This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP AppSec Asia 2008 - Taiwan"
From OWASP
Line 19: | Line 19: | ||
|- | |- | ||
| align="center" style="width:20%; background:#4F81BD; color:white" | '''09:30- 09:40''' || style="width:30%; background:#A7BFDE" align="center" | '''[[Opening welcome and an introduction to this year’s program]]<BR><br>''' | | align="center" style="width:20%; background:#4F81BD; color:white" | '''09:30- 09:40''' || style="width:30%; background:#A7BFDE" align="center" | '''[[Opening welcome and an introduction to this year’s program]]<BR><br>''' | ||
− | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''Wayne Huang, Conference Chair<br>''' | + | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''[[Wayne Huang, Conference Chair]]<br>''' |
|- | |- | ||
| align="center" style="width:20%; background:#4F81BD; color:white" | '''09:40-09:50''' || style="width:30%; background:#A7BFDE" align="center" | '''Welcome by Institute for Information Industry<BR><br>''' | | align="center" style="width:20%; background:#4F81BD; color:white" | '''09:40-09:50''' || style="width:30%; background:#A7BFDE" align="center" | '''Welcome by Institute for Information Industry<BR><br>''' | ||
Line 31: | Line 31: | ||
|- | |- | ||
| align="center" style="width:20%; background:#4F81BD; color:white" | '''11:10-12:00''' || style="width:30%; background:#A7BFDE" align="center" | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]''' | | align="center" style="width:20%; background:#4F81BD; color:white" | '''11:10-12:00''' || style="width:30%; background:#A7BFDE" align="center" | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]''' | ||
− | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''<BR>Wayne Huang, OWASP Taiwan Chapter<br><BR>''' | + | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''<BR>[[Wayne Huang, OWASP Taiwan Chapter]]<br><BR>''' |
|- | |- | ||
{| style="width:80%" border="0" align="center" | {| style="width:80%" border="0" align="center" | ||
Line 45: | Line 45: | ||
|- | |- | ||
| align="center" style="width:20%; background:#4F81BD; color:white" | '''13:00 - 13:40''' || style="width:30%; background:#A7BFDE" align="center" | '''[[Why Webmail systems are hard to secure--using real case studies]]<BR><br>''' | | align="center" style="width:20%; background:#4F81BD; color:white" | '''13:00 - 13:40''' || style="width:30%; background:#A7BFDE" align="center" | '''[[Why Webmail systems are hard to secure--using real case studies]]<BR><br>''' | ||
− | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''Charmi Lin, Taiwan Information & Communication Security Technology Center<br>''' | + | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''[[Charmi Lin, Taiwan Information & Communication Security Technology Center]]<br>''' |
|- | |- | ||
| align="center" style="width:20%; background:#4F81BD; color:white" | '''13:50 - 14:40''' || style="width:30%; background:#A7BFDE" align="center" | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]<BR><br>''' | | align="center" style="width:20%; background:#4F81BD; color:white" | '''13:50 - 14:40''' || style="width:30%; background:#A7BFDE" align="center" | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]<BR><br>''' | ||
− | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''Tim Bass, OWASP Thailand Chapter<br>''' | + | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''[[Tim Bass, OWASP Thailand Chapter]]<br>''' |
|- | |- | ||
|- | |- | ||
Line 63: | Line 63: | ||
|- | |- | ||
| align="center" style="width:20%; background:#4F81BD; color:white" | '''15:00 - 15:40''' || style="width:30%; background:#A7BFDE" align="center" | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]<BR><br>''' | | align="center" style="width:20%; background:#4F81BD; color:white" | '''15:00 - 15:40''' || style="width:30%; background:#A7BFDE" align="center" | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]<BR><br>''' | ||
− | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''PK (Taiwan Criminal Investigation Bureau)<br>''' | + | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''[[PK (Taiwan Criminal Investigation Bureau)]]<br>''' |
|- | |- | ||
| align="center" style="width:20%; background:#4F81BD; color:white" | '''15:50 - 16:40''' || style="width:30%; background:#A7BFDE" align="center" | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]<BR><br>''' | | align="center" style="width:20%; background:#4F81BD; color:white" | '''15:50 - 16:40''' || style="width:30%; background:#A7BFDE" align="center" | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]<BR><br>''' | ||
− | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''Fyodor (Guard-Info)<br>''' | + | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''[[Fyodor (Guard-Info)]]<br>''' |
|- | |- | ||
| align="center" style="width:20%; background:#4F81BD; color:white" | '''16:50 - 17:40''' || style="width:30%; background:#A7BFDE" align="center" | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]<BR><br>''' | | align="center" style="width:20%; background:#4F81BD; color:white" | '''16:50 - 17:40''' || style="width:30%; background:#A7BFDE" align="center" | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]<BR><br>''' | ||
− | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''Dhruv Soi (OWASP Delhi Chapter Leader), Pukhraj Singh (OWASP Delhi Chapter)<br>''' | + | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]<br>''' |
|- | |- | ||
{| style="width:80%" border="0" align="center" | {| style="width:80%" border="0" align="center" | ||
Line 87: | Line 87: | ||
|- | |- | ||
| align="center" style="width:20%; background:#4F81BD; color:white" | '''10:00- 11:00''' || style="width:30%; background:#A7BFDE" align="center" | '''New 0-Day Browser Exploits: Clickjacking - yea, this is bad...<BR><br>''' | | align="center" style="width:20%; background:#4F81BD; color:white" | '''10:00- 11:00''' || style="width:30%; background:#A7BFDE" align="center" | '''New 0-Day Browser Exploits: Clickjacking - yea, this is bad...<BR><br>''' | ||
− | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''Robert "RSnake" Hansen (SecTheory)<br>''' | + | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''[[Robert "RSnake" Hansen (SecTheory)]]<br>''' |
|- | |- | ||
| align="center" style="width:20%; background:#4F81BD; color:white" | '''11:00- 12:00''' || style="width:30%; background:#A7BFDE" align="center" | '''[[Web 2.0, Consumerization, and Application Security]]<BR><br>''' | | align="center" style="width:20%; background:#4F81BD; color:white" | '''11:00- 12:00''' || style="width:30%; background:#A7BFDE" align="center" | '''[[Web 2.0, Consumerization, and Application Security]]<BR><br>''' | ||
− | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''Chenxi Wang, Ph.D. (Forrester Research)<br>''' | + | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''[[Chenxi Wang, Ph.D. (Forrester Research)]]<br>''' |
|- | |- | ||
{| style="width:80%" border="0" align="center" | {| style="width:80%" border="0" align="center" | ||
Line 104: | Line 104: | ||
|- | |- | ||
| align="center" style="width:20%; background:#4F81BD; color:white" | '''13:00 - 13:50''' || style="width:30%; background:#A7BFDE" align="center" | '''[[Good Business Penetration Testing]]<BR><br>''' | | align="center" style="width:20%; background:#4F81BD; color:white" | '''13:00 - 13:50''' || style="width:30%; background:#A7BFDE" align="center" | '''[[Good Business Penetration Testing]]<BR><br>''' | ||
− | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''KK Mookhey (OWASP Mumbai)<br>''' | + | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''[[KK Mookhey (OWASP Mumbai)]]<br>''' |
|- | |- | ||
| align="center" style="width:20%; background:#4F81BD; color:white" | '''14:00 - 14:50''' || style="width:30%; background:#A7BFDE" align="center" | '''[[Best Practices Guide: Web Application Firewalls]]<BR><br>''' | | align="center" style="width:20%; background:#4F81BD; color:white" | '''14:00 - 14:50''' || style="width:30%; background:#A7BFDE" align="center" | '''[[Best Practices Guide: Web Application Firewalls]]<BR><br>''' | ||
− | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''Alexander Meisel (OWASP Germany)<br>''' | + | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''[[Alexander Meisel (OWASP Germany)]]<br>''' |
|- | |- | ||
|- | |- | ||
Line 122: | Line 122: | ||
|- | |- | ||
| align="center" style="width:20%; background:#4F81BD; color:white" | '''15:10 - 16:00''' || style="width:30%; background:#A7BFDE" align="center" | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]<BR><br>''' | | align="center" style="width:20%; background:#4F81BD; color:white" | '''15:10 - 16:00''' || style="width:30%; background:#A7BFDE" align="center" | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]<BR><br>''' | ||
− | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''Steven Adair (ShadowServer Foundation)<br>''' | + | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''[[Steven Adair (ShadowServer Foundation)]]<br>''' |
|- | |- | ||
| align="center" style="width:20%; background:#4F81BD; color:white" | '''16:10 - 17:00''' || style="width:30%; background:#A7BFDE" align="center" | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]<BR><br>''' | | align="center" style="width:20%; background:#4F81BD; color:white" | '''16:10 - 17:00''' || style="width:30%; background:#A7BFDE" align="center" | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]<BR><br>''' | ||
| style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''Alex, Chenxi, Dhruv, Fyodor, KK, Robert, Tim Bass, Wayne, YM<br>''' | | style="width:40%; background:#EEF0F7; color:#4A4AFF" align="center" | '''Alex, Chenxi, Dhruv, Fyodor, KK, Robert, Tim Bass, Wayne, YM<br>''' | ||
|- | |- |
Revision as of 07:25, 7 October 2008
Welcome to OWASP AppSec Asia 2008! We'd like to thank Delhi, Mumbai, Singapore Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in attending, please email Wayne ([email protected]).