This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Israel 2009 12"
(→Decompilation Injection) |
(→OWASP DC 2009 Highlights) |
||
Line 7: | Line 7: | ||
== '''Agenda''' == | == '''Agenda''' == | ||
− | == OWASP | + | == OWASP AppSec US 2009 Highlights == |
'''Ofer Maor, Hacktics | '''Ofer Maor, Hacktics | ||
''' | ''' | ||
− | In this lecture we will review the highlights of the last | + | In this lecture we will review the highlights of the last OWASP AppSec Conference in DC. We review some of the trends in application security, and updates to OWASP Projects. Among other topics, we will discuss the upcoming launch of the new OWASP Top 10 (2010), which is now in Release Candidate state, and reflects the changes in the spread of various application attacks. |
+ | |||
+ | ([[Media:OWASP-Israel-2009-Dec_AppSecUS09Highlights_Ofer-Maor.ppt|Download Presentation]]) | ||
== Decompilation Injection == | == Decompilation Injection == |
Revision as of 16:02, 10 December 2009
The meeting will be held in Tuesday, Dec 8th, 2009.
Location: IBM/Watchfire Offices, Sapir 1, Herzliya Pituach
Map: [1]
Agenda
OWASP AppSec US 2009 Highlights
Ofer Maor, Hacktics
In this lecture we will review the highlights of the last OWASP AppSec Conference in DC. We review some of the trends in application security, and updates to OWASP Projects. Among other topics, we will discuss the upcoming launch of the new OWASP Top 10 (2010), which is now in Release Candidate state, and reflects the changes in the spread of various application attacks.
Decompilation Injection
Maty Siman, Checkmarx
The presentation will show a novel way to protect .NET assemblies against reverse-engineering and recompilation. By injecting them with commands that are activated only at the recompilation stage, the application retroactively detects the reverse-engineering process and acts upon it.