Peterson Panelists: Roger Thornton - CTO Fortify; Dave Wichers - COO Aspect Security; André Mariën - Consulting Director - CyberTrust EMEA; Charlie Cano - F5 | |
16:30 - 16:50 | Break | |
16:50 - 17:30 | Conference Wrap Up - Dave Wichers, OWASP Conferences Chair |
References
All four papers from the Refereed Papers Track can be downloaded as one document here.
- Papers that Amit Klein's "HTTP Message Splitting, Smuggling and Other Animals" presentation is based on: