OWASP Education Presentation

This page provide a commented overview of the OWASP presentations available. Please use the last line of the tables as template. Presentions can be tracked through: Everybody is encouraged to link the presentations and add their findings on this page ! There are currently hundreds of presentations all over the OWASP web site. If you search google with “site:owasp.org filetype:ppt” there are 166 hits. “site:owasp.org filetype:pdf” returns 76. Feel free to “mine” them and add them to the overview.
 * the OWASP Presentations Category
 * Past OWASP Conference agenda's
 * From the chapter pages

OWASP Education Presentations
,

Chapter Presentations
{|class="wikitable sortable" style="text-align: top;" border="1" cellpadding="2" !width="30%" |Title !width="30%" |Comment !width="10%" |Level !width="10%" |Month (Mon-yyyy) !width="10%" |Chapter
 * + Chapter Presentations


 * -valign="top"
 * Common Application Flaws (Brett Moore) ||OWASP New Zealand chapter presentation on Common Application Flaws|| Novice/Intermediate ||November 2008 || New Zealand
 * -valign="top"
 * Time Based SQL Injections (Muhaimin Dzulfakar) ||OWASP New Zealand chapter presentation on Time Based SQL Injections|| Intermediate ||September 2008 || New Zealand
 * -valign="top"
 * Browser Security (Roberto Suggi Liverani) ||OWASP New Zealand chapter presentation on Browser Security|| Intermediate ||September 2008 || New Zealand
 * -valign="top"
 * 7/7/2008 SQL Injection (Columbus, OH) || SQL Injection Presentation given at the Columbus, OH OWASP Chapter Meeting. Powerpoint, derby DB, and applicable java code. || Novice / Intermediate || July 2008 || Columbus
 * -valign="top"
 * Detecting Web Application Vulnerabilities Using Open Source Means (Konstantinos Papapanagiotou) ||OWASP Greek Chapter presentation given at the Open Source Software (FLOSS) Conference in Athens|| Novice ||May 2008 || Greece
 * -valign="top"
 * Hacking The World With Flash (Paul Craig) ||OWASP New Zealand chapter presentation on Flash security|| Intermediate ||April 2008 || New Zealand
 * -valign="top"
 * Web Spam Techniques (Roberto Suggi Liverani) ||OWASP New Zealand chapter presentation on Web Spam Techniques|| Intermediate ||April 2008 || New Zealand
 * -valign="top"
 * Xpath Injection Overview (Roberto Suggi Liverani) ||OWASP New Zealand chapter presentation on Xpath Injection|| Intermediate ||February 2008 || New Zealand
 * -valign="top"
 * Dependability for Java Mobile Code (Pierre Parrend) ||OWASP Swiss chapter presentation on Mobile Java Security || Expert ||July 2007 || Switzerland
 * -valign="top"
 * Trust, Security and Usability (Roger Carhuatocto) in Spanish||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || Spain
 * -valign="top"
 * Tratamiento seguro de datos en aplicaciones in Spanish||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || Spain
 * -valign="top"
 * Ataques DoS en aplicaciones Web (Jaime Blasco Bermejo) in Spanish||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || Spain
 * -valign="top"
 * Seguridad en entornos financierosPedro (Pedro Sánchez) in Spanish||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || Spain
 * -valign="top"
 * Brian Chess from Fortify shared what's going on with the Java Open Source review project at the June NoVA OWASP meeting || Java Open Review || Intermediate ||June 2007 || Virginia (Northern Virginia)
 * -valign="top"
 * Brian Chess from Fortify, presentation to NoVA OWASP chapter in June 2007. || Bytecode injection || Expert ||June 2007 || Virginia (Northern Virginia)
 * -valign="top"
 * Security at the VMM Layer by Ted Winograd || Security at the VMM Layer || Expert ||June 2007 || Virginia (Northern Virginia)
 * -valign="top"
 * Evaluating and Tuning Web Application Firewalls (Barry Archer) ||Presentation given at Kansas City June 2007 chapter meeting|| Intermediate ||June 2007 || Kansas City
 * -valign="top"
 * Microsoft Security Development Lifecycle for IT (Rob Labbé) ||Presentation by Rob Labbe at Ottawa OWASP Chapter|| Novice ||May 2007|| Ottawa
 * -valign="top"
 * Application Denial of Service (Shaayy Cheen) ||Is it Really That Easy? Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || Israel
 * -valign="top"
 * Fuzzing in Microsoft and FuzzGuru framework (John Neystadt) ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || Israel
 * -valign="top"
 * Application Security, not just development (David Lewis) ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || Israel
 * -valign="top"
 * Overtaking Google Desktop, Leveraging XSS to Raise Havoc (Yair Amit) ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || Israel
 * -valign="top"
 * Unregister Attack in SIP (Anat Bremler-Barr, Ronit Halachmi-Bekel and Jussi Kangasharju) ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || Israel
 * -valign="top"
 * Positive Security Model for Web Applications, Challenges and Promise (Ofer Shezaf) ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || Israel
 * -valign="top"
 * .NET Reverse Engineering (Erez Metula) ||Presentation given at the Israel Mini Conference in May 2007|| Expert ||May 2007 || Israel
 * -valign="top"
 * OWASP introduction (Ofer Shezaf) ||2nd OWASP IL mini conference at the Interdisciplinary Center (IDC) Herzliya|| Intermediate ||May 2007 || Israel
 * -valign="top"
 * Update on Internet Attack Statistics for Belgium in 2006 by Hilar Leoste (Zone-H) || Update on Internet Attack Statistics for Belgium in 2006 || Novice ||May 2007 || Belgium
 * -valign="top"
 * Securing Web Services using XML Security Gateways by Tim Bond || Securing Web Services using XML Security Gateways || Intermediate ||May 2007 || Virginia (Northern Virginia)
 * -valign="top"
 * Software Assurance in the Acquisition Process by Stan Wisseman || Software Assurance in the Acquisition Process || Intermediate ||May 2007 || Virginia (Northern Virginia)
 * -valign="top"
 * Legal Aspects of (Web) Application Security by Jos Dumortier || Legal Aspects of (Web) Application Security || Intermediate ||May 2007 || Belgium
 * -valign="top"
 * AppSec Research (University Leuven Belgium) || Formal absence of implementation bugs in web applications: a case study on indirect data sharing by Lieven Desmet || Expert ||May 2007 || Belgium
 * -valign="top"
 * A Scanner Sparkly || A Scanner Sparkly, taken from the Phoenix OWASP presentations on Application Security Tools, May 2007 || Intermediate ||May 2007 || Phoenix
 * -valign="top"
 * Grey Box Assessment Lessons Learned || "Grey Box Assessment Lessons Learned", taken from the Phoenix OWASP presentations, Application Security Tools, May 2007 || Intermediate ||May 2007 || Phoenix
 * -valign="top"
 * OWASP Update and OWASP BeLux Board Presentation (Seba) || OWASP Update and OWASP BeLux Board Presentation || Novice||May 2007 || Belgium
 * -valign="top"
 * Metics- What can we measure (Zed Abbadi) ||19 April NoVa chapter meeting presentation on Security Metrics || Novice ||April 2007 || Virginia (Northern Virginia)
 * -valign="top"
 * Web Services Hacking and Hardening (Adam Vincent) ||3/8/07 NoVA chapter meeting, Adam Vincent from Layer7  || Expert ||March 2007 || Virginia (Northern Virginia)
 * -valign="top"
 * OWASP Update (Seba) || OWASP Update || Novice||Jan 2007 || Belgium
 * -valign="top"
 * XSS Worms (Sven Vetsch) || XSS Worms || Intermediate ||Feb 2007 || Switzerland
 * -valign="top"
 * OWASP Update (Seba) || OWASP Update || Novice||Jan 2007 || Belgium
 * -valign="top"
 * WebGoat and Pantera presentation (Philippe Bogaerts) || WebGoat and Pantera presentation  || Novice || Jan 2007 || Belgium
 * -valign="top"
 * Security implications of AOP for secure software (Bart De Win) || Security implications of AOP for secure software || Expert || Jan 2007 || Belgium
 * -valign="top"
 * testing for common security flaws (David Byrne) || testing for common security flaws || Intermediate || Nov 2006 || Denver
 * -valign="top"
 * 40-ish slides on analyzing threats (Olli) || Analyzing Threats || Novice || Dec 2006 || Helsinki
 * -valign="top"
 * Attacking the Application (Dave Ferguson) || Vulnerabilities, attacks and coding suggestions || Intermediate || Dec 2006 || Kansas City
 * -valign="top"
 * Ajax Security Concerns (Rohini Sulatycki) || Ajax Security Concerns || Intermediate ||Dec 2006 || Kansas City
 * -valign="top"
 * Anatomy of 2 Web Application Testing (Matteo Meucci) || Anatomy of 2 Web Application Testing || Intermediate || Mar 2006 || Italy


 * -valign="top"


 * Testing From the Cloud: Is the Sky Falling? || WTE Cloud-based Testing || Intermediate || Feb 2012 || Austin
 * -valign="top"


 * (https://www.owasp.org/index.php/User_talk:Briechenstein_Software_Studio) || Open Web application Security Project|| Intermediate|| 2015-07-04 ||

Chapter 4

Specification Language

This formal specification by language example presents cybersecurity studies (of over 10 projects) of how successful OWASP educational presentations test develop design and deliver cybersecurity software efficiently supporting formal methods as mathematically based techniquesthat are needed to assist in the design and implementation of reliable cybersecurity software.

Specification by language example is a must read for anyone serious about delivering translated cybersecurity language software that matters It is the result of a research on how teams internationally specify test develop design and deliver the right cybersecurity software without defects in very short computational delivery cycles With cybersecurity case studies and real examples this presentation helps you understand how successful teams implement mathematical cybersecurity by example denoting acceptable testing and behavior driven development to bridge the communication gap between committees stakeholders and contributing teams build quality into cybersecurity from the start by testing developing designing and delivering supported languagfor syntax highlighting purposes It presents the collective knowledge of about 50 cybersecurity projects ranging from high traffic websites to virtual back office cybersecurity systems implemented by teams as diverse as small startups to groups spread across different continents working in a range of processes including Extreme programming Kanban Scrum and similar processes often bundled together under the names Lean and Agile This protocol is for testers software developers business analysts and project managers working on Syntax and Agile projects or teams moving to an Agile development method that want to improve quality  reduce correction of defective cybersecurity software and collaborate better with the OWASP committee. Smith

For the last past decade computer systems have become increasingly more powerful as a result becoming more impactful to society Established engineering disciplines use mathematical analysis as the foundation of creating and validating product design Formal language specifications are one im such a way for achievement in software engineering as reliability  once predicted Other methods such as testing are more commonly used to enhance code quality
 * Retrieved notes from Categories Specification languages and Formal specification

Usability given as such a specification it is possible to use formal verification techniques to demonstrate that a system design is correct with respect to its specification This allows incorrect system designs to be revised before any major investments have been made into an actual implementation Another approach is to use provably correct refinement steps to transform a specification into a design which is ultimately transformed into an implementation that is correct by construction.


 * It is important to note that a formal specification is not an implementation but rather it may be used to develop an implementation Formal specifications describe what a system should do not how the system should do it A good specification must have some of the following attributes: adequate internally consistent unambiguous complete satisfied constructability manageability and evolvability Usability Communicability Powerful and efficient analysis which is one of the main reasons there is interest in formal specifications that will provide an ability to perform proofs on cybersecurity software implementations These proofs may be used to validate a specification verify correctness of design, or to prove that a program satisfies a specification.

Limitations A design (or implementation) cannot ever be declared “correct” on its own. It can only ever be “corrected with respect to a given specification Whether the formal specification correctly describes the problem to be solved is a separate issue It is also a difficult issue to address since it ultimately concerns the problem constructing abstracted formal representations of an informal concrete problem domain and such an abstraction step is not amenable to formal proof. However, it is possible to validate a specification by proving “challenge” theorems concerning properties that the specification is expected to exhibit.o_O If correct Olloclip In these theorems reinforce the specifier's understanding of the specification and its relationship with the underlying problem domain If not the specification probably needs to be changed to better reflect the domain understanding of those involved with producing (and implementing) the specification.

Flexibility As far as flexibility goes a lot of software companies use agile methodologies that focus on flexibility Doing a formal specification of the whole system up front is often perceived as being the opposite of flexible However there is some research into the benefits of using formal specifications with "agile" development Complexity is a requirement that is a high level of mathematical expertise and the analytical skills to understand and apply them effectively I have a solution to develop resources and models that allow for these techniques to be implemented but hide underlying mathematics

I hope to accomplish a good job of specifying user interfaces and user interaction that is Not cost-effective

Formal specification techniques have existed in various domains and on various scales for quite some time Implementations of formal specifications will differ depending on what kind of system they are attempting to model how they are applied and at what point in the software life cycle they have been introduced These types of models can be categorized into the following specification paradigms:

History-based specification

behavior based system histories assertions are interpreted over time State-based Specification behavior based on system states series of sequential steps (e.g. a financial transaction) languages such as Z, VDM or B rely on this paradigm+ Transition-based specification behavior based on transitions from state-to-state of the system best used with a reactive system languages such as Statecharts PROMELA STeP-SPL RSML or SCR rely on this paradigm Functional specification specify a system as a structure of mathematical functions OBJ, ASL, PLUSS, LARCH, HOL or PVS rely on this paradigm Operational Specification early languages such as Paisley GIST Petri nets or process algebras rely on this paradigm In addition to the above paradigms there are ways to apply certain heuristics to help improve the creation of these specifications The protocol referenced here best discusses heuristics to use when designing a specification.Heuristics= a rule or method that helps you solve problems faster than you would if you did all the computing

Resources: Algebraic specification= Providing a mathematical software engineering technique

References: ^ a b c d e f g h i j k l m n o Lamsweerde, A. V. (2000). "Formal specification". Proceedings of the conference on the future of Software engineering - ICSE '00. p. 147. doi:10.1145/336512.336546. ISBN ^ a b c d Sommerville, Ian (2009). "Formal Specification" (PDF). Software Engineering. Retrieved ^ a b c Nummenmaa, Timo; Tiensuu, Aleksi; Berki, Eleni; Mikkonen, Tommi; Kuittinen, Jussi; Kultima, Annakaisa (4 August 2011). "Supporting agile development by facilitating natural user interaction with executable formal specifications". ACM SIGSOFT Software Engineering Notes 36 (4): 1–10. doi:10.1145/1988997.2003643. edit

Best Wishes, Brenda Smith a55dayidream@gmail.com