This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Summit 2011 Schedule"

From OWASP
Jump to: navigation, search
Line 62: Line 62:
 
| valign="middle" height="30" bgcolor="#EEEEEE" style="width:25%" |  
 
| valign="middle" height="30" bgcolor="#EEEEEE" style="width:25%" |  
 
| valign="middle" height="30" bgcolor="#EEEEEE" style="width:25%" |  
 
| valign="middle" height="30" bgcolor="#EEEEEE" style="width:25%" |  
| valign="middle" height="30" bgcolor="#EEEEEE" style="width:25%" | [[:Working Sessions No Fluff Just Stuff|'''Protecting against CSRF'']] <br>
+
| valign="middle" height="30" bgcolor="#EEEEEE" style="width:25%" | [[:Working Sessions No Fluff Just Stuff|'''Protecting against CSRF''']] <br>
 
*Hygiene: Discuss/show frames-busting, cross-domain policy; Discuss referrer and other red herrings <br>
 
*Hygiene: Discuss/show frames-busting, cross-domain policy; Discuss referrer and other red herrings <br>
 
*Tokens (crafting, scoping, and checking)<br>
 
*Tokens (crafting, scoping, and checking)<br>

Revision as of 00:31, 14 December 2010

Global Summit 2011 Home Page
Global Summit 2011 Working Sessions

Browser Security Track
Cross-Site Scripting Eradication Track
University Outreach Track
No Fluff, Just Stuff Track
OWASP Global Committees


Summit 2011 Working Sessions

If you're interested in adding a Working Session for the 2011 Summit, there still is time. This list will be finalized a couple of days before the actual Summit, so get in touch with us soon. Contact Lorna Alamri or Sarah Baso for more information.

Please review the Working Session methodology for Working Session rules.

Track 1: Browser Security Track 2: Cross-Site Scripting Eradication Track 3: University Outreach and Education Track 4: No Fluff, Just Stuff
Click on the working session name to see more details about that particular session. During the Summit these working session pages will be used to document discussions and outcomes.
Browser Security Cross-Site Scripting: Frameworks University Outreach Applying ESAPI input validation
  • Serial Decomp: Decode, canonicalize, filter
  • Structured data (SSN, CC, etc.)
  • Unstructured data (comments, blogs, etc.)
  • Other input exaples (ws-, database, etc.)
Browser Security: Sandboxing Cross-Site Scripting: Awarenes, Resources, and Partnerships Defining AppSensor sensors for:
  • Forced Browsing
  • Request Velocity
  • Unexpected encodings
  • Impersonation (Sudden user switch)
Browser Security: Securing Plugins Managing Sessions
  • Across requests
  • Across containers
  • Invalidating sessions (Timeout, attack event, logout)
  • Invalidating sessions (across containers, SSO token invalidation, user termination)
Browser Security: Enduser Warnings Protecting information stored client-side
  • Threat Modeling the problem
  • Protecting theft and re-playability of application-specific info (on client & in flight)
  • Protecting theft and re-playability of session-specific info (in flight)
  • Protecting session-specific information from attack on the client
Browser Security: Blacklisting Protecting against CSRF
  • Hygiene: Discuss/show frames-busting, cross-domain policy; Discuss referrer and other red herrings
  • Tokens (crafting, scoping, and checking)
  • Discussions, techniques on scale
  • Discussions, techniquest on CAPTCHA, re-auth, etc.
Browser Security: JavaScript Providing access to persisted data
  • Controlling visibility of tables by role
  • Providing access to safe SQL-like query through DAO layer
  • Discussions, techniques for providing secure'auto-wiring' / marshaling
  • Encoding and canonicalization for storage (or alternatively: Security concerns with heirarchical caching and object pooling)
Browser Security: OS Integration
Browser Security: New HTTP Headers
Enterprise Web Defense Roundtable
Track notes:



Track notes:



Track notes:



Track notes:





Track 5: <open> Track 6: <open> Track 7: <open> Track 8: OWASP Global Committees
Click on the working session name to see more details about that particular session. During the Summit these working session pages will be used to document discussions and outcomes.
OWASP Projects
Projects - Assessment Criteria & Orphaned Projects
Projects - Funding, Marketing, & Commerical Services
OWASP Connections
OWASP Chapters
OWASP Education
OWASP Conferences
OWASP Industry
OWASP Membership
Track notes:



Track notes:



Track notes:



Track notes: