Difference between revisions of "OWASP Israel 2009 12"
(10 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
− | The meeting | + | [[Category:Israel]] |
+ | The meeting was held in Tuesday, Dec 8th, 2009. | ||
Location: IBM/Watchfire Offices, Sapir 1, Herzliya Pituach | Location: IBM/Watchfire Offices, Sapir 1, Herzliya Pituach | ||
− | + | == '''Agenda''' == | |
+ | |||
+ | == Introduction == | ||
− | + | ([[Media:OWASP-Israel-2009-Dec_Introduction_Ofer-Maor.ppt|Download Presentation]]) | |
− | == OWASP | + | == OWASP AppSec US 2009 Highlights == |
'''Ofer Maor, Hacktics | '''Ofer Maor, Hacktics | ||
''' | ''' | ||
− | In this lecture we will review the highlights of the last | + | In this lecture we will review the highlights of the last OWASP AppSec Conference in DC. We review some of the trends in application security, and updates to OWASP Projects. Among other topics, we will discuss the upcoming launch of the new OWASP Top 10 (2010), which is now in Release Candidate state, and reflects the changes in the spread of various application attacks. |
+ | ([[Media:OWASP-Israel-2009-Dec_AppSecUS09Highlights_Ofer-Maor.ppt|Download Presentation]]) | ||
== Decompilation Injection == | == Decompilation Injection == | ||
Line 19: | Line 23: | ||
The presentation will show a novel way to protect .NET assemblies against reverse-engineering and recompilation. By injecting them with commands that are activated only at the recompilation stage, the application retroactively detects the reverse-engineering process and acts upon it. | The presentation will show a novel way to protect .NET assemblies against reverse-engineering and recompilation. By injecting them with commands that are activated only at the recompilation stage, the application retroactively detects the reverse-engineering process and acts upon it. | ||
+ | |||
+ | ([[Media:OWASP-Israel-2009-Dec_DecompilationInjection_Maty-Siman.pptx|Download Presentation]]) |
Latest revision as of 19:27, 30 December 2009
The meeting was held in Tuesday, Dec 8th, 2009.
Location: IBM/Watchfire Offices, Sapir 1, Herzliya Pituach
Agenda
Introduction
OWASP AppSec US 2009 Highlights
Ofer Maor, Hacktics
In this lecture we will review the highlights of the last OWASP AppSec Conference in DC. We review some of the trends in application security, and updates to OWASP Projects. Among other topics, we will discuss the upcoming launch of the new OWASP Top 10 (2010), which is now in Release Candidate state, and reflects the changes in the spread of various application attacks.
Decompilation Injection
Maty Siman, Checkmarx
The presentation will show a novel way to protect .NET assemblies against reverse-engineering and recompilation. By injecting them with commands that are activated only at the recompilation stage, the application retroactively detects the reverse-engineering process and acts upon it.