This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Belgium"
LievenDesmet (talk | contribs) (→PRESENTATIONS) |
|||
Line 30: | Line 30: | ||
− | == Next Meeting (5th of March 2013) in Leuven == | + | == Next Meeting (6th of June 2013) in Leuven == |
+ | |||
+ | === WHEN === | ||
+ | 6th of June 2013 (18h00 - 21h00) | ||
+ | |||
+ | === WHERE === | ||
+ | This chapter meeting is part of the [[EUTour2013| OWASP Europe Tour 2013]] | ||
+ | |||
+ | <BR/> | ||
+ | Hosted by [http://distrinet.cs.kuleuven.be Distrinet Research Group (K.U.Leuven)]. | ||
+ | |||
+ | Address: <br> | ||
+ | '''Welcome & Sandwiches:''' <br>Department of Computer Science (foyer at ground floor)<br> Celestijnenlaan 200 A<br> 3001 Heverlee ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&nbol=(50.864186697481145,%204.678754210472107)&zoomlevel=17&plaatsnaam=Department+of+Computer+Science&maptype=roadmap google maps])<br> | ||
+ | '''Talks:''' <br>Celestijnenlaan 200L, Auditorium L.00.06<br> 3001 Heverlee ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&nbol=(50.86327251977556,%204.679660797119141)&zoomlevel=17&plaatsnaam=200L.00.06&maptype=roadmap google maps])<br> | ||
+ | |||
+ | Routemap: http://distrinet.cs.kuleuven.be/about/route/ | ||
+ | |||
+ | === PROGRAM === | ||
+ | The agenda: | ||
+ | *17h30 - 18h15: '''Welcome & sandwiches'''<br> | ||
+ | *18h15 - 18h30: '''OWASP Update''' (by Sebastien Deleersnyder, OWASP Belgium Board)<br> | ||
+ | *18h30 - 19h30: '''Needles in haystacks, we we are not solving the appsec problem & html hacking the browser, CSP is dead.''' (by Eoin Keary, CTO and founder of BCC Risk Advisory Ltd.)<br> | ||
+ | :TBD | ||
+ | *19h30 - 20h30: '''Teaching an Old Dog New Tricks: Securing Development with PMD''' (by Justin Clarke, Director and Co-Founder of Gotham Digital Science)<br> | ||
+ | :Using static analysis to identify software bugs is not a new paradigm. For years, developers have used static analysis tools to identifying code quality issues. While these tools may not be specifically designed for identifying security bugs. This presentation will discuss how custom security rules can be added to existing code quality tools to identify potential software security bugs. Writing custom software security rules for the popular Java code scanning tool PMD will be the focus of the presentation. | ||
+ | :Justin Clarke is a Director and Co-Founder of Gotham Digital Science. He is the lead author/technical editor of "SQL Injection Attacks and Defense" (Syngress), co-author of "Network Security Tools" (O'Reilly), contributor to "Network Security Assessment, 2nd Edition" (O'Reilly), as well as a speaker at numerous security conferences and events such as Black Hat, EuSecWest, ISACA, BruCON, OWASP AppSec, OSCON, RSA and SANS. Justin is the Chapter Leader for the OWASP London chapter in the United Kingdom. | ||
+ | *20h30 - 21h30: '''Vulnerability Prediction in Android Applications''' (by Aram Hovsepyan, Ph. D.)<br> | ||
+ | :We present an approach to predict which components of a software system contain security vulnerabilities. Prediction models are a key instrument to identify the weak spots that deserve special scrutiny. Our approach is based on text mining the source code of an application. We have explored the potential of the bag-of-words representation and discovered that a dependable prediction model can be built by means of machine learning techniques. In a validation with 10 Android applications we have obtained performance results that often outclass state-of-the-art approaches. | ||
+ | |||
+ | |||
+ | === REGISTRATION === | ||
+ | Please register via [https://owasp-belgium-2013-06-06.eventbrite.com/] | ||
+ | |||
+ | == Previous Meeting (5th of March 2013) in Leuven == | ||
=== WHEN === | === WHEN === | ||
Line 60: | Line 93: | ||
:Designers of banking security systems are faced with a difficult challenge of developing technology within a tightly constrained budget, yet which must be capable of defeating attacks by determined, well-equipped criminals. This talk will summarise banking security technologies for protecting Chip and PIN/EMV card payments, online shopping, and online banking. The effectiveness of the security measures will be discussed, along with vulnerabilities discovered in them both by academics and by criminals. These vulnerabilities include cryptographic flaws, failures of tamper resistance, and poor implementation decisions, and have led not only to significant financial losses, but in some cases unfair allocation of liability. Proposed improvements will also be described, not only to the technical failures but also to the legal and regulatory regimes which are the underlying reason for some of these problems not being properly addressed. | :Designers of banking security systems are faced with a difficult challenge of developing technology within a tightly constrained budget, yet which must be capable of defeating attacks by determined, well-equipped criminals. This talk will summarise banking security technologies for protecting Chip and PIN/EMV card payments, online shopping, and online banking. The effectiveness of the security measures will be discussed, along with vulnerabilities discovered in them both by academics and by criminals. These vulnerabilities include cryptographic flaws, failures of tamper resistance, and poor implementation decisions, and have led not only to significant financial losses, but in some cases unfair allocation of liability. Proposed improvements will also be described, not only to the technical failures but also to the legal and regulatory regimes which are the underlying reason for some of these problems not being properly addressed. | ||
:'''Dr. Steven J. Murdoch''' is a Royal Society University Research Fellow in the Security Group of the University of Cambridge Computer Laboratory, working on developing metrics for security and privacy. His research interests include covert channels, banking security, anonymous communications, and censorship resistance. Following his PhD studies on anonymous communications, he worked with the OpenNet Initiative, investigating Internet censorship. He then worked for the Tor Project, on improving the security and usability of the Tor anonymity system. Currently he is supported by the Royal Society on developing methods to understand complex system security. He is also working on analyzing the security of banking systems especially Chip & PIN/EMV, and is Chief Security Architect of Cronto, an online authentication technology provider. | :'''Dr. Steven J. Murdoch''' is a Royal Society University Research Fellow in the Security Group of the University of Cambridge Computer Laboratory, working on developing metrics for security and privacy. His research interests include covert channels, banking security, anonymous communications, and censorship resistance. Following his PhD studies on anonymous communications, he worked with the OpenNet Initiative, investigating Internet censorship. He then worked for the Tor Project, on improving the security and usability of the Tor anonymity system. Currently he is supported by the Royal Society on developing methods to understand complex system security. He is also working on analyzing the security of banking systems especially Chip & PIN/EMV, and is Chief Security Architect of Cronto, an online authentication technology provider. | ||
− | |||
− | |||
− | |||
=== PRESENTATIONS === | === PRESENTATIONS === |
Revision as of 15:11, 22 May 2013
OWASP Belgium
Welcome to the Belgium chapter homepage. The chapter leader is Sebastien Deleersnyder
Participation
OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.
Sponsorship/Membership
to this chapter or become a local chapter supporter.
Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member?