This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Summer of Code 2008 Applications"

From OWASP
Jump to: navigation, search
Line 10: Line 10:
 
= Applications - {Fill in below}  =
 
= Applications - {Fill in below}  =
  
== The Application Security Desk Reference - ASDR ==
+
== SoC 08 Application 1 ==
 
* Leonardo Cavallari Militelli,
 
* Leonardo Cavallari Militelli,
 +
* The Application Security Desk Reference - ASDR
 
* [[ASDR Table of Contents|ASDR Table of Contents]]
 
* [[ASDR Table of Contents|ASDR Table of Contents]]
 
* X
 
* X

Revision as of 17:40, 6 March 2008

This page contains project Applications to the OWASP Summer Of Code 2008

A few notes

  • If you want to apply for a SoC 2008 sponsorship you HAVE TO USE THIS PAGE for your application.
  • You can propose your project in any form you wish, but the best proposals will be well thought out, clear and concise, and reflective of your passion for the topic. We strongly suggest that you include this information in your proposal.

Applications - {Fill in below}

SoC 08 Application 1

SoC 08 Application 2

  • Eoin Keary,
  • OWASP Code review guide, V1.1

Code Review Guide Proposal:

Introduction:The code review guide is currently at version RC 2.0 and the second best selling OWASP book. I have received many positive comments regarding this initial version and believe it’s a key enabler for the OWASP fight against software insecurity.

It has even inspired individuals to build tools based on its information and I have convinced such people (Alessio Marziali) to open source their tool and make it an OWASP project.

The combination of a book on secure code review and a tool to support such an activity is very powerful as it gives the developer community a place to start regarding secure application development.

Proposal: I am proposing that I improve the code review guide from a number of aspects. This should place the guide as a de facto secure code review guide in the application security industry.

Additional and expanded Chapters:

Transactional analysis
Expand chapter.
Examples via diagrams.

Threat Modeling and Analysis
The approach to examining an application to be reviewed.
Focusing on areas of interest.

Example reports and how to write one
How to determine the risk level of a finding.

Automated code review
Code crawler documentation and usage.

Rich Internet Applications
Expanded chapters on Flash, Ajax.

The OWASP ESAPI (Enterprise Security API)
What it is, Why use it. What to review.

Code review Metrics:
How to compile, use and analyse metrics.
Rolling out metrics in the Enterprise.

Integrating Code review with an existing SDLC Integration of Secure Code review with an existing SDLC.
Secure Code review roadmap definition.
Documentation requirements.
Scope definition.
SDLC steering comittee establishment.
Performace criteria, benchmarks and metrics.
Integration of SDLC results into key IT governance areas.
Critical success factors.


SoC 08 Application 3

  • First name or Alias,
  • Project name,
  • X
  • Y

SoC 08 Application 4

  • First name or Alias,
  • Project name,
  • X
  • Y