This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "AppSecUSA 2012.com"
From OWASP
Line 1: | Line 1: | ||
*AppSecUSA Presentations and Talks | *AppSecUSA Presentations and Talks | ||
− | + | ||
+ | == Thursday 25th Oct == | ||
+ | === 10:00 am - 10:45 am === | ||
+ | |||
+ | ---- | ||
+ | |||
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== | ==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== | ||
− | * | + | *Developer | '''John Benninghoff''' |
+ | |||
+ | ==== Top Ten Web Defenses ==== | ||
+ | *Mobile | '''Jim Manico''' | ||
==== Mobile Applications & Proxy Shenanigans ==== | ==== Mobile Applications & Proxy Shenanigans ==== | ||
− | * | + | *Mobile | '''Dan Amodio''' |
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ==== | ==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ==== | ||
− | * | + | *Reverse Engineering | '''Alejandro Caceres''' |
==== Gauntlt: Rugged by Example ==== | ==== Gauntlt: Rugged by Example ==== | ||
− | * | + | *Rugged devops | '''Jeremiah Shirk''' |
+ | |||
+ | === 11:00 am - 11:45 am === | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== | ||
+ | *Attack | '''Ryan Barnett''' | ||
+ | |||
+ | ==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ==== | ||
+ | *Developer | '''Sherif Koussa''' | ||
+ | |||
+ | ==== Cracking the Code of Mobile Application ==== | ||
+ | *Mobile | '''Sreenarayan Ashokkumar''' | ||
+ | |||
+ | ==== Hacking .NET Application: Reverse Engineering 101 ==== | ||
+ | *Reverse Engineering | '''Jon Mccoy''' | ||
+ | |||
+ | ==== Doing the unstuck: How Rugged cultures drive Biz & AppSec Value ==== | ||
+ | *Rugged devops | '''Josh Corman''' | ||
<br> | <br> |
Revision as of 06:15, 12 November 2012
- AppSecUSA Presentations and Talks
- 1 Thursday 25th Oct
- 1.1 10:00 am - 10:45 am
- 1.2 11:00 am - 11:45 am
- 1.2.1 Building a Web Attacker Dashboard with ModSecurity and BeEF
- 1.2.2 Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews
- 1.2.3 Cracking the Code of Mobile Application
- 1.2.4 Hacking .NET Application: Reverse Engineering 101
- 1.2.5 Doing the unstuck: How Rugged cultures drive Biz & AppSec Value
Thursday 25th Oct
10:00 am - 10:45 am
Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements
- Developer | John Benninghoff
Top Ten Web Defenses
- Mobile | Jim Manico
Mobile Applications & Proxy Shenanigans
- Mobile | Dan Amodio
Reverse Engineering “Secure” HTTP APIs With An SSL Proxy
- Reverse Engineering | Alejandro Caceres
Gauntlt: Rugged by Example
- Rugged devops | Jeremiah Shirk
11:00 am - 11:45 am
Building a Web Attacker Dashboard with ModSecurity and BeEF
- Attack | Ryan Barnett
Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews
- Developer | Sherif Koussa
Cracking the Code of Mobile Application
- Mobile | Sreenarayan Ashokkumar
Hacking .NET Application: Reverse Engineering 101
- Reverse Engineering | Jon Mccoy
Doing the unstuck: How Rugged cultures drive Biz & AppSec Value
- Rugged devops | Josh Corman