OWASPAppSecIsrael 2015 Oct. 13, 2015 to Oct. 13, 2015, rishon,israel

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Words Avi D N/A
KEYNOTE: The Rebellious Teenage Years: 15 years of Web Security Jeremiah Grossman N/A
Internet of Things (IOT) Insecurity Erez Metula , Israel Chorzevski During this talk we're going to discuss the security of the so called internet-of-things (IOT),and ...
0x3E9 Ways to DIE Yaniv Balmas Along the years many attempts have been made to combine static and dynamic analysis results. ...
The Node.js Highway: Attacks are at Full Throttle Helen Bravo The popularity of the Node.js coding language is soaring. Just five years after its debut, ...
From zero to secure in 1 minute Moshe Ferber Companies moving to cloud infrastructure (IaaS) discover that they can do amazing things with the ...
Security Automation in the Agile SDLC - Real World Cases Ofer Maor How can we really automate secure coding? Agile, DevOps, Continuous Integration, Orchestration, Static, Dynamic - ...
Why Are Hackers Winning the Mobile Malware Battle Yair Amit In the proverbial game of cat-and-mouse between endpoint security vendors and malware writers, malware attacks ...
The Spy in the Sandbox: Practical Cache Attacks in Javascript and their Implications Yossi Oren Side channel analysis is a remarkably powerful cryptanalytic technique. It allows attackers to extract secret ...
Too Big to Fail - Breaking WordPress Core Netanel Rubin When attacking web applications, what do you do when there are no injection points? No ...
Man in the Cloud Attack Sagie Dulce File synchronization services, such as GoogleDrive, DropBox and others are becoming widespread, both with private ...
Cross-Site Search Attacks Hemi Leibowitz Cross-site search (XS-search) attacks circumvent the same-origin policy and extract sensitive information, by using the ...
One Class to Rule Them All: Deserialization Vulnerabilities in Android Roee Hay The first is in the Android Platform and Google Play Services. The Platform instance affects ...
Theories of Agile, Fails of Security Daniel Liber Buzzwords about Agile are flying around in overwhelming speed, talks about Scrum, Kanban, XP and ...
Game of Hacks: Play, Hack & Track Amit Ashbel We created “Game of Hacks”– a viral web app marketed as a tool to train ...