This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
AppSecUSA 2012.com
From OWASP
- AppSecUSA Presentations and Talks
- 1 Thursday 25th Oct
- 1.1 10:00 am - 10:45 am
- 1.2 11:00 am - 11:45 am
- 1.2.1 Building a Web Attacker Dashboard with ModSecurity and BeEF
- 1.2.2 Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews
- 1.2.3 Cracking the Code of Mobile Application
- 1.2.4 Hacking .NET Application: Reverse Engineering 101
- 1.2.5 Doing the unstuck: How Rugged cultures drive Biz & AppSec Value
Thursday 25th Oct
10:00 am - 10:45 am
Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements
- Developer | John Benninghoff
Top Ten Web Defenses
- Mobile | Jim Manico
Mobile Applications & Proxy Shenanigans
- Mobile | Dan Amodio
Reverse Engineering “Secure” HTTP APIs With An SSL Proxy
- Reverse Engineering | Alejandro Caceres
Gauntlt: Rugged by Example
- Rugged devops | Jeremiah Shirk
11:00 am - 11:45 am
Building a Web Attacker Dashboard with ModSecurity and BeEF
- Attack | Ryan Barnett
Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews
- Developer | Sherif Koussa
Cracking the Code of Mobile Application
- Mobile | Sreenarayan Ashokkumar
Hacking .NET Application: Reverse Engineering 101
- Reverse Engineering | Jon Mccoy
Doing the unstuck: How Rugged cultures drive Biz & AppSec Value
- Rugged devops | Josh Corman