OWASP AppSec Research 2012 July 10, 2012 to July 13, 2012, Athens, Greece

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Jackpotting Mobile Apps Christian Papathanasiou
Welcome:OWASP Foundation, Where we are Where we are Going Owasp denver Board N/A Security
Keynote: Software Security Goes Mobile Jacob West N/A
Teaching an Old Dog New Tricks Securing Development with PMD Justin Clarke N/A Security
OWASP Top Ten Defensive Techniques Jim Manico N/A Security Defence OWASP
Screw You and the Script You Rode in On David Byrne , Charles Henderson N/A Automation Defence
Unraveling some of the Mysteries around DOMbased XSS Dave Wichers N/A ExcludeThinkstScapes Cross-Site Scripting DOM-based XSS
Breaking is easy, preventing is hard Matias Madou N/A ExcludeThinkstScapes Static Analysis Grey Box Testing
What Permissions Does Your Database User REALLY Need? Dan Cornell N/A SQL Defence Databases
Keynote: From EasySQL to CPUs Duncan Harris N/A Security ExcludeThinkstScapes
Keynote: Finding Malware on a Web Scale Benjamin Livshits N/A Web ExcludeThinkstScapes Defence
Tricolour Alphanumerical Spaghetti Colin Watson N/A Security
CISOs Guide to Securing SharePoint Tsvika Klein N/A IncludeThinkstScapes SharePoint
I>S+D! Integrated Application Security Testing (IAST), Beyond SAST/DAST Ofer Maor N/A Security
CSP AiDer: An Automated Recommendation of Content Security Policy for Web Applications Ashar Javed N/A Security
Things Your Smartphone Does When Nobodys Looking Chris Eng N/A Security
Achieving Sustainable Delivery of Web Application Security Virtual Laboratory Resources for Distance Learning Adrian Winckles , Ibrahim Jeries N/A
Panel - PCI Security Standards and Application Security Jeremy King N/A Security ExcludeThinkstScapes Payment Card
Keynote: A Decade of Software Security: From the Bug Parade to the BSIMM Gary Mcgraw N/A ExcludeThinkstScapes BSIMM Bugs
Development of Security Framework based on OWASP ESAPI for JSF2.0 Kachhadiya Rakeshkumar , Benoist Emmanuel N/A
Benchmarking Web Application Scanners for YOUR Organization Dan Cornell N/A Security
The cree.py side of geolocation. Weaponizing your checkins Ioannis Kakavas N/A Security
Making Security Invisible by Becoming the Developers Best Friends Dinis Cruz N/A Security
Data Mining a Mountain of Zero Day Vulnerabilities Chris Eng N/A Security
Anticipating Surprise Fundamentals of Intelligence Gathering Fred Donovan N/A Security ExcludeThinkstScapes Intelligence Gathering
Keynote: Fatal Injection (and what you can do about it) Diomidis Spinellis N/A
Keynote: Everything you know about Injection Attack is wrong Pravir Chandra N/A Defence SQL Injection Cross-Site Scripting XPath Injection LDAP Injection
Real World Threat Modeling via the PASTA Methodology Tony Ucedavelez N/A Security IncludeThinkstScapes Threat Modelling
Can Correlations Secure Web Application? Ofer Shezaf N/A ExcludeThinkstScapes Web Application Firewall
BDD for Automating Web Application Testing Stephen de Vries N/A Security
AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life Jerry Hoff N/A Security
Using Hash-based Message Authentication Code Protocol to Reduce Web Application Attack Surface Breno Pinto , Luiz eduardo Santos N/A
Advanced CSRF and Stateless Anti-CSRF John Wilander N/A Security
Anatomy of a Logic Flaw: Breaking the Myth Charles Henderson N/A Security ExcludeThinkstScapes Logic Flaws
2012 Global Security Report Tom Brennan N/A Security
The Invisible Threat MitB (Man in the Browser) Uri Fleyder N/A Security