OWASP Appsec 2010 June 23, 2010 to June 24, 2010, Stocholm, Sweden

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Welcome To Owasp Appsec Research 2010 Conference John Wilander Security Others
Keynote: Cross-Domain Theft And The Future Of Browser Security Chris Evans , Ian Fette Keynote
Bitflip: Determine A Data'S Signature Coverage From Within The Application Henrich Christopher Poehls Security Computer Forensics Application Security Forensics
Csfire: Browser-Enforced Mitigation Against Csrf Lieven Desmet , Philippe De ryck Security Exploitation Browser
Deconstructing Coldfusion Chris Eng Security Others Deep Knowledge Exploitation Risk
Towards Building Secure Web Mashups Lieven Desmet , Philippe De ryck , M Decat , Frank Piessens , Wouter Joosen Security Web Development
New Insights Into Clickjacking Marco Balduzzi Security Malware Browser
How To Render Ssl Useless Ivan Ristic Security Web DNS Browser
Busting Frame Busting Gustav Rydstedt Security Others
Web Frameworks And How They Kill Traditional Security Scanning Lars Andren , Christian Hang Mobile Security Web
The State Of Ssl In The World Michael Boman Security Analysis Statistics
Object Capabilities And Isolation Of Untrusted Web Applications Sergio Maffeis Security Web Application Security
Beyond The Same-Origin Policy Mike Samuel , Jasvir Nagra Compliance Security
Smashfilefuzzer - A New File Fuzzer Tool Komal Randive Security Fuzzing
Security Toolbox For .Net Development And Testing Dag König , Johan Lindfors Security Development Testing
Cross-Site Location Jacking (Xslj) (Not Really) David Lindsay , Cigital Eduardo Eduardo Vela nava Security Web Browser
Owning Oracle: Sessions And Credentials Steve Ocepek , Wendel G. Henrique Security Web Application Security
Value Objects A La Domain-Driven Security: A Design Mindset To Avoid Sql Injection And Cross-Site Scripting Dan Bergh Johnsson Security Web Browser
Automated Vs. Manual Security: You Can'T Filter The Stupid Charles Henderson , David Byrne Security Automation
Session Fixation - The Forgotten Vulnerability? Martin Johns , Bastian Braun , Michael Schrank Security Web Browser
Keynote: The Security Development Lifecycle - The Creation And Evolution Of A Security Development Process Steve Lipner Keynote
The Anatomy Of Real-World Software Security Programs Pravir Chandra Security Application Security Analysis
Promon Testsuite: Client-Based Penetration Testing Tool Tom Lysemose Hansen , Folker Den braber Security Application Security Network Penetration Auditing Testing
A Taint Mode For Python Via A Library Juan José Conti , Alejandro Russo Development Security
Microsoft'S Security Development Lifecycle For Agile Development Nick Coblentz Security Application Security Development
Detecting And Protecting Your Users From 100% Of All Malware - How? Vadim Pogulievsky , Bradley Anstis Security Intrusion Detection Incident Response Malware
Opa: Language Support For A Sane, Safe And Secure Web François Régis sinot , Davidrajchenbach Teller Security Web
Secure Application Development For The Enterprise: Practical, Real-World Tips Michael Craigue Development
Responsibility For The Harm And Risk Of Software Security Flaws Cassio Goldschmidt Security Application Security Exploitation
Secure The Clones: Static Enforcement Of Policies For Secure Object Copying Thomas Jensen , David Pichardie Compliance Security
Product Security Management In Agile Product Management Antti Vähä Sipilä Mobile Security Security Development
Hacking By Numbers Tom Brennan Security Others Deep Knowledge
Safe Wrappers And Sane Policies For Self Protecting Javascript David Sands , Phu H. Phung , Jonas Magazinius Security Compliance Development
Owasp_Top_10_2010 Dave Wichers Security Others
Application Security Scoreboard In The Sky Chris Eng Security Application Security Cloud
On The Privacy Of File Sharing Services Nikos Nikiforakis , Wouter Joosen , Yves Younan , F Gadaleta Security Privacy