This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "EUTour2013 Lisbon Agenda"
From OWASP
(→OWASP Europe Tour - Lisbon 2013) |
(→OWASP Europe Tour - Lisbon 2013) |
||
Line 65: | Line 65: | ||
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Pedro Fortuna.<BR>CTO, Auditmark. | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Pedro Fortuna.<BR>CTO, Auditmark. | ||
| style="width:65%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | '''Protecting JavaScript source code – Facts and Fiction'''.<BR>The goal of code obfuscation is to delay the understanding of a program does. It can be used, for example, in scenarios where the code contains Intellectual Property (algorithms) or when the owner wants to prevent a competitor for stealing and reusing the code. To achieve it, an obfuscation transformation translates easy to understand code into a much harder to understand form. But in order to be resilient, obfuscation transformations need also to resist automatic reversal performed using static or dynamic code analysis techniques. This presentation focuses on the specific case of JavaScript source obfuscation, main usage cases, presents some obfuscation examples and their value in providing real protection against reverse-engineering. | | style="width:65%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | '''Protecting JavaScript source code – Facts and Fiction'''.<BR>The goal of code obfuscation is to delay the understanding of a program does. It can be used, for example, in scenarios where the code contains Intellectual Property (algorithms) or when the owner wants to prevent a competitor for stealing and reusing the code. To achieve it, an obfuscation transformation translates easy to understand code into a much harder to understand form. But in order to be resilient, obfuscation transformations need also to resist automatic reversal performed using static or dynamic code analysis techniques. This presentation focuses on the specific case of JavaScript source obfuscation, main usage cases, presents some obfuscation examples and their value in providing real protection against reverse-engineering. | ||
− | |||
|- | |- | ||
| style="width:8%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | xx:xx - xx:xx | | style="width:8%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | xx:xx - xx:xx |
Revision as of 15:08, 12 June 2013
|
OWASP EUROPE TOUR 2013 Tour Home Page |
CONFERENCE | |
OWASP Europe Tour - Lisbon 2013Friday 21st June (Conference) | |
DESCRIPTION | |
OWASP Europe TOUR, is an event across the European region that promotes awareness about application security, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.
| |
OWASP MEMBERSHIP | |
During the OWASP Europe Tour you could become a member and support our mission. |
CONFERENCE (Friday 21st June) | |
Date | Location |
Friday 21st June | Venue Location: ISCTE-IUL University Institute of Lisbon, Aud. B2.03 Venue Address: Avª das Forças Armadas, 1649-026 Lisboa |
Price and registration | |
This event is FREE Registration Link to the Europe Tour (Lisboa): Registration
|