This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Mrb Scratchpad"
From OWASP
Mark.bristow (talk | contribs) |
Mark.bristow (talk | contribs) |
||
| Line 1: | Line 1: | ||
| − | < | + | <div style=""> |
| − | + | {| cellspacing="0" border="2" | |
| − | + | |- valign="middle" | |
| − | + | | height="60" align="center" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;" colspan="5" | <font size="5">'''Day 1 - Nov 12th 2009'''</font> | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" height="40" width="67" bgcolor="#7b8abd" | | |
| − | + | | valign="middle" height="40" width="200" bgcolor="#c0a0a0" align="center" | '''OWASP''' | |
| − | + | | valign="middle" height="40" width="200" bgcolor="#ffdf80" align="center" | '''Tools''' | |
| − | + | | valign="middle" height="40" width="200" bgcolor="#a0c0e0" align="center" | '''SDLC''' | |
| − | + | | valign="middle" height="40" width="200" bgcolor="#b3ff99" align="center" | '''Web 2.0''' | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" width="67" bgcolor="#7b8abd" | 07:30-09:00 | |
| − | + | | valign="middle" bgcolor="#909090" align="center" colspan="4" | Registration | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" width="67" bgcolor="#7b8abd" | 08:45-09:00 | |
| − | + | | valign="middle" height="30" bgcolor="#e0e0e0" align="center" colspan="4" | Welcome and Opening Remarks | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" width="67" bgcolor="#7b8abd" | 09:00-10:00 | |
| − | + | | valign="middle" height="60" bgcolor="#e0e0e0" align="center" colspan="4" | Keynote: [[AppSecDC Keynote Jarzomnek|Joe Jarzombek]] | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" width="67" bgcolor="#7b8abd" | 10:30-10:30 | |
| − | + | | valign="middle" height="30" bgcolor="#909090" align="center" colspan="4" | Coffee Break & Room Change | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" width="67" bgcolor="#7b8abd" | 10:30-11:30 | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#c0a0a0" align="center" | [[OWASP ESAPI AppSecDC|OWASP ESAPI]]<br>Jeff Williams | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#ffdf80" align="center" | [[Manipulating Web Application Interfaces, a new approach to input validation]]<br>Felipe Moreno-Strauch | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#a0c0e0" align="center" | [[Development Issues Within AJAX Applications: How to Divert Threats]]<br>Lars Ewe | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#b3ff99" align="center" | [[Understanding the Implications of Cloud Computing on Application Security]]<br>Dennis Hurst | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" height="120" width="67" bgcolor="#7b8abd" | 11:30-12:30 | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#c0a0a0" align="center" | [[Software Assurance Maturity Model (SAMM)]]<br>Pravir Chandra | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#ffdf80" align="center" | [[The Case of Promiscuous Parameters and Other Ongoing Capers in Web Security]]<br>Jacob West | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#a0c0e0" align="center" | [[Enterprise Application Security - GE's approach to solving root cause and establishing a Center of Excellence|Enterprise Application Security - GE's approach to solving root cause]]<br>Darren Challey | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#b3ff99" align="center" | [[Transparent Proxy Abuse]]<br>Robert Auger | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" height="120" width="67" bgcolor="#7b8abd" | 12:30-13:30 | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#c0a0a0" align="center" | [[DISA's Application Security and Development STIG: How OWASP Can Help You]]<br>Jason Li | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#ffdf80" align="center" | [[OWASP ModSecurity Core Rule Set Project]]<br>Ryan C. Barnett | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#a0c0e0" align="center" | [[The essential role of infosec in secure software development]]<br>Kenneth R. van Wyk | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#b3ff99" align="center" | [[Fracturing Flex For Fun- An Alliterative Attackers Approach]]<br>Jon Rose/Kevin Stadmeyer | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" height="60" width="67" bgcolor="#7b8abd" | 13:30-14:30 | |
| − | + | | valign="middle" height="60" bgcolor="#909090" align="center" colspan="4" | Lunch | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" height="120" width="67" bgcolor="#7b8abd" | 14:30-15:30 | |
| − | + | | valign="middle" height="60" width="200" bgcolor="#c0a0a0" align="center" | [[Defend Yourself: Integrating Real Time Defenses into Online Applications]]<br>Michael Coates | |
| − | + | | valign="middle" height="60" width="200" bgcolor="#ffdf80" align="center" | [[Finding the Hotspots: Web-security testing with the Watcher tool]]<br>Chris Weber | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#a0c0e0" align="center" rowspan="3" | [[SDLC Pannel AppSecDC|SDLC Panel]] | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#b3ff99" align="center" | [[Social Zombies: Your Friends Want to Eat Your Brains]]<br>Tom Eston/Kevin Johnson | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" height="120" width="67" bgcolor="#7b8abd" rowspan="2" | 15:30-16:30 | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#c0a0a0" align="center" rowspan="2" | [[The ESAPI Web Application Firewall (ESAPI WAF)|The ESAPI Web Application Firewall]]<br>Arshan Dabirsiaghi | |
| − | + | | valign="middle" height="60" width="200" bgcolor="#ffdf80" align="center" | [[One Click Ownage]]<br>Ferruh Mavituna | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#b3ff99" align="center" rowspan="2" | [[Cloudy with a chance of 0-day]]<br>Jon Rose/Tom Leavey | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" height="60" width="200" bgcolor="#ffdf80" align="center" | [[Web Application Security Scanner Evaluation Criteria]]<br>Brian Shura | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" height="120" width="67" bgcolor="#7b8abd" rowspan="2" | 16:30-17:30 | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#c0a0a0" align="center" rowspan="2" | [[OWASP Live CD: An open environment for Web Application Security]]<br>Matt Tesauro / Brad Causey | |
| − | + | | valign="middle" height="60" width="200" bgcolor="#ffdf80" align="center" | [[Learning by Breaking: A New Project Insecure Web Apps]]<br>Chuck Willis | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#a0c0e0" align="center" rowspan="2" | [[Vulnerability Management in an Application Security World]]<br>Dan Cornell | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#b3ff99" align="center" rowspan="2" | [[Attacking WCF Web Services]]<br>Brian Holyfield | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" height="60" width="200" bgcolor="#ffdf80" align="center" | [[Synergy! An intregrated OWASP Audit: A world where the tools communicate|Synergy! - A world where the tools communicate]]<br> | |
| − | + | Josh Abraham | |
| − | + | ||
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" height="120" width="67" bgcolor="#7b8abd" rowspan="2" | 17:30-18:30 | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#c0a0a0" align="center" rowspan="2" | [[The Entrepreneur's Guide to Career Management]]<br>Lee Kushner | |
| − | + | | valign="middle" height="60" width="200" bgcolor="#ffdf80" align="center" | [[Advanced SSL: The good, the bad, and the ugly]]<br>Michael Coats | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#a0c0e0" align="center" rowspan="2" | [[Threat Modeling by John Steven|Threat Modeling]]<br>John Steven | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#b3ff99" align="center" rowspan="2" | [[When Web 2.0 Attacks - Understanding Security Implications of AJAX, Flash and |When Web 2.0 Attacks - Understanding Security Implications of AJAX, Flash and "Highly Interactive" Technologies]]<br>Rafal Los | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" height="60" width="200" bgcolor="#ffdf80" align="center" | [[User input piercing for Cross Site Scripting Attacks]]<br>Matias Blanco | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" height="60" width="67" bgcolor="#7b8abd" | 19:00-???? | |
| − | <!-- Day 2 --> | + | | valign="middle" height="60" bgcolor="#c0c0c0" align="center" colspan="4" | Reception <!-- Day 2 --> |
| − | + | |- valign="middle" | |
| − | + | | height="60" colspan="5" | | |
| − | + | |- valign="middle" | |
| − | + | | height="60" align="center" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;" colspan="5" | <font size="5">'''Day 2 - Nov 13th 2009'''</font> | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" height="40" width="67" bgcolor="#7b8abd" | | |
| − | + | | valign="middle" height="40" width="200" bgcolor="#c0a0a0" align="center" | '''Attack & Defend''' | |
| − | + | | valign="middle" height="40" width="200" bgcolor="#ffdf80" align="center" | '''Process''' | |
| − | + | | valign="middle" height="40" width="200" bgcolor="#a0c0e0" align="center" | '''Metrics''' | |
| − | + | | valign="middle" height="40" width="200" bgcolor="#b3ff99" align="center" | '''Compliance''' | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" width="67" bgcolor="#7b8abd" | 07:30-09:00 | |
| − | + | | valign="middle" bgcolor="#909090" align="center" colspan="4" | Registration | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" width="67" bgcolor="#7b8abd" | 09:00-10:00 | |
| − | + | | valign="middle" height="60" bgcolor="#e0e0e0" align="center" colspan="4" | Keynote: TBA | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" width="67" bgcolor="#7b8abd" | 10:30-10:30 | |
| − | + | | valign="middle" height="30" bgcolor="#909090" align="center" colspan="4" | Coffee Break & Room Change | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" width="67" bgcolor="#7b8abd" | 10:30-11:30 | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#c0a0a0" align="center" | [[Securing the Core JEE Patterns]]<br>Rohit Sethi/Krishna Raja | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#ffdf80" align="center" | [[The Big Picture: Web Risks and Assessments Beyond Scanning]]<br>Matt Fisher | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#a0c0e0" align="center" | [[The Web Hacking Incidents Database]]<br>Ryan C. Barnett | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#b3ff99" align="center" | [[Business Logic Automatons: Friend or Foe?]]<br>Ofer Shezaf | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" height="120" width="67" bgcolor="#7b8abd" | 11:30-12:30 | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#c0a0a0" align="center" | [[Unicode Transformations: Finding Elusive Vulnerabilities]]<br>Chris Weber | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#ffdf80" align="center" | [[Scalable Application Assessments in the Enterprise]]<br>Tom Parker/Lars Ewe | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#a0c0e0" align="center" | [[Application security metrics from the organization on down to the vulnerabilities]]<br>Chris Wysopal | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#b3ff99" align="center" | [[SCAP: Automating our way out of the Vulnerability Wheel of Pain]]<br>Ed Bellis | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" height="120" width="67" bgcolor="#7b8abd" | 12:30-13:30 | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#c0a0a0" align="center" | [[Fox in the Henhouse: Java Rootkits]]<br>Jeff Williams | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#ffdf80" align="center" | [[Secure Software Updates: Update Like Conficker]]<br>Jeremy Allen | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#a0c0e0" align="center" | [[OWASP Top 10 2009 AppSecDC|OWASP Top 10 2009]]<br>Dave Wichers | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#b3ff99" align="center" | [[Secure SDLC: The Good, The Bad, and The Ugly]]<br>Joey Peloquin | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" height="60" width="67" bgcolor="#7b8abd" | 13:30-14:30 | |
| − | + | | valign="middle" height="60" bgcolor="#909090" align="center" colspan="4" | Lunch | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" height="120" width="67" bgcolor="#7b8abd" | 14:30-15:30 | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#c0a0a0" align="center" | [[TBD AppSecDC Robert Hansen|TBA]]<br>Robert Hansen | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#ffdf80" align="center" | [[Improving application security after an incident]]<br>Cory Scott | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#a0c0e0" align="center" | [[Hacking by Numbers]]<br>Tom Brennan | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#b3ff99" align="center" rowspan="2" | [[AppSecDC09 Federal CIO Pannel|Federal CIO Pannel]] | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" height="120" width="67" bgcolor="#7b8abd" | 15:30-16:30 | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#c0a0a0" align="center" | [[Automated vs. Manual Security: You can't filter The Stupid]]<br>David Byrne/Charles Henderson | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#ffdf80" align="center" | [[Custom Intrusion Detection Techniques for Monitoring Web Applications]]<br>Matthew Olney | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#a0c0e0" align="center" | [[Building an in-house application security assessment team]]<br>Keith Turpin | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" height="120" width="67" bgcolor="#7b8abd" | 16:30-17:30 | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#c0a0a0" align="center" | [[Advanced SQL Injection]]<br>Joe McCray | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#ffdf80" align="center" | [[Is your organization secured against internal threats?]]<br>Lars Ewe | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#a0c0e0" align="center" | [[The OWASP Security Spending Benchmarks Project]]<br>Dr. Boaz Gelbord | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#b3ff99" align="center" | [[Promoting Application Security within Federal Government]]<br>Sarbari Gupta | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" height="120" width="67" bgcolor="#7b8abd" rowspan="2" | 17:30-18:30 | |
| − | + | | valign="middle" height="60" width="200" bgcolor="#c0a0a0" align="center" | [[Clubbing WebApps with a Botnet]]<br>Gunter Ollmann | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#ffdf80" align="center" rowspan="2" | [[Deploying Secure Web Applications with OWASP Resources]]<br>Kuai Hinojosa | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#a0c0e0" align="center" rowspan="2" | [[SANS Dshield Webhoneypot Project]]<br>Jason Lam | |
| − | + | | valign="middle" height="120" width="200" bgcolor="#b3ff99" align="center" rowspan="2" | [[Techniques in Attacking and Defending XML/Web Services]]<br>Mamoon Yunus/Jason Macy | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" height="60" width="200" bgcolor="#c0a0a0" align="center" | [[Injectable Exploits: Two New Tools for Pwning Web Apps and Browsers]]<br>Kevin Johnson, Justin Searle, Frank DiMaggio | |
| − | + | |- valign="bottom" | |
| − | + | | valign="middle" height="60" width="67" bgcolor="#7b8abd" | 18:30-19:00 | |
| − | + | | valign="middle" height="60" bgcolor="#c0c0c0" align="center" colspan="4" | Closing Remarks | |
| − | </ | + | |
| + | |||
| + | |} | ||
| + | </div> | ||
| + | [[Category:OWASP_AppSec_DC_09]] | ||