This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Projects/OWASP LAPSE Project"

From OWASP
Jump to: navigation, search
 
(26 intermediate revisions by 3 users not shown)
Line 1: Line 1:
 
{{Template:Project About
 
{{Template:Project About
| project_name = OWASP LAPSE Project
+
| project_name =OWASP LAPSE Project
| project_home_page = OWASP LAPSE Project
+
| project_home_page =OWASP LAPSE Project
 +
| project_description =LAPSE stands for a <u>L</u>ightweight <u>A</u>nalysis for <u>P</u>rogram <u>S</u>ecurity in <u>E</u>clipse. LAPSE is designed to help with the task of auditing <b>Java EE Applications</b> for common types of security vulnerabilities found in Web Applications. LAPSE was developed by [http://suif.stanford.edu/~livshits/ Benjamin Livshits] as part of the [http://suif.stanford.edu/~livshits/work/griffin/ Griffin Software Security Project]. The project's second push is being led by Pablo Martín Pérez, [http://www.evalues.es/index.php/en.html  Evalues Lab] ICT Security Researcher, developing LAPSE+, an enhanced version of LAPSE.
 +
| project_license =[http://www.gnu.org/licenses/gpl-3.0-standalone.html GNU General Public License v3]
 +
| leader_name1 =Gregory Disney-Leugers
 +
| leader_email1 [email protected]
 +
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp-lapse
 +
| project_road_map = http://www.owasp.org/index.php/OWASP_LAPSE_Project/Roadmap
  
| project_description = https://lists.owasp.org/mailman/admin/owasp-lapse
+
| links_url1 = http://www.evalues.es/index.php/en.html
 +
| links_name1 = Evalues - IT Security Evaluation
  
| project_license =
+
| links_url2 = http://research.microsoft.com/en-us/um/people/livshits/
 +
| links_name2 = Former project's lead, Ben Livshits, web page
  
| leader_name1 = Pablo Martín Pérez
+
| links_url3 = http://www.owasp.org/index.php/OWASP_Java_Project
| leader_email1 = pablo.perez@owasp.org
+
| links_name3 = OWASP Java Project
| leader_username1 =  
 
  
| contributor_name[1-10] =
 
| contributor_email[1-10] =
 
| contributor_username[1-10] =
 
 
| pamphlet_link =
 
 
| presentation_link =
 
 
| mailing_list_name =
 
 
| project_road_map =
 
 
| links_url[1-10] =
 
| links_name[1-10] =
 
 
| release_1 =
 
| release_2 =
 
| release_3 =
 
| release_4 =
 
 
}}
 
}}

Latest revision as of 04:52, 17 February 2014

PROJECT INFO
What does this OWASP project offer you?
RELEASE(S) INFO
What releases are available for this project?
what is this project?
Name: OWASP LAPSE Project (home page)
Purpose: LAPSE stands for a Lightweight Analysis for Program Security in Eclipse. LAPSE is designed to help with the task of auditing Java EE Applications for common types of security vulnerabilities found in Web Applications. LAPSE was developed by Benjamin Livshits as part of the Griffin Software Security Project. The project's second push is being led by Pablo Martín Pérez, Evalues Lab ICT Security Researcher, developing LAPSE+, an enhanced version of LAPSE.
License: GNU General Public License v3
who is working on this project?
Project Leader(s):
  • Gregory Disney-Leugers @
how can you learn more?
Project Pamphlet: Not Yet Created
Project Presentation:
Mailing list: Mailing List Archives
Project Roadmap: View
Main links:
Key Contacts
  • Contact Gregory Disney-Leugers @ to contribute to this project
  • Contact Gregory Disney-Leugers @ to review or sponsor this project
current release
LapsePlus 2.8.1 - March 2011 - (download)
Release description: LAPSE+ is a security scanner for detecting vulnerabilities of untrusted data injection in Java EE Applications. It has been developed as a plugin for Eclipse Java Development Environment, working specifically with Eclipse Helios and Java 1.6 or higher. LAPSE+ is based on the GPL software LAPSE, developed by the SUIF Compiler Group of Stanford University. This new release of the plugin developed by Evalues Lab of Universidad Carlos III de Madrid provides more features to analyze the propagation of the malicious data through the application and includes the identification of new vulnerabilities.
Rating: Yellow button.JPG Not Reviewed - Assessment Details
last reviewed release
Not Yet Reviewed


other releases