This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "EUTour2013 Lisbon Agenda"

From OWASP
Jump to: navigation, search
(OWASP Europe Tour - Lisbon 2013)
(OWASP Europe Tour - Lisbon 2013)
 
(24 intermediate revisions by 2 users not shown)
Line 36: Line 36:
 
| valign="middle" bgcolor="#EEEEEE" align="left" | '''Venue Location: ISCTE-IUL University Institute of Lisbon, Aud. B2.03  <br>
 
| valign="middle" bgcolor="#EEEEEE" align="left" | '''Venue Location: ISCTE-IUL University Institute of Lisbon, Aud. B2.03  <br>
 
Venue Address: Avª das Forças Armadas, 1649-026 Lisboa'''<br>
 
Venue Address: Avª das Forças Armadas, 1649-026 Lisboa'''<br>
Venue Map: [https://maps.google.pt/maps?q=ISCTE+-+Lisbon+University+Institute,+Avenida+For%C3%A7as+Armadas,+Lisboa&hl=en&ie=UTF8&ll=38.74784,-9.153443&spn=0.006937,0.013915&sll=37.221852,-18.827504&sspn=14.485045,28.498535&oq=iscte&t=v&hq=ISCTE+-+Lisbon+University+Institute,+Avenida+For%C3%A7as+Armadas,+Lisboa&z=17 Google Maps]  
+
Venue Map: [https://maps.google.pt/maps?q=ISCTE+-+Lisbon+University+Institute,+Avenida+For%C3%A7as+Armadas,+Lisboa&hl=en&ie=UTF8&ll=38.74784,-9.153443&spn=0.006937,0.013915&sll=37.221852,-18.827504&sspn=14.485045,28.498535&oq=iscte&t=v&hq=ISCTE+-+Lisbon+University+Institute,+Avenida+For%C3%A7as+Armadas,+Lisboa&z=17 Google Maps] <br>
 +
[[image:locationmap01.png|800px]] <br>
 +
[[image:ISCTE mapa envolvente.png|800px]] <br>
 +
[[image:locationmap03.png]] <br>
 +
|-
 +
| valign="middle" bgcolor="#EEEEEE" align="center" | ''' Pictures '''
 +
| valign="middle" bgcolor="#EEEEEE" align="left" | [http://www.flickr.com/photos/iscteiul/sets/72157634250746526/with/9099830217/ Set 1] [https://plus.google.com/u/0/photos/113770963329765884729/albums/5892063386701578001 Set 2]  <br>
 
|-
 
|-
 
| align="center" style="background:#CCCCEE;" colspan="2" | '''Price and registration'''
 
| align="center" style="background:#CCCCEE;" colspan="2" | '''Price and registration'''
Line 53: Line 59:
 
| style="width:45%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Title / Description'''
 
| style="width:45%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Title / Description'''
 
|-
 
|-
| style="width:8%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | xx:xx - xx:xx
+
| style="width:8%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | 14:00
 
| style="width:20%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="3" | Opening
 
| style="width:20%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="3" | Opening
 
|-
 
|-
| style="width:8%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | xx:xx - xx:xx
+
| style="width:8%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 14:15 - 15:15
 
| style="width:7%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[image:lievendesmet.png]]
 
| style="width:7%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[image:lievendesmet.png]]
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Lieven Desmet<BR>DistriNet Research Group, Katholieke Universiteit Leuven, OWASP Benelux.
+
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [http://people.cs.kuleuven.be/~lieven.desmet/ Lieven Desmet]<BR><BR>[http://www.cs.kuleuven.be/~distrinet/ DistriNet Research Group], [http://www.kuleuven.be/ Katholieke Universiteit Leuven], OWASP Benelux.
| style="width:65%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | '''Sandboxing JavaScript'''.<BR>- Discussing the problem of remote script inclusion based on an analysis of the Top 10.000 websites; - Overview of JavaScript sandboxing techniques, with particular focus on JSand (ie. a prototype we have developed at KU Leuven).
+
| style="width:65%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | '''Sandboxing JavaScript'''.<BR><BR>- Discussing the problem of remote script inclusion based on an analysis of the Top 10.000 websites; - Overview of JavaScript sandboxing techniques, with particular focus on JSand (ie. a prototype we have developed at KU Leuven).<br>
 +
<center>{{#ev:youtube|igyePSLptG8}} </center>
 
|-
 
|-
| style="width:8%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | xx:xx - xx:xx
+
| style="width:8%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 15:15 - 16:00
 
| style="width:7%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[image:pedrofortuna.png]]
 
| style="width:7%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[image:pedrofortuna.png]]
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Pedro Fortuna.<BR>CTO, Auditmark.
+
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [http://www.linkedin.com/in/pedrofortuna Pedro Fortuna]<BR><BR>CTO, [http://www.auditmark.com Auditmark].
| style="width:65%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | '''Protecting JavaScript source code – Facts and Fiction'''.<BR>The goal of code obfuscation is to delay the understanding of a program does. It can be used, for example, in scenarios where the code contains Intellectual Property (algorithms) or when the owner wants to prevent a competitor for stealing and reusing the code. To achieve it, an obfuscation transformation translates easy to understand code into a much harder to understand form. But in order to be resilient, obfuscation transformations need also to resist automatic reversal performed using static or dynamic code analysis techniques. This presentation focuses on the specific case of JavaScript source obfuscation, main usage cases, presents some obfuscation examples and their value in providing real protection against reverse-engineering.  
+
| style="width:65%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | '''Protecting JavaScript source code – Facts and Fiction'''.<BR><BR>The goal of code obfuscation is to delay the understanding of a program does. It can be used, for example, in scenarios where the code contains Intellectual Property (algorithms) or when the owner wants to prevent a competitor for stealing and reusing the code. To achieve it, an obfuscation transformation translates easy to understand code into a much harder to understand form. But in order to be resilient, obfuscation transformations need also to resist automatic reversal performed using static or dynamic code analysis techniques. This presentation focuses on the specific case of JavaScript source obfuscation, main usage cases, presents some obfuscation examples and their value in providing real protection against reverse-engineering. <br>
|-
+
<center>{{#ev:youtube|J68iLsd525k}} <br>
| style="width:8%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | xx:xx - xx:xx
+
[http://www.slideshare.net/auditmark/owasp-eu-tour-2013-lisbon-pedro-fortuna-protecting-java-script-source-code-using-obfuscation Slides]</center>
| style="width:7%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[image:Vaguileradiaz.png]]
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Vicente Aguillera.<BR>OWASP Spain Chapter Leader. Socio y Director Dpto. Auditoría en Internet Security Auditors.
 
| style="width:65%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | '''Android reverse engineering: understanding third-party applications'''.<BR>It will present the objectives of the software reverse engineering and the techniques and tools to execute this process in Android applications. It will present, from a security analyst point of view and in a practical manner, the process of analyzing an existing application at Google Play Store.
 
 
|-
 
|-
| style="width:8%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | xx:xx - xx:xx
+
| style="width:8%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 16:00 - 16:45
 
| style="width:7%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[image:ricardomelo.png]]
 
| style="width:7%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[image:ricardomelo.png]]
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Ricardo Melo.<BR>DRI CTO.
+
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [http://www.dri-global.com/who-we-are/team/ricardo-melo Ricardo Melo]<BR><BR>CTO, [http://www.dri-global.com DRI].
| style="width:65%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | '''PHP and Application Security'''.<BR>To which level can PHP and application security cohexist? The presentation will provide information about the most security critical aspects while developing a PHP web application.
+
| style="width:65%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | '''PHP and Application Security'''.<BR><BR>To which level can PHP and application security cohexist? The presentation will provide information about the most security critical aspects while developing a PHP web application.<br>
 +
<center>{{#ev:youtube|NTc5cZKZGF0}}<br>
 +
[http://www.slideshare.net/rjsmelo/ricardo-melo-owasp201306 Slides]</center>
 
|-
 
|-
| style="width:8%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | xx:xx - xx:xx
+
| style="width:8%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 16:45 - 17:30
| style="width:7%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[image:tiagorodrigues.png]]
+
| style="width:7%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[image:tiagohenriques.png]]
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Tiago Rodrigues.<BR>Founder and Team Leader of PTCoreSec.
+
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [http://www.linkedin.com/in/balgan Tiago Henriques]<BR><BR>Founder and Team Leader of [http://ptcoresec.eu PTCoreSec].
| style="width:65%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | '''Software - vulnerabilities and needs'''.<BR>Nesta talk, iremos falar sobre formas comuns que os atacantes usam para comprometer maquinas, perceber em detalhe como algumas das ferramentas usadas funcionam, e como até para entregar o IRS nos colocamos em perigo.  
+
| style="width:65%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | '''Software - vulnerabilities and needs'''.<BR><BR>In this talk he will discuss some of the most common ways attackers can use to compromise your computers, understand the details of how some of the tools can be used to achieve this and even how when we are sending our taxes online (IRS) we put ourselves in danger. How can a simple link or opening a simple PDF file give and attacker remote access to your computer systems.<br>
Iremos ver como apenas clicar num link ou abrir um PDF pode remotamente dar acesso a um atacante e o que pode esse atacante fazer depois de obter controlo da maquina da sua vitima.
+
<center>{{#ev:youtube|Gt_mBg21kLk}} </center>
 
|-
 
|-
| style="width:8%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | xx:xx - xx:xx
+
| style="width:8%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 17:30 - 18:15
 
| style="width:7%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[image:diniscruz.png]]
 
| style="width:7%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[image:diniscruz.png]]
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Dinis Cruz.<BR>.
+
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [http://uk.linkedin.com/in/diniscruz Dinis Cruz]<BR><BR>OWASP [https://www.owasp.org/index.php/OWASP_O2_Platform OWASP O2 Platform] project
| style="width:65%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | '''TBD'''.<BR>
+
| style="width:65%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | '''Scripting Application Security'''<BR>Pentesting at the speed of Scripting (using O2 Platform) -
 +
This presentation will show how the OWASP O2 Platform scripting capabilities can be used to 'codify' an pen-testers mind/action and perform advanced analysis, fuzzing and exploitation of both Web and desktop-based Applications.<br>
 +
<center>{{#ev:youtube|71FuVIFnTFI}} </center>
 
|-
 
|-
| style="width:8%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | xx:xx - xx:xx
+
| style="width:8%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | 18:30
 
| style="width:7%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="3" | Closure
 
| style="width:7%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="3" | Closure
 
|}
 
|}

Latest revision as of 23:45, 25 June 2013

Eu tour1.png

OWASP EUROPE TOUR 2013

Tour Home Page
Tour Scheadule
Tour Organizers Resources
Mailing List

CONFERENCE

OWASP Europe Tour - Lisbon 2013

Friday 21st June (Conference)

DESCRIPTION
OWASP Europe TOUR, is an event across the European region that promotes awareness about application security, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.
  • Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document & Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle.
  • This event aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them.
OWASP MEMBERSHIP
During the OWASP Europe Tour you could become a member and support our mission.

Become an OWASP member by clicking here


CONFERENCE (Friday 21st June)

Date Location
Friday 21st June Venue Location: ISCTE-IUL University Institute of Lisbon, Aud. B2.03

Venue Address: Avª das Forças Armadas, 1649-026 Lisboa
Venue Map: Google Maps
Locationmap01.png
ISCTE mapa envolvente.png
Locationmap03.png

Pictures Set 1 Set 2
Price and registration
This event is FREE
Registration Link to the Europe Tour (Lisboa): Registration



Conference Details
Time Speaker Title / Description
14:00 Opening
14:15 - 15:15 Lievendesmet.png Lieven Desmet

DistriNet Research Group, Katholieke Universiteit Leuven, OWASP Benelux.
Sandboxing JavaScript.

- Discussing the problem of remote script inclusion based on an analysis of the Top 10.000 websites; - Overview of JavaScript sandboxing techniques, with particular focus on JSand (ie. a prototype we have developed at KU Leuven).
15:15 - 16:00 Pedrofortuna.png Pedro Fortuna

CTO, Auditmark.
Protecting JavaScript source code – Facts and Fiction.

The goal of code obfuscation is to delay the understanding of a program does. It can be used, for example, in scenarios where the code contains Intellectual Property (algorithms) or when the owner wants to prevent a competitor for stealing and reusing the code. To achieve it, an obfuscation transformation translates easy to understand code into a much harder to understand form. But in order to be resilient, obfuscation transformations need also to resist automatic reversal performed using static or dynamic code analysis techniques. This presentation focuses on the specific case of JavaScript source obfuscation, main usage cases, presents some obfuscation examples and their value in providing real protection against reverse-engineering.

Slides
16:00 - 16:45 Ricardomelo.png Ricardo Melo

CTO, DRI.
PHP and Application Security.

To which level can PHP and application security cohexist? The presentation will provide information about the most security critical aspects while developing a PHP web application.

Slides
16:45 - 17:30 Tiagohenriques.png Tiago Henriques

Founder and Team Leader of PTCoreSec.
Software - vulnerabilities and needs.

In this talk he will discuss some of the most common ways attackers can use to compromise your computers, understand the details of how some of the tools can be used to achieve this and even how when we are sending our taxes online (IRS) we put ourselves in danger. How can a simple link or opening a simple PDF file give and attacker remote access to your computer systems.
17:30 - 18:15 Diniscruz.png Dinis Cruz

OWASP OWASP O2 Platform project
Scripting Application Security
Pentesting at the speed of Scripting (using O2 Platform) -

This presentation will show how the OWASP O2 Platform scripting capabilities can be used to 'codify' an pen-testers mind/action and perform advanced analysis, fuzzing and exploitation of both Web and desktop-based Applications.

18:30 Closure