This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "AppSecResearch2012"

From OWASP
Jump to: navigation, search
Line 332: Line 332:
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 09:10-09:55  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 09:10-09:55  
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote:  
+
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: A Decade of Software Security: From the Bug Parade to the BSIMM
 +
''Gary McGraw, CTO, Cigital''
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 09:55-10:05  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 09:55-10:05  
Line 340: Line 341:
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 10:05-10:45  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 10:05-10:45  
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" |
+
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | (D) Development of Security Framework based on OWASP ESAPI for JSF2.0
 +
''Kachhadiya Rakeshkumar and Benoist Emmanuel<br>
 +
(Albert Ludwigs Universität Freiburg and Berne University of Applied Sciences)''
  
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" |  
+
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | (D) Benchmarking Web Application Scanners for YOUR Organization
 +
''Dan Cornell<br>
 +
(Denim Group)''
  
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" |
+
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | (D) The “cree.py” side of geolocation. Weaponizing your checkins
 +
''Ioannis Kakavas<br>
 +
(IT Advisor)''
  
  
Line 353: Line 360:
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 11:00-11:40  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 11:00-11:40  
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" |  
+
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | Making Security Invisible by Becoming the Developer’s Best Friends
 +
''Dinis Cruz<br>
 +
(Security Innovation)''
  
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" |
+
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | (P) Data Mining a Mountain of Zero Day Vulnerabilities
 +
''Chris Eng<br>
 +
(Veracode)''
  
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" |
+
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | (P) Anticipating Surprise – Fundamentals of Intelligence Gathering
 +
''Fred Donovan<br>
 +
(Attack Logic)''
  
  
Line 370: Line 383:
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 12:35-13:10  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 12:35-13:10  
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote:
+
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: Fatal Injection (and what you can do about it)
 +
''Diomidis Spinellis, Professor, Athens University of Economics and Business''
  
 
|-
 
|-
Line 380: Line 394:
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 13:50-14:30  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 13:50-14:30  
  
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" |
+
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | (P) Real World Threat Modeling via the PASTA Methodology
 +
''Tony Ucedavelez<br>
 +
(VerSprite)''
  
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" |  
+
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | (P) Can Correlations Secure Web Application?
 +
''Ofer Shezaf<br>
 +
(HP)''
  
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" |  
+
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | (D) BDD for Automating Web Application Testing
 +
''Stephen De Vries<br>
 +
(Continuum Security)''
  
  
Line 393: Line 413:
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 14:40-15:20  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 14:40-15:20  
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" |
+
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | (P) AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life
 +
''Jerry Hoff<br>
 +
(Whitehat)''
  
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" |  
+
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | (D) Using Hash-based Message Authentication Code Protocol to Reduce Web Application Attack Surface
 +
''Breno Pinto and Luiz Eduardo Santos<br>
 +
(Trustwave)''
  
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" |  
+
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | (D) Advanced CSRF and Stateless Anti-CSRF
 +
''John Wilander<br>
 +
(Svenska Handelbanken and Linköpings universitet)''
  
  
Line 408: Line 434:
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 15:30-16:10  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 15:30-16:10  
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" |
+
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);" | (P) Anatomy of a Logic Flaw: Breaking the Myth
 +
''Charles Henderson<br>
 +
(Trustwave)''
  
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" |  
+
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | 2012 Global Security Report
 +
''Tom Brennan<br>
 +
(Trustwave)''
  
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" |
+
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | (P) The Invisible Threat – MitB (Man in the Browser)
 +
''Uri Fleyder<br>
 +
(RSA Security)''
  
  
Line 421: Line 453:
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 16:20-17:00  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 16:20-17:00  
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote:  
+
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: Jackpotting Mobile Apps
 +
Christian Papathanasiou
  
 
|-
 
|-

Revision as of 16:49, 25 July 2012


AppsecResearch2012Banner.jpg

We are happy to announce that the OWASP Greek Chapter will be hosting the AppSec Research 2012 in Athens Greece

This conference is practically the OWASP AppSec Europe. Every two years we add “Research” in order to highlight that we invite both industry and academia to participate, share thoughts, knowledge and insight on application security.

OWASP AppSec Research is the European conference for anyone interested in application security

This year it will be hosted by the Department of Informatics and Telecommunications of the University of Athens, Greece and will take place between July 10-13th.

The first OWASP AppSec Research conference was held in Stockholm in 2010.


AppSec Research Conference Website



@appseceu Twitter Feed (follow us on Twitter!) <twitter>228539824</twitter>