This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "AppSecResearch2012"
From OWASP
Line 332: | Line 332: | ||
|- | |- | ||
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 09:10-09:55 | | style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 09:10-09:55 | ||
− | | align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: | + | | align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: A Decade of Software Security: From the Bug Parade to the BSIMM |
+ | ''Gary McGraw, CTO, Cigital'' | ||
|- | |- | ||
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 09:55-10:05 | | style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 09:55-10:05 | ||
Line 340: | Line 341: | ||
|- | |- | ||
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 10:05-10:45 | | style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 10:05-10:45 | ||
− | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | | + | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | (D) Development of Security Framework based on OWASP ESAPI for JSF2.0 |
+ | ''Kachhadiya Rakeshkumar and Benoist Emmanuel<br> | ||
+ | (Albert Ludwigs Universität Freiburg and Berne University of Applied Sciences)'' | ||
− | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | | + | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | (D) Benchmarking Web Application Scanners for YOUR Organization |
+ | ''Dan Cornell<br> | ||
+ | (Denim Group)'' | ||
− | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | | + | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | (D) The “cree.py” side of geolocation. Weaponizing your checkins |
+ | ''Ioannis Kakavas<br> | ||
+ | (IT Advisor)'' | ||
Line 353: | Line 360: | ||
|- | |- | ||
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 11:00-11:40 | | style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 11:00-11:40 | ||
− | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | | + | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | Making Security Invisible by Becoming the Developer’s Best Friends |
+ | ''Dinis Cruz<br> | ||
+ | (Security Innovation)'' | ||
− | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | | + | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | (P) Data Mining a Mountain of Zero Day Vulnerabilities |
+ | ''Chris Eng<br> | ||
+ | (Veracode)'' | ||
− | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | | + | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | (P) Anticipating Surprise – Fundamentals of Intelligence Gathering |
+ | ''Fred Donovan<br> | ||
+ | (Attack Logic)'' | ||
Line 370: | Line 383: | ||
|- | |- | ||
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 12:35-13:10 | | style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 12:35-13:10 | ||
− | | align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: | + | | align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: Fatal Injection (and what you can do about it) |
+ | ''Diomidis Spinellis, Professor, Athens University of Economics and Business'' | ||
|- | |- | ||
Line 380: | Line 394: | ||
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 13:50-14:30 | | style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 13:50-14:30 | ||
− | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | | + | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | (P) Real World Threat Modeling via the PASTA Methodology |
+ | ''Tony Ucedavelez<br> | ||
+ | (VerSprite)'' | ||
− | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | | + | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | (P) Can Correlations Secure Web Application? |
+ | ''Ofer Shezaf<br> | ||
+ | (HP)'' | ||
− | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | | + | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | (D) BDD for Automating Web Application Testing |
+ | ''Stephen De Vries<br> | ||
+ | (Continuum Security)'' | ||
Line 393: | Line 413: | ||
|- | |- | ||
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 14:40-15:20 | | style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 14:40-15:20 | ||
− | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | | + | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | (P) AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life |
+ | ''Jerry Hoff<br> | ||
+ | (Whitehat)'' | ||
− | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | | + | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | (D) Using Hash-based Message Authentication Code Protocol to Reduce Web Application Attack Surface |
+ | ''Breno Pinto and Luiz Eduardo Santos<br> | ||
+ | (Trustwave)'' | ||
− | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | | + | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | (D) Advanced CSRF and Stateless Anti-CSRF |
+ | ''John Wilander<br> | ||
+ | (Svenska Handelbanken and Linköpings universitet)'' | ||
Line 408: | Line 434: | ||
|- | |- | ||
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 15:30-16:10 | | style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 15:30-16:10 | ||
− | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | | + | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | (P) Anatomy of a Logic Flaw: Breaking the Myth |
+ | ''Charles Henderson<br> | ||
+ | (Trustwave)'' | ||
− | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | | + | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | 2012 Global Security Report |
+ | ''Tom Brennan<br> | ||
+ | (Trustwave)'' | ||
− | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | | + | | align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | (P) The Invisible Threat – MitB (Man in the Browser) |
+ | ''Uri Fleyder<br> | ||
+ | (RSA Security)'' | ||
Line 421: | Line 453: | ||
|- | |- | ||
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 16:20-17:00 | | style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 16:20-17:00 | ||
− | | align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: | + | | align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: Jackpotting Mobile Apps |
+ | Christian Papathanasiou | ||
|- | |- |
Revision as of 16:49, 25 July 2012