This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "AppSecUSA 2012.com"
From OWASP
Line 135: | Line 135: | ||
==== Unbreakable Oracle ERPs? Attacks on Siebel & JD Edwards ==== | ==== Unbreakable Oracle ERPs? Attacks on Siebel & JD Edwards ==== | ||
*'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | *'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | ||
+ | |||
+ | === 1:00 pm - 1:45 pm === | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ==== Builders Vs. Breakers ==== | ||
+ | *'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | ||
+ | |||
+ | ==== Real World Cloud Application Security ==== | ||
+ | *'''Jason Chan''' | Cloud | ||
+ | |||
+ | ==== NoSQL, no security? ==== | ||
+ | *'''Will Urbanski''' | Architecture | ||
+ | |||
+ | ==== SQL Server Exploitation, Escalation, and Pilfering ==== | ||
+ | *'''Antti Rantasaari, Scott Sutherland''' | Attack | ||
+ | |||
+ | ==== Iran's real life cyberwar ==== | ||
+ | *'''Phillip Hallam-Baker''' | Case Studies | ||
<br> | <br> |
Revision as of 03:54, 18 November 2012
- AppSecUSA Presentations and Talks
- 1 Thursday 25th Oct
- 1.1 10:00 am - 10:45 am
- 1.2 11:00 am - 11:45 am
- 1.2.1 Building a Web Attacker Dashboard with ModSecurity and BeEF
- 1.2.2 Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews
- 1.2.3 Cracking the Code of Mobile Application
- 1.2.4 Hacking .NET Application: Reverse Engineering 101
- 1.2.5 Doing the unstuck: How Rugged cultures drive Biz & AppSec Value
- 1.3 2:00 pm - 2:45 pm
- 1.4 3:00 pm - 3:45 pm
- 1.4.1 Exploiting Internal Network Vulns via the Browser using BeEF Bind
- 1.4.2 The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code & Server Side Memory Structure of ANY Application (OWASP ZAP extension)
- 1.4.3 Demystifying Security in the Cloud: AWS Scout
- 1.4.4 I>S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST
- 1.4.5 Rebooting (secure) software development with continuous deployment
- 1.5 4:00 pm - 4:45 pm
- 2 Friday 26th Oct
- 2.1 10:00 am - 10:45 am
- 2.2 11:00 am - 11:45 am
- 2.2.1 The Same-Origin Saga
- 2.2.2 Hack your way to a degree: a new direction in teaching application security at universities
- 2.2.3 The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems
- 2.2.4 Blended Threats and JavaScript: A Plan for Permanent Network Compromise
- 2.2.5 Unbreakable Oracle ERPs? Attacks on Siebel & JD Edwards
- 2.3 1:00 pm - 1:45 pm
Thursday 25th Oct
10:00 am - 10:45 am
Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements
- John Benninghoff | Developer
Top Ten Web Defenses
- Jim Manico | Mobile
Mobile Applications & Proxy Shenanigans
- Dan Amodio | Mobile
Reverse Engineering “Secure” HTTP APIs With An SSL Proxy
- Alejandro Caceres | Reverse Engineering
Gauntlt: Rugged by Example
- Jeremiah Shirk | Rugged devops
11:00 am - 11:45 am
Building a Web Attacker Dashboard with ModSecurity and BeEF
- Ryan Barnett | Attack
Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews
- Sherif Koussa | Developer
Cracking the Code of Mobile Application
- Sreenarayan Ashokkumar | Mobile
Hacking .NET Application: Reverse Engineering 101
- Jon Mccoy | Reverse Engineering
Doing the unstuck: How Rugged cultures drive Biz & AppSec Value
- Josh Corman | Rugged devops
2:00 pm - 2:45 pm
Hacking with WebSockets
- Vaagn Toukharian | Attack
Bug Bounty Programs
- Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice | Developer
How we tear into that little green man
- Mathew Rowley | Mobile
AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life
- Jerry Hoff | Developer
Put your robots to work: security automation at Twitter
- Justin Collins, Neil Matatall, Alex Smolen | Rugged devops
3:00 pm - 3:45 pm
Exploiting Internal Network Vulns via the Browser using BeEF Bind
- Michele Orru | Attack
The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code & Server Side Memory Structure of ANY Application (OWASP ZAP extension)
- Shay Chen | Developer
Demystifying Security in the Cloud: AWS Scout
- Jonathan Chittenden | Cloud
I>S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST
- Ofer Maor | Developer
Rebooting (secure) software development with continuous deployment
- Nick Galbreath | Rugged devops
4:00 pm - 4:45 pm
Cross Site Port Scanning
- Riyaz Walikar | Attack
Analyzing and Fixing Password Protection Schemes
- John Steven | Developer
Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods
- Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner | Attack
WTF - WAF Testing Framework
- Yaniv Azaria, Amichai Shulman | Architecture
DevOps Distilled: The DevOps Panel at AppSec USA
- Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett | Rugged devops
Friday 26th Oct
10:00 am - 10:45 am
Effective approaches to web application security
- Zane Lackey | Developer
Why Web Security Is Fundamentally Broken
- Jeremiah Grossman | Developer
Payback on Web Attackers: Web Honeypots
- Simon Roses Femerling | Architecture
Spin the bottle: Coupling technology and SE for one awesome hack
- David Kennedy | Attack
Incident Response: Security After Compromise
- Richard Bejtlich | Case Studies
11:00 am - 11:45 am
The Same-Origin Saga
- Brendan Eich | Developer
Hack your way to a degree: a new direction in teaching application security at universities
- Konstantinos Papapanagiotou | Developer
The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems
- Dan Cornell, Josh Sokol | Architecture
Blended Threats and JavaScript: A Plan for Permanent Network Compromise
- Phil Purviance | Attack
Unbreakable Oracle ERPs? Attacks on Siebel & JD Edwards
- Juan Perez-Etchegoyen, Jordan Santarsieri | Case Studies
1:00 pm - 1:45 pm
Builders Vs. Breakers
- Brett Hardin, Matt Konda, Jon Rose | Developer
Real World Cloud Application Security
- Jason Chan | Cloud
NoSQL, no security?
- Will Urbanski | Architecture
SQL Server Exploitation, Escalation, and Pilfering
- Antti Rantasaari, Scott Sutherland | Attack
Iran's real life cyberwar
- Phillip Hallam-Baker | Case Studies