2010 BASC Speakers

We would like to thank our speakers for donating their time and effort to help make this conference successful and free.

Josh Corman
Joshua Corman is the Research Director of the 451 Group's enterprise security practice. Corman has more than a decade of experience with security and networking software, most recently serving as Principal Security Strategist for IBM Internet Security Systems. Corman’s research cuts across sectors to the core challenges of the industry, and drives evolutionary strategies toward emerging technologies and shifting economics.

Corman is a candid and highly coveted speaker and has spoken at leading industry events such as RSA, Interop, ISACA, and SANS. His efforts to educate and challenge the industry recently lead NetworkWorld magazine to recognize him as a top innovators of IT for 2009. Corman also serves on the Faculty for IANS and is a staunch advocate for CISOs everywhere. In 2010, Corman also co-founded RuggedSoftware.org – a value based initiative to raise awareness and usher in an era of secure digital infrastructure.

Ming Chow (Tufts University, CS Department)
HTML5 Security The power of HTML5 allows developers to create web applications not just structured content, but its new features has increased the attack surface. It has been demonstrated that the HTML5 offline application cache can be abused. The support for file-based client-side databases will open up the opportunity for SQL injection attack on client machines.

Andrew Gronosky
A Crumple Zone for Service-Oriented Architectures We present a new architectural construct analogous to the crumple zone in an automobile. It consists of a layer of intelligent service proxies that work together to provide both signature-based and non-signature based defenses. We present our initial design for Java RMI based services and compare it with web application firewalls.

Joshua "Jabra" Abraham, Will Vandevanter (Rapid7)
Hacking SAP BusinessObjects BusinessObjects is a very widely deployed business intelligence tool. In this presentation we will present the entire lifecycle of attacking a BusinessObjects server using vulnerabilities that we have found during our research.

Christien Rioux (SOURCE Conference)
The Exploit Arms Race As defenses have become more sophisticated, so have the attacks required to circumvent them. Learn about the roots of techniques like Stack cookies/Stackguard/Run-Time Stack Checking, DEP and ASLR, from attacks like trampolining, return-oriented programming, the evolution of fuzzing techniques, static and dynamic analysis for attacking and defending software.

Paul Schofield (Imperva)
Business Logic Attacks – BATs and BLBs Business logic attacks are a set of legal application transactions that are used to carry out a malicious operation that is not part of normal business practices. This presentation will provide a quick introduction to business logic attacks, their unique characteristics and the motivation behind their uptick. . Concluding this session we will discuss "virtual patching" using a web application firewall, rather than fixing the application code.

To Be Determined
Lots of interesting facts about this really good speaker. By the time you are done reading this you will be OOO-ing and AHH-ing without control. You'll be so impressed that you will flip head-over-heel.


 * Conference Organizer
 * [mailto:jim.weiler@owasp.org Jim Weiler], Chairperson
 * Program Committee:
 * [mailto:mark.arnold@something.somewhere.com Mark Arnold]
 * [mailto:zach.lanier@something.somewhere.com Zach Lanier]
 * [mailto:jim.weiler@owasp.org Jim Weiler], Chairperson
 * Sponsorship Committee:
 * [mailto:mark.arnold@something.somewhere.com Mark Arnold]
 * Website Editor
 * [mailto:neil.smithline@owasp.org Neil Smithline]