This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP AppSec Research 2010 - Stockholm, Sweden"

From OWASP
Jump to: navigation, search
(Added William Robertson, UCSB to the PC list)
(AppSec Research Challenge 2: OWASP Crossword Puzzle)
Line 69: Line 69:
 
• Ulf Lindqvist, SRI International<br />
 
• Ulf Lindqvist, SRI International<br />
 
• William Robertson, UC Santa Barbara<br />
 
• William Robertson, UC Santa Barbara<br />
 +
 +
==AppSec Research Challenge 2: OWASP Crossword Puzzle==
 +
 +
It's the 21st of the month and July's challenge is here! To show that the challenges will not be all code we give you an OWASP crossword puzzle.
 +
 +
[[Image:Appsec_research_2010_challenge_2.gif]]
 +
 +
'''Email your solution to John Wilander <[email protected]>'''. You can either attach a gif/png with your solution drawn into the crossword, or you can send is as a 16x12 ASCII character block using the hash sign '#' for boxes that should not be filled with single letters. The first correct answer wins a free ticket to the conference. The free ticket is personal and the judgement of the organizing committee can not be overruled :).
 +
  
 
==AppSec Research Challenge 1: Input Validation and Regular Expressions==
 
==AppSec Research Challenge 1: Input Validation and Regular Expressions==
 +
 +
'''This challenge is over'''. The winner was Partik Nordlén. To see the solution(s), please visit the [https://lists.owasp.org/pipermail/appsec_eu_2010/2009-July/000000.html appsec_eu_2010 mailing list archive].
  
 
''Some people, when confronted with a problem, think “I know, I'll use regular expressions.” Now they have two problems.''<br />
 
''Some people, when confronted with a problem, think “I know, I'll use regular expressions.” Now they have two problems.''<br />

Revision as of 18:21, 21 July 2009

Invitation

Ladies and Gentlemen,

In June 21-24, 2010 let's all meet in beautiful Stockholm, Sweden. The OWASP chapters in Sweden, Norway, and Denmark hereby invite you to OWASP AppSec Research 2010.

If you have any questions, please email the conference chair: john.wilander at owasp.org

Stockholm old town small.jpg

"AppSec Research".equals("AppSec Europe")

This conference was formerly known as OWASP AppSec Europe. We have added 'Research' to highlight that we invite both industry and academia. All the regular AppSec Europe visitors and topics are welcome along with contributions from universities and research institutes.

This will be the European conference for anyone interested in or working with application security. Co-host is the Department of Computer and Systems Science at Stockholm University, offering a great venue in the fabulous Aula Magna.

Countdown Challenges -- Free Tickets to Win!

There will be a challenge posted on the conference wiki page the 21st every month up until the event. The winner will get free entrance to the conference. What are you waiting for? The first challenge is posted below. Go, go, go!

Organizing Committee

• John Wilander, chapter leader Sweden (chair)
• Mattias Bergling (vice chair)
• Alan Davidson, Stockholm University/Royal Institute of Technology (co-host)
• Ulf Munkedal, chapter leader Denmark
• Kåre Presttun, chapter leader Norway
• Stefan Pettersson (sponsoring coordinator)
• Carl-Johan Bostorp (schedule and event coordinator)
• Martin Holst Swende (coffee/lunch/dinner)
• Kate Hartmann, OWASP
• Sebastien Deleersnyder, OWASP Board

Welcome to Stockholm next year!
Regards, John Wilander

Call for Papers and Proposals

We offer two options:
1. Full papers. Peer-reviewed 12 page papers that will be published in formal proceedings by Springer-Verlag Lecture Notes in Computer Science (final approval pending).
2. Presentation proposals. A presentation proposal should consist of a 2-page position paper representing the essential matter proposed by the speaker(s). Proposals must include sufficient material for the reviewers to make an informed decision.

Topics of Interest

We encourage the publication and presentation of new tools, new methods, empirical data, novel ideas, and lessons learned in the following areas: •    Web application security
•    Security aspects of new/emerging web technologies/paradigms (mashups, web 2.0,  offline support, etc)
•    Security in web services, REST, and service oriented architectures
•    Security in cloud-based services
•    Security of frameworks (Struts, Spring, ASP.Net MVC etc)
•    New security features in platforms or languages
•    Next-generation browser security
•    Security for the mobile web
•    Secure application development (methods, processes etc)
•    Threat modeling of applications
•    Vulnerability analysis (code review, pentest, static analysis etc)
•    Countermeasures for application vulnerabilities
•    Metrics for application security
•    Application security awareness and education

Submission Deadline and Instructions

Submission deadline is Sunday February 7th 23:59 (Apia, Samoa time). Submissions should be at most 12 pages long in the Springer LNCS style for "Proceedings and Other Multiauthor Volumes". Templates for preparing papers in this style for LaTeX, Word, etc can be downloaded from: http://www.springer.com/computer/lncs?SGWID=0-164-7-72376-0. Full papers must be submitted in a form suitable for anonymous review: remove author names and affiliations from the title page, and avoid explicit self-referencing in the text.

Program Committee

• John Wilander, Omegapoint and Linköping University (chair)
• Alan Davidson, Stockholm University/Royal Institute of Technology (co-host)
• Andrei Sabelfeld, Chalmers UT
• Engin Kirda, Institute Eurecom
• Lieven Desmet, Katholieke Universiteit Leuven
• Martin Johns, University of Passau
• Christoph Kern, Google
• Sergio Maffeis, Imperial College London
• Ulf Lindqvist, SRI International
• William Robertson, UC Santa Barbara

AppSec Research Challenge 2: OWASP Crossword Puzzle

It's the 21st of the month and July's challenge is here! To show that the challenges will not be all code we give you an OWASP crossword puzzle.

Appsec research 2010 challenge 2.gif

Email your solution to John Wilander <[email protected]>. You can either attach a gif/png with your solution drawn into the crossword, or you can send is as a 16x12 ASCII character block using the hash sign '#' for boxes that should not be filled with single letters. The first correct answer wins a free ticket to the conference. The free ticket is personal and the judgement of the organizing committee can not be overruled :).


AppSec Research Challenge 1: Input Validation and Regular Expressions

This challenge is over. The winner was Partik Nordlén. To see the solution(s), please visit the appsec_eu_2010 mailing list archive.

Some people, when confronted with a problem, think “I know, I'll use regular expressions.” Now they have two problems.
        --Jamie Zawinski, in comp.emacs.xemacs

The 21st of each month up until the conference in June 2010 we'll have a countdown challenge posted here. The winner each month will get a free entrance ticket worth about €300/$400. Be sure to sign up for the conference mailing list to get a monthly reminder.

The Challenge

A community is hosted on a very large domain, yahoogle.com. The users of that community all have profiles, where they are allowed to use basic HTML for customization, as well as JavaScript files hosted on the domain.

All the code for the profile pages are filtered on the server side, and whenever a piece of code containing "<script..." is encountered, the following regular expression is used to validate that the script loaded is hosted on a subdomain of yahoogle.com:

.*(<script){1}([^>]+)src=('http:\/\/[a-zA-Z]+.yahoogle.com\/scripts\/[0-9A-Za-z]+\.js').*\/>

Capture group 3 is then also checked against a whitelist of allowed scripts on that domain. The whitelist consists of "http://secure.yahoogle.com" and "http://scripts.yahoogle.com".

Your task is to formulate a snippet of HTML that goes correctly through the filter and the whitelist, but loads the script "http://insecure.com/evil.js" instead. Also, rework the regular expression to defend against your "attack".

Email your solution to Martin Holst Swende <[email protected]>. The first correct answer wins a free ticket to the conference. The free ticket is personal and the judgement of the organizing committee can not be overruled :).