Difference between revisions of "Belgium"

From OWASP
Jump to: navigation, search
m (WHERE)
(Next Meeting (12th of February 2014) in Leuven)
 
(56 intermediate revisions by 3 users not shown)
Line 3: Line 3:
 
= Local News  =
 
= Local News  =
  
== Stay updated  ==
+
== Upcoming chapter meeting: 20 May 2014 (Brussels) ==
  
"'''BeNeLux Days 2012'''" is online: https://www.owasp.org/index.php/BeNeLux_OWASP_Day_2012.
+
On '''Tuesday 20 of May 2014''', we will have our next BE chapter meeting in Brussels. Mark your agendas and stay tuned!
  
  
If you want to be invited for the next OWASP Belgium Chapter meetings, please [http://eepurl.com/iFZtb drop us your contact info].
+
== Presentations of the 2013 chapter meetings are online  ==
 +
 
 +
The presentations of our 2013 chapter meetings can be downloaded from
 +
https://www.owasp.org/index.php/Belgium#tab=Chapter_Meetings
 +
 
 +
 
 +
== BeNeLux Days 2013 ==
 +
 
 +
"'''BeNeLux Days 2013'''" are over. Thanks to you for coming and making this event a success!
 +
 
 +
And of course, we're inviting you from now on to '''BeNeLux Days 2014''' which will take place in Luxembourg!
 +
 
 +
 
 +
 
 +
== Stay in touch ==
 +
 
 +
=== Twitter ===
  
 
You can also follow us on [https://twitter.com/owasp_be Twitter]!
 
You can also follow us on [https://twitter.com/owasp_be Twitter]!
  
== Structural Sponsors 2012/2013  ==
+
=== OWASP-BE contact list ===
 +
 
 +
If you want to be invited for the next OWASP Belgium Chapter meetings, please [http://eepurl.com/iFZtb drop us your contact info].
 +
 
 +
=== OWASP-BE discussion mailing list===
 +
If you want to join the local chapter mailing list, please [http://lists.owasp.org/mailman/listinfo/owasp-belgium click here].
 +
 
 +
== Structural Sponsors 2013/2014 ==
 
OWASP Member affiliated to the Belgium chapter:
 
OWASP Member affiliated to the Belgium chapter:
  
 
{{MemberLinks|link=http://www.pwc.com/|logo=PWC_log_resized.png}}
 
{{MemberLinks|link=http://www.pwc.com/|logo=PWC_log_resized.png}}
  
OWASP Belgium thanks its structural chapter supporters for 2012 and the OWASP BeNeLux Days 2012:  
+
OWASP Belgium thanks its structural chapter supporters for 2013/2014 and the OWASP BeNeLux Days 2013:  
  
[http://www.iminds.be https://www.owasp.org/images/thumb/a/a1/Iminds-logo.png/200px-Iminds-logo.png]
 
 
[http://www.zionsecurity.com https://www.owasp.org/images/e/e6/Zionsecurity.jpg]
 
[http://www.zionsecurity.com https://www.owasp.org/images/e/e6/Zionsecurity.jpg]
[http://on2it.net https://www.owasp.org/images/3/3d/On2it-sponsor.png]
+
[http://www.nviso.be https://www.owasp.org/images/5/5e/Nviso_logo_RGB_baseline_200px.png]
 +
[http://www.Checkmarx.com https://www.owasp.org/images/a/a2/Checkmarx.jpg]
  
 
If you want to support our chapter, please contact [mailto:seba@owasp.org Seba Deleersnyder]
 
If you want to support our chapter, please contact [mailto:seba@owasp.org Seba Deleersnyder]
Line 30: Line 53:
  
  
== Next Meeting (5th of March 2013) in Leuven ==
+
== Next Meeting (20th of May 2014) in Brussels ==
 +
 
 +
=== WHEN ===
 +
20th of February 2014 (18h00 - 21h00)
 +
 
 +
=== WHERE  ===
 +
Coming soon...
 +
 
 +
=== PROGRAM ===
 +
The agenda:
 +
*18h00 - 18h45: '''Welcome & sandwiches'''<br>
 +
*18h45 - 19h00: '''OWASP Update''' (by Sebastien Deleersnyder, OWASP Belgium Board)<br>
 +
*19h00 - 20h00: '''Securing Password Storage – Increasing Resistance to Brute Force Attacks''' (by Tiago Teles)<br>
 +
:''Abstract:'' In this talk Tiago Teles takes apart password protection scheme analyzing the attack resistance of hashes, hmacs, adaptive hashes (such as script), and encryption schemes. First, we present a threat model for password storage. Then audience members will learn the construction, performance, and protective properties of these primitives. Discussion of the primitives will be from a critical perspective modeled as an iterative secure design session.
 +
:Ultimately, this session presents the solution and code donated as part an on-going OWASP project – a OWASP PSM (password storage module). Discussion of this solution will include key techniques for hardening PSM learned through years of delivering production JavaEE code to customers…
 +
:''Bio:'' Tiago Teles is a Technical Consultant with 8 years of experience in clients across different sectors and countries, including banking, insurance, telecommunications and commercial organizations in a variety of roles: Delivering Training, Development, Business Intelligence and Quality Assurance. For some of the talks already delivered please see: [https://www.youtube.com/watch?v=CbeSXmAXBbU Video talks for more information please visit: [http://nl.linkedin.com/in/tiagoteles Tiago Teles' LinkedIn profile].
 +
*20h00 - 20h15: '''Break'''<br>
 +
*20h15 - 21h15: '''Coming soon...'''<br>
 +
 
 +
=== REGISTRATION  ===
 +
Coming soon...
 +
 
 +
 
 +
== Previous Meeting (12th of February 2014) in Leuven ==
 +
 
 +
=== WHEN ===
 +
12th of February 2014 (18h00 - 21h00)
 +
 
 +
=== WHERE  ===
 +
Jointly organized with [http://www.secappdev.org/ SecAppDev].
 +
Hosted by [https://distrinet.cs.kuleuven.be iMinds-Distrinet Research Group (KU Leuven)].
 +
 
 +
Both speakers are faculty of the [http://www.secappdev.org/ Secure Application Development] course which is held in Leuven from 10 to 14 February 2014. OWASP Members get a 10% discount to attend the course.
 +
 
 +
Address: <br>
 +
Department of Computer Science (foyer at ground floor)<br> Celestijnenlaan 200 A<br> 3001 Heverlee ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&nbol=(50.864186697481145,%204.678754210472107)&zoomlevel=17&plaatsnaam=Department+of+Computer+Science&maptype=roadmap google maps])
 +
 
 +
Routemap: https://distrinet.cs.kuleuven.be/about/route/
 +
 
 +
=== Last minute update: ===
 +
 
 +
 
 +
I would like to notify you that due to traffic work you most probably will have to make a detour to get to the university campus.
 +
 
 +
Because of a road block at the Celestijnenlaan, this street has become one way. This forces participants coming from the E40/Koning Boudewijnlaan to reach the campus via the ring (R23)/Naamsesteenweg/Kardinaal Mercierlaan.
 +
 
 +
A map of the detour can be found here: http://goo.gl/maps/kZqEQ
 +
 
 +
As this is the only way to get to the campus, take into account that it may lead to significant delays.
 +
 
 +
=== PROGRAM ===
 +
The agenda:
 +
*18h00 - 18h45: '''Welcome & sandwiches'''<br>
 +
*18h45 - 19h00: '''[https://www.owasp.org/images/4/41/Owasp_Belgium_update_2013-12-17_v1.pptx OWASP Update]''' (by Sebastien Deleersnyder, OWASP Belgium Board)<br>
 +
*19h00 - 20h00: '''[https://www.owasp.org/images/f/f8/Danezis-owasp14.pptx Smart metering privacy]''' (by George Danezis)<br>
 +
:''Abstract:'' In the past few years tremendous cryptographic progress has been made in relation to primitives for privacy friendly-computations. These include celebrated results around fully homomorphic encryption, faster somehow homomorphic encryption, and ways to leverage them to support more efficient secret-sharing based secure multi-party computations. Similar break-through in verifiable computation, and succinct arguments of knowledge, make it practical to verify complex computations, as part of privacy-preserving client side program execution. Besides computations themselves, notions like differential privacy attempt to capture the essence of what it means for computations to leak little personal information, and have been mapped to existing data query languages.
 +
:So, is the problem of computation on private data solved, or just about to be solved? In this talk, I argue that the models of generic computation supported by cryptographic primitives are complete, but rather removed from what a typical engineer or data analyst expects. Furthermore, the use of these cryptographic technologies impose constrains that require fundamental changes in the engineering of computing systems. While those challenges are not obviously cryptographic in nature, they are nevertheless hard to overcome, have serious performance implications, and errors open avenues for attack.
 +
:Throughout the talk I use examples from our own work relating to privacy-friendly computations within smart grid and smart metering deployments for private billing, privacy-friendly aggregation, statistics and fraud detection. These experiences have guided the design of ZQL, a cryptographic language and compiler for zero-knowledge proofs, as well as more recent tools that compile using secret-sharing based primitives.
 +
:''Bio:'' George Danezis is a Reader in Security and Privacy Engineering at the Department of Computer Science of University College London. He has been working on anonymous communications, privacy enhancing technologies (PET), and traffic analysis since 2000. He has previously been a researcher for Microsoft Research, Cambridge; a visiting fellow at K.U.Leuven (Belgium); and a research associate at the University of Cambridge (UK), where he also completed his doctoral dissertation under the supervision of Prof. R.J. Anderson.
 +
*20h00 - 20h15: '''Break'''<br>
 +
*20h15 - 21h15: '''[https://www.owasp.org/images/d/db/HTML_Forms_and_Workflows_v3.pdf Securing Complex Forms]''' (by Jim Manico)<br>
 +
:''Abstract:'' The heart of how users interact with a web application is the HTML form submission. A great deal of very sensitive data flows over HTML forms. Securing web form submissions is critical for the construction of a secure web application. Multi-form workflows make securing form submissions even more complicated! This presentation will take you on a journey as untrusted data flows from a form submission into the many layers of a secure web application.
 +
:* Review some of the basic threats against web forms
 +
:* Learn some of the most important defense categories for building secure web forms
 +
:* Discuss some of the more complex aspects to form construction, such as workflow
 +
:''Bio:'' Jim Manico is the VP of Security Architecture at WhiteHat Security. Jim has been a web application developer since 1997. He has also been an active member of OWASP since 2008 supporting projects that help developers write secure code.
 +
 
 +
=== REGISTRATION  ===
 +
Please register [https://owasp-belgium-2014-02-12.eventbrite.com/ on EventBrite]
 +
 
 +
== Previous Meeting (17th of December 2013) in Leuven ==
 +
 
 +
=== WHEN ===
 +
17th of December 2013 (18h00 - 21h00)
 +
 
 +
=== WHERE  ===
 +
Jointly organized with [https://www.isc2chapter-belgium.be/ (ISC)2].
 +
 
 +
Hosted by [https://distrinet.cs.kuleuven.be iMinds-Distrinet Research Group (KU Leuven)].
 +
 
 +
Address: <br>
 +
Department of Computer Science (foyer at ground floor)<br> Celestijnenlaan 200 A<br> 3001 Heverlee ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&nbol=(50.864186697481145,%204.678754210472107)&zoomlevel=17&plaatsnaam=Department+of+Computer+Science&maptype=roadmap google maps])
 +
 
 +
Routemap: https://distrinet.cs.kuleuven.be/about/route/
 +
 
 +
=== PROGRAM ===
 +
The agenda:
 +
*18h00 - 18h45: '''Welcome drink and Pizza (sponsored by F5 Networks)'''<br>
 +
*18h45 - 19h00: '''[https://www.owasp.org/images/4/41/Owasp_Belgium_update_2013-12-17_v1.pptx OWASP / ISC2 Update]''' (by Sebastien Deleersnyder, OWASP Belgium Board & Lode Vanstechelman, ISC2 Belgium Board)<br>
 +
*19h00 - 20h00: '''[https://www.owasp.org/images/7/78/Augmented_reality_in_your_web_proxy-ISC2-OWASP_Belgium_2013.pdf Augmented reality in your Web Proxy]''' (by Roberto Suggi Liverani)<br>
 +
:''Abstract:'' This talk intends to demonstrate how to improve web application security testing by combining browser automation framework and web proxy API.
 +
:The goal of this research is to bring a web proxy as close as possible to a browser to achieve a better security testing coverage, especially when dealing with complex client-side technology.
 +
:The presentation includes a montage of real case scenarios, showing how this approach can lead to the discovery of vulnerabilities which might otherwise go unnoticed.
 +
:''Bio:'' Roberto loves breaking applications for fun and profit. In the last years, Roberto has been involved in the infosec community by founding the OWASP New Zealand chapter and by publishing vulnerabilities affecting major software products. Roberto has been a guest speaker at global security conferences, including HITB, EUSecWest, DEFCON, Ruxcon, Kiwicon and HackPra AllStars.
 +
:Roberto tweets from @malerisch and his blog can be found at: http://blog.malerisch.net
 +
*20h00 - 20h15: '''Break'''<br>
 +
*20h15 - 21h15: '''[https://www.owasp.org/images/c/cc/Ifyoutoleratethisyourchildprocesseswillbenext.pdf If You Tolerate This, Your Child Processes Will Be Next]''' (by Bart Leppens)<br>
 +
:''Abstract:'' Browser 0-days are very expensive and thus not available for the common attacker.  Therefore an attacker may switch his focus from exploiting the browser towards exploiting the browser's internal network infrastructure. A normal webbrowser can serve as a pivot to attack the company's internal network.  Internal networks are generally less protected and are potentially less segregated in terms of security, so pivoting through the browser can help the attacker to reach those otherwise unreachable targets.
 +
:The Browser Exploitation Framework, aka BeEF, is a professional security tool that can help you during a pentest performing these kinds of attacks.
 +
:''Bio:'' Bart Leppens is one of the BeEF developers.  During his talk he will introduce you to BeEF, Inter-Protocol Communication (IPC) & Inter-Protocol Exploitation (IPE).  If you're thinking about buying an expensive firewall, it's advisable to wait until after his talk.  There is a risk you might want to throw it all away.
 +
 
 +
=== Coverage ===
 +
 
 +
Covered by Xavier Mertens: http://blog.rootshell.be/2013/12/18/owasp-belgium-chapter-meeting-wrap-up-using-browsers-otherwise/
 +
 
 +
=== REGISTRATION  ===
 +
Please register [https://owasp-belgium-2013-12-17.eventbrite.com/ on EventBrite]
 +
 
 +
== Previous Meeting (8th of October 2013) in Diegem ==
 +
 
 +
=== WHEN ===
 +
8th of October 2013 (18h00 - 21h00)
 +
 
 +
=== WHERE  ===
 +
Hosted by [http://www.ey.com Ernst & Young].
 +
 
 +
Address: <br>
 +
Ernst & Young<br>
 +
De Kleetlaan 2<br>
 +
B1831 Diegem<br>
 +
Location: [https://www.google.com/maps?q=Ernst+%26+Young+Tax+Consultants,+De+Kleetlaan,+Diegem,+Machelen,+Belgium&hl=en&ll=50.887198,4.449935&spn=0.009124,0.017488&sll=50.881364,4.436437&sspn=0.009125,0.017488&oq=ernst+%26+young+diegem&hq=Ernst+%26+Young+Tax+Consultants,&hnear=De+Kleetlaan,+Diegem+1831+Machelen,+Vlaams-Brabant,+Vlaams+Gewest,+Belgium&t=m&z=16&iwloc=A Google Maps].
 +
 
 +
=== PROGRAM ===
 +
The agenda:
 +
*17h30 - 18h15: '''Welcome &amp; sandwiches'''<br>
 +
*18h15 - 18h30: '''OWASP Update''' (by Sebastien Deleersnyder, OWASP Belgium Board)<br>
 +
*18h30 - 19h30: '''[https://www.owasp.org/images/e/e8/NoScript_vs_for_Web_Developers_Maone.pdf NoScript for Developers]''' (by Giorgio Maone)<br>
 +
:Everything security-conscious web developers should know to make their creations safer and more accessible  for [http://noscript.net NoScript] users, plus an overview of current and upcoming technologies inspired by NoScript which can be leveraged server-side to enhance web applications' security.
 +
:[http://maone.net Giorgio Maone] is a software developer and security researcher born and living in Palermo, Italy. He's member of the Mozilla Security Group and invited expert in the W3C's Web Application Security Working Group. In 2005 he created the NoScript browser security add-on, which still today absorbs most of the time and energy left by his main job: parenting 3 little children.
 +
*19h30 - 19h45: '''Break'''<br>
 +
*19h45 - 20h45: '''[http://www.slideshare.net/x00mario/jsmvcomfg-to-sternly-look-at-javascript-mvc-and-templating-frameworks JSMVCOMFG - To sternly look at JavaScript MVC and Templating Frameworks]''' (by Mario Heiderich)<br>
 +
:There is a way to build common, classic web applications. You know, servers, databases, some HTML and a bit of JavaScript. Ye olde way. Grandfather still knows. And there is a way to build hip and fancy, modern and light-weight, elastic and scalable client-side web applications. Sometimes with a server in the background, sometimes with a database - but all the hard work is done by something new: JavaScript Model-View-Controller and templating frameworks.
 +
:Angular, Ember and CanJS, Knockout, Handlebars and Underscore... those aren't names of famous wrestlers but modern JavaScript fame-works that offer a boost in performance and productivity by taking care of many things web-app right there in the browser, where the magic happens. And more and more people jump on the bandwagon and implement those frameworks with great success. High time for a stern look from the security perspective, ain't it not?
 +
:This talk will show you how those frameworks work, how secure their core is and what kind of security issues spawn from the generous feature cornucopia they offer. Do their authors really know the DOM well enough to enrich it with dozens of abstraction layers? Or did they open a gate straight to JavaScript hell introducing a wide range of new injection bugs and coding worst-practices? Well, you'll know after this talk. You'll know...
 +
:[http://heideri.ch Mario Heiderich] is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.
 +
 
 +
=== Coverage ===
 +
 
 +
xme's write-up on [http://blog.rootshell.be/2013/10/08/october-2013-owasp-belgium-chapter-meeting-wrap-up/ blog.rootshell.be]
 +
 
 +
=== REGISTRATION  ===
 +
Please register [https://owasp-belgium-2013-10-08.eventbrite.com/ on EventBrite]
 +
 
 +
== Previous Meeting (6th of June 2013) in Leuven ==
 +
 
 +
=== WHEN ===
 +
6th of June 2013 (18h00 - 21h00)
 +
 
 +
=== WHERE  ===
 +
This chapter meeting is part of the [[EUTour2013| OWASP Europe Tour 2013]]
 +
 
 +
<BR/>
 +
Hosted by [https://distrinet.cs.kuleuven.be iMinds-Distrinet Research Group (KU Leuven)].
 +
 
 +
Address: <br>
 +
Department of Computer Science (foyer at ground floor)<br> Celestijnenlaan 200 A<br> 3001 Heverlee ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&nbol=(50.864186697481145,%204.678754210472107)&zoomlevel=17&plaatsnaam=Department+of+Computer+Science&maptype=roadmap google maps])
 +
 
 +
Routemap: https://distrinet.cs.kuleuven.be/about/route/
 +
 
 +
=== PROGRAM ===
 +
The agenda:
 +
*17h30 - 18h15: '''Welcome &amp; sandwiches'''<br>
 +
*18h15 - 18h30: '''[https://www.owasp.org/images/5/5a/Owasp_Belgium_update_2013-06-06_v2.pptx OWASP Update]''' (by Sebastien Deleersnyder, OWASP Belgium Board)<br>
 +
*18h30 - 19h30: '''[https://www.owasp.org/images/2/23/OWASP_EU_-_Tour_2103-abridged-Ned.pdf Needles in haystacks, we we are not solving the appsec problem & html hacking the browser, CSP is dead.]''' (by Eoin Keary, CTO and founder of BCC Risk Advisory Ltd.)<br>
 +
:TBD
 +
*19h30 - 20h30: '''[https://www.owasp.org/images/c/cc/Securing_Development_with_PMD_-_Teaching_an_Old_Dog_New_Tricks_-_OWASP.pdf Teaching an Old Dog New Tricks: Securing Development with PMD]''' (by Justin Clarke, Director and Co-Founder of Gotham Digital Science)<br>
 +
:Using static analysis to identify software bugs is not a new paradigm. For years, developers have used static analysis tools to identifying code quality issues. While these tools may not be specifically designed for identifying security bugs. This presentation will discuss how custom security rules can be added to existing code quality tools to identify potential software security bugs. Writing custom software security rules for the popular Java code scanning tool PMD will be the focus of the presentation.
 +
:Justin Clarke is a Director and Co-Founder of Gotham Digital Science. He is the lead author/technical editor of "SQL Injection Attacks and Defense" (Syngress), co-author of "Network Security Tools" (O'Reilly), contributor to "Network Security Assessment, 2nd Edition" (O'Reilly), as well as a speaker at numerous security conferences and events such as Black Hat, EuSecWest, ISACA, BruCON, OWASP AppSec, OSCON, RSA and SANS. Justin is the Chapter Leader for the OWASP London chapter in the United Kingdom.
 +
*20h30 - 21h30: '''[https://www.owasp.org/images/d/d1/Owasp_be_Vulnerability_Prediction_in_Android_Apps.pdf Vulnerability Prediction in Android Applications]''' (by Aram Hovsepyan, Ph. D.)<br>
 +
:We present an approach to predict which components of a software system contain security vulnerabilities. Prediction models are a key instrument to identify the weak spots that deserve special scrutiny. Our approach is based on text mining the source code of an application. We have explored the potential of the bag-of-words representation and discovered that a dependable prediction model can be built by means of machine learning techniques. In a validation with 10 Android applications we have obtained performance results that often outclass state-of-the-art approaches.
 +
 
 +
=== Coverage ===
 +
xme has blogged about the meeting on his [http://blog.rootshell.be/2013/06/06/june-2013-owasp-belgium-chapter-meeting-wrap-up/ /dev/random blog]
 +
 
 +
=== REGISTRATION  ===
 +
Please register via CLOSED
 +
 
 +
== Previous Meeting (5th of March 2013) in Leuven ==
  
 
=== WHEN ===
 
=== WHEN ===
Line 43: Line 243:
 
Hosted by [http://distrinet.cs.kuleuven.be Distrinet Research Group (K.U.Leuven)].
 
Hosted by [http://distrinet.cs.kuleuven.be Distrinet Research Group (K.U.Leuven)].
  
Address: <br> Department of Computer Science (meeting room '''05.128''' - fifth floor)<br> Celestijnenlaan 200 A<br> 3001 Heverlee <br>  
+
Address: '''UPDATED!'''<br>
 +
'''Welcome & Sandwiches:''' <br>Department of Computer Science (foyer at ground floor)<br> Celestijnenlaan 200 A<br> 3001 Heverlee ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&nbol=(50.864186697481145,%204.678754210472107)&zoomlevel=17&plaatsnaam=Department+of+Computer+Science&maptype=roadmap google maps])<br>
 +
'''Talks:''' <br>Celestijnenlaan 200L, Auditorium L.00.06<br> 3001 Heverlee ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&nbol=(50.86327251977556,%204.679660797119141)&zoomlevel=17&plaatsnaam=200L.00.06&maptype=roadmap google maps])<br>
  
 
Routemap: http://distrinet.cs.kuleuven.be/about/route/
 
Routemap: http://distrinet.cs.kuleuven.be/about/route/
Line 59: Line 261:
 
:'''Dr. Steven J. Murdoch''' is a Royal Society University Research Fellow in the Security Group of the University of Cambridge Computer Laboratory, working on developing metrics for security and privacy. His research interests include covert channels, banking security, anonymous communications, and censorship resistance. Following his PhD studies on anonymous communications, he worked with the OpenNet Initiative, investigating Internet censorship. He then worked for the Tor Project, on improving the security and usability of the Tor anonymity system. Currently he is supported by the Royal Society on developing methods to understand complex system security. He is also working on analyzing the security of banking systems especially Chip & PIN/EMV, and is Chief Security Architect of Cronto, an online authentication technology provider.
 
:'''Dr. Steven J. Murdoch''' is a Royal Society University Research Fellow in the Security Group of the University of Cambridge Computer Laboratory, working on developing metrics for security and privacy. His research interests include covert channels, banking security, anonymous communications, and censorship resistance. Following his PhD studies on anonymous communications, he worked with the OpenNet Initiative, investigating Internet censorship. He then worked for the Tor Project, on improving the security and usability of the Tor anonymity system. Currently he is supported by the Royal Society on developing methods to understand complex system security. He is also working on analyzing the security of banking systems especially Chip & PIN/EMV, and is Chief Security Architect of Cronto, an online authentication technology provider.
  
=== REGISTRATION  ===
+
=== PRESENTATIONS ===
Please register via [https://owasp-belgium-2013-03-05.eventbrite.com https://owasp-belgium-2013-03-05.eventbrite.com]
+
The slides are available online!
 +
* '''OWASP Update''' (by Lieven Desmet) ([https://www.owasp.org/images/9/91/Owasp_Belgium_update_2013-03-05.pdf PDF])
 +
* '''25 Years of Vulnerabilities''' (by Yves Younan, Sourcefire) ([https://www.owasp.org/images/c/cc/OWASP_Belgium_Yves_Younan_2013.pdf PDF])
 +
* '''Banking Security: Attacks and Defences''' (by Steven Murdoch, University of Cambridge) ([https://www.owasp.org/images/d/d5/Owasp13bankingsecurity.pdf PDF])
 +
 
 +
=== COVERAGE ===
 +
Follow what they say about us...
 +
* [http://blog.rootshell.be/2013/03/05/owasp-belgium-chapter-wrap-up-march-2013/ /dev/random blog]
  
 
== Past Events  ==
 
== Past Events  ==
Line 80: Line 289:
 
*André Mariën, Inno.com  
 
*André Mariën, Inno.com  
 
*Lieven Desmet, K.U.Leuven  
 
*Lieven Desmet, K.U.Leuven  
*Sebastien Deleersnyder, SAIT Zenitel
+
*Sebastien Deleersnyder, freelance
 
*Bart De Win, Ascure
 
*Bart De Win, Ascure
 
*David Mathy, Focus ICT
 
*David Mathy, Focus ICT

Latest revision as of 15:24, 18 March 2014

OWASP Belgium

Welcome to the Belgium chapter homepage. The chapter leader is Sebastien Deleersnyder
Click here to join the local chapter mailing list.

Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is and open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter.

Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG

[edit]

Upcoming chapter meeting: 20 May 2014 (Brussels)

On Tuesday 20 of May 2014, we will have our next BE chapter meeting in Brussels. Mark your agendas and stay tuned!


Presentations of the 2013 chapter meetings are online

The presentations of our 2013 chapter meetings can be downloaded from https://www.owasp.org/index.php/Belgium#tab=Chapter_Meetings


BeNeLux Days 2013

"BeNeLux Days 2013" are over. Thanks to you for coming and making this event a success!

And of course, we're inviting you from now on to BeNeLux Days 2014 which will take place in Luxembourg!


Stay in touch

Twitter

You can also follow us on Twitter!

OWASP-BE contact list

If you want to be invited for the next OWASP Belgium Chapter meetings, please drop us your contact info.

OWASP-BE discussion mailing list

If you want to join the local chapter mailing list, please click here.

Structural Sponsors 2013/2014

OWASP Member affiliated to the Belgium chapter:

PWC_log_resized.png       

OWASP Belgium thanks its structural chapter supporters for 2013/2014 and the OWASP BeNeLux Days 2013:

Zionsecurity.jpg Nviso_logo_RGB_baseline_200px.png Checkmarx.jpg

If you want to support our chapter, please contact Seba Deleersnyder

Next Meeting (20th of May 2014) in Brussels

WHEN

20th of February 2014 (18h00 - 21h00)

WHERE

Coming soon...

PROGRAM

The agenda:

  • 18h00 - 18h45: Welcome & sandwiches
  • 18h45 - 19h00: OWASP Update (by Sebastien Deleersnyder, OWASP Belgium Board)
  • 19h00 - 20h00: Securing Password Storage – Increasing Resistance to Brute Force Attacks (by Tiago Teles)
Abstract: In this talk Tiago Teles takes apart password protection scheme analyzing the attack resistance of hashes, hmacs, adaptive hashes (such as script), and encryption schemes. First, we present a threat model for password storage. Then audience members will learn the construction, performance, and protective properties of these primitives. Discussion of the primitives will be from a critical perspective modeled as an iterative secure design session.
Ultimately, this session presents the solution and code donated as part an on-going OWASP project – a OWASP PSM (password storage module). Discussion of this solution will include key techniques for hardening PSM learned through years of delivering production JavaEE code to customers…
Bio: Tiago Teles is a Technical Consultant with 8 years of experience in clients across different sectors and countries, including banking, insurance, telecommunications and commercial organizations in a variety of roles: Delivering Training, Development, Business Intelligence and Quality Assurance. For some of the talks already delivered please see: Video talks for more information please visit: [http://nl.linkedin.com/in/tiagoteles Tiago Teles' LinkedIn profile.
  • 20h00 - 20h15: Break
  • 20h15 - 21h15: Coming soon...

REGISTRATION

Coming soon...


Previous Meeting (12th of February 2014) in Leuven

WHEN

12th of February 2014 (18h00 - 21h00)

WHERE

Jointly organized with SecAppDev. Hosted by iMinds-Distrinet Research Group (KU Leuven).

Both speakers are faculty of the Secure Application Development course which is held in Leuven from 10 to 14 February 2014. OWASP Members get a 10% discount to attend the course.

Address:
Department of Computer Science (foyer at ground floor)
Celestijnenlaan 200 A
3001 Heverlee (google maps)

Routemap: https://distrinet.cs.kuleuven.be/about/route/

Last minute update:

I would like to notify you that due to traffic work you most probably will have to make a detour to get to the university campus.

Because of a road block at the Celestijnenlaan, this street has become one way. This forces participants coming from the E40/Koning Boudewijnlaan to reach the campus via the ring (R23)/Naamsesteenweg/Kardinaal Mercierlaan.

A map of the detour can be found here: http://goo.gl/maps/kZqEQ

As this is the only way to get to the campus, take into account that it may lead to significant delays.

PROGRAM

The agenda:

  • 18h00 - 18h45: Welcome & sandwiches
  • 18h45 - 19h00: OWASP Update (by Sebastien Deleersnyder, OWASP Belgium Board)
  • 19h00 - 20h00: Smart metering privacy (by George Danezis)
Abstract: In the past few years tremendous cryptographic progress has been made in relation to primitives for privacy friendly-computations. These include celebrated results around fully homomorphic encryption, faster somehow homomorphic encryption, and ways to leverage them to support more efficient secret-sharing based secure multi-party computations. Similar break-through in verifiable computation, and succinct arguments of knowledge, make it practical to verify complex computations, as part of privacy-preserving client side program execution. Besides computations themselves, notions like differential privacy attempt to capture the essence of what it means for computations to leak little personal information, and have been mapped to existing data query languages.
So, is the problem of computation on private data solved, or just about to be solved? In this talk, I argue that the models of generic computation supported by cryptographic primitives are complete, but rather removed from what a typical engineer or data analyst expects. Furthermore, the use of these cryptographic technologies impose constrains that require fundamental changes in the engineering of computing systems. While those challenges are not obviously cryptographic in nature, they are nevertheless hard to overcome, have serious performance implications, and errors open avenues for attack.
Throughout the talk I use examples from our own work relating to privacy-friendly computations within smart grid and smart metering deployments for private billing, privacy-friendly aggregation, statistics and fraud detection. These experiences have guided the design of ZQL, a cryptographic language and compiler for zero-knowledge proofs, as well as more recent tools that compile using secret-sharing based primitives.
Bio: George Danezis is a Reader in Security and Privacy Engineering at the Department of Computer Science of University College London. He has been working on anonymous communications, privacy enhancing technologies (PET), and traffic analysis since 2000. He has previously been a researcher for Microsoft Research, Cambridge; a visiting fellow at K.U.Leuven (Belgium); and a research associate at the University of Cambridge (UK), where he also completed his doctoral dissertation under the supervision of Prof. R.J. Anderson.
Abstract: The heart of how users interact with a web application is the HTML form submission. A great deal of very sensitive data flows over HTML forms. Securing web form submissions is critical for the construction of a secure web application. Multi-form workflows make securing form submissions even more complicated! This presentation will take you on a journey as untrusted data flows from a form submission into the many layers of a secure web application.
  • Review some of the basic threats against web forms
  • Learn some of the most important defense categories for building secure web forms
  • Discuss some of the more complex aspects to form construction, such as workflow
Bio: Jim Manico is the VP of Security Architecture at WhiteHat Security. Jim has been a web application developer since 1997. He has also been an active member of OWASP since 2008 supporting projects that help developers write secure code.

REGISTRATION

Please register on EventBrite

Previous Meeting (17th of December 2013) in Leuven

WHEN

17th of December 2013 (18h00 - 21h00)

WHERE

Jointly organized with (ISC)2.

Hosted by iMinds-Distrinet Research Group (KU Leuven).

Address:
Department of Computer Science (foyer at ground floor)
Celestijnenlaan 200 A
3001 Heverlee (google maps)

Routemap: https://distrinet.cs.kuleuven.be/about/route/

PROGRAM

The agenda:

  • 18h00 - 18h45: Welcome drink and Pizza (sponsored by F5 Networks)
  • 18h45 - 19h00: OWASP / ISC2 Update (by Sebastien Deleersnyder, OWASP Belgium Board & Lode Vanstechelman, ISC2 Belgium Board)
  • 19h00 - 20h00: Augmented reality in your Web Proxy (by Roberto Suggi Liverani)
Abstract: This talk intends to demonstrate how to improve web application security testing by combining browser automation framework and web proxy API.
The goal of this research is to bring a web proxy as close as possible to a browser to achieve a better security testing coverage, especially when dealing with complex client-side technology.
The presentation includes a montage of real case scenarios, showing how this approach can lead to the discovery of vulnerabilities which might otherwise go unnoticed.
Bio: Roberto loves breaking applications for fun and profit. In the last years, Roberto has been involved in the infosec community by founding the OWASP New Zealand chapter and by publishing vulnerabilities affecting major software products. Roberto has been a guest speaker at global security conferences, including HITB, EUSecWest, DEFCON, Ruxcon, Kiwicon and HackPra AllStars.
Roberto tweets from @malerisch and his blog can be found at: http://blog.malerisch.net
Abstract: Browser 0-days are very expensive and thus not available for the common attacker. Therefore an attacker may switch his focus from exploiting the browser towards exploiting the browser's internal network infrastructure. A normal webbrowser can serve as a pivot to attack the company's internal network. Internal networks are generally less protected and are potentially less segregated in terms of security, so pivoting through the browser can help the attacker to reach those otherwise unreachable targets.
The Browser Exploitation Framework, aka BeEF, is a professional security tool that can help you during a pentest performing these kinds of attacks.
Bio: Bart Leppens is one of the BeEF developers. During his talk he will introduce you to BeEF, Inter-Protocol Communication (IPC) & Inter-Protocol Exploitation (IPE). If you're thinking about buying an expensive firewall, it's advisable to wait until after his talk. There is a risk you might want to throw it all away.

Coverage

Covered by Xavier Mertens: http://blog.rootshell.be/2013/12/18/owasp-belgium-chapter-meeting-wrap-up-using-browsers-otherwise/

REGISTRATION

Please register on EventBrite

Previous Meeting (8th of October 2013) in Diegem

WHEN

8th of October 2013 (18h00 - 21h00)

WHERE

Hosted by Ernst & Young.

Address:
Ernst & Young
De Kleetlaan 2
B1831 Diegem
Location: Google Maps.

PROGRAM

The agenda:

  • 17h30 - 18h15: Welcome & sandwiches
  • 18h15 - 18h30: OWASP Update (by Sebastien Deleersnyder, OWASP Belgium Board)
  • 18h30 - 19h30: NoScript for Developers (by Giorgio Maone)
Everything security-conscious web developers should know to make their creations safer and more accessible for NoScript users, plus an overview of current and upcoming technologies inspired by NoScript which can be leveraged server-side to enhance web applications' security.
Giorgio Maone is a software developer and security researcher born and living in Palermo, Italy. He's member of the Mozilla Security Group and invited expert in the W3C's Web Application Security Working Group. In 2005 he created the NoScript browser security add-on, which still today absorbs most of the time and energy left by his main job: parenting 3 little children.
There is a way to build common, classic web applications. You know, servers, databases, some HTML and a bit of JavaScript. Ye olde way. Grandfather still knows. And there is a way to build hip and fancy, modern and light-weight, elastic and scalable client-side web applications. Sometimes with a server in the background, sometimes with a database - but all the hard work is done by something new: JavaScript Model-View-Controller and templating frameworks.
Angular, Ember and CanJS, Knockout, Handlebars and Underscore... those aren't names of famous wrestlers but modern JavaScript fame-works that offer a boost in performance and productivity by taking care of many things web-app right there in the browser, where the magic happens. And more and more people jump on the bandwagon and implement those frameworks with great success. High time for a stern look from the security perspective, ain't it not?
This talk will show you how those frameworks work, how secure their core is and what kind of security issues spawn from the generous feature cornucopia they offer. Do their authors really know the DOM well enough to enrich it with dozens of abstraction layers? Or did they open a gate straight to JavaScript hell introducing a wide range of new injection bugs and coding worst-practices? Well, you'll know after this talk. You'll know...
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.

Coverage

xme's write-up on blog.rootshell.be

REGISTRATION

Please register on EventBrite

Previous Meeting (6th of June 2013) in Leuven

WHEN

6th of June 2013 (18h00 - 21h00)

WHERE

This chapter meeting is part of the OWASP Europe Tour 2013


Hosted by iMinds-Distrinet Research Group (KU Leuven).

Address:
Department of Computer Science (foyer at ground floor)
Celestijnenlaan 200 A
3001 Heverlee (google maps)

Routemap: https://distrinet.cs.kuleuven.be/about/route/

PROGRAM

The agenda:

TBD
Using static analysis to identify software bugs is not a new paradigm. For years, developers have used static analysis tools to identifying code quality issues. While these tools may not be specifically designed for identifying security bugs. This presentation will discuss how custom security rules can be added to existing code quality tools to identify potential software security bugs. Writing custom software security rules for the popular Java code scanning tool PMD will be the focus of the presentation.
Justin Clarke is a Director and Co-Founder of Gotham Digital Science. He is the lead author/technical editor of "SQL Injection Attacks and Defense" (Syngress), co-author of "Network Security Tools" (O'Reilly), contributor to "Network Security Assessment, 2nd Edition" (O'Reilly), as well as a speaker at numerous security conferences and events such as Black Hat, EuSecWest, ISACA, BruCON, OWASP AppSec, OSCON, RSA and SANS. Justin is the Chapter Leader for the OWASP London chapter in the United Kingdom.
We present an approach to predict which components of a software system contain security vulnerabilities. Prediction models are a key instrument to identify the weak spots that deserve special scrutiny. Our approach is based on text mining the source code of an application. We have explored the potential of the bag-of-words representation and discovered that a dependable prediction model can be built by means of machine learning techniques. In a validation with 10 Android applications we have obtained performance results that often outclass state-of-the-art approaches.

Coverage

xme has blogged about the meeting on his /dev/random blog

REGISTRATION

Please register via CLOSED

Previous Meeting (5th of March 2013) in Leuven

WHEN

5th of March 2013 (18h00 - 21h00)

WHERE

This chapter meeting is co-organized with SecAppDev.

Both speakers are faculty of the Secure Application Development course which is held in Leuven from 4 March 2013 until 8 March 2013. OWASP Members get a 10% discount to attend the course.


Hosted by Distrinet Research Group (K.U.Leuven).

Address: UPDATED!
Welcome & Sandwiches:
Department of Computer Science (foyer at ground floor)
Celestijnenlaan 200 A
3001 Heverlee (google maps)
Talks:
Celestijnenlaan 200L, Auditorium L.00.06
3001 Heverlee (google maps)

Routemap: http://distrinet.cs.kuleuven.be/about/route/

PROGRAM

The agenda:

  • 18h00 - 18h30: Welcome & sandwiches
  • 18h30 - 18h45: OWASP Update (by Lieven Desmet, OWASP Belgium Board)
  • 18h45 - 19h45: 25 Years of Vulnerabilities (by Yves Younan, Senior Research Engineer at Sourcefire)
This talk will take a look into the interesting world of vulnerability statistics. We have examined data for the last 25 years and used it to map out trends and general information on vulnerabilities in software. Some of the questions we look at are "What were the most popular vulnerabilities? Which had the most impact? Which vendors and products suffered from the most issues? Etc. While some of the statistics are predictable, others are surprising. This data was first introduced at RSA Conference San Francisco 2013.
Dr. Yves Younan is a Senior Research Engineer in the Vulnerability Research Team (VRT) at Sourcefire where he works on vulnerabilities and mitigations. Prior to joining Sourcefire, he worked as a Security Researcher with BlackBerry Security at Research In Motion. Before joining RIM, he was an academic, founding the Native Code Security group within the DistriNet research group at the KU Leuven in Belgium. He received a Master's degree in Computer Science from the Vrije Universiteit Brussel (VUB) and a PhD in Engineering: Computer Science from KU Leuven. His PhD focused on building efficient mitigations against vulnerability exploitation, several practical mitigations were published and presented at international conferences.
  • 19h45 - 20h00: Break
  • 20h00 - 21h00: Banking Security: Attacks and Defences (by Steven Murdoch, Senior Researcher at University of Cambridge)
Designers of banking security systems are faced with a difficult challenge of developing technology within a tightly constrained budget, yet which must be capable of defeating attacks by determined, well-equipped criminals. This talk will summarise banking security technologies for protecting Chip and PIN/EMV card payments, online shopping, and online banking. The effectiveness of the security measures will be discussed, along with vulnerabilities discovered in them both by academics and by criminals. These vulnerabilities include cryptographic flaws, failures of tamper resistance, and poor implementation decisions, and have led not only to significant financial losses, but in some cases unfair allocation of liability. Proposed improvements will also be described, not only to the technical failures but also to the legal and regulatory regimes which are the underlying reason for some of these problems not being properly addressed.
Dr. Steven J. Murdoch is a Royal Society University Research Fellow in the Security Group of the University of Cambridge Computer Laboratory, working on developing metrics for security and privacy. His research interests include covert channels, banking security, anonymous communications, and censorship resistance. Following his PhD studies on anonymous communications, he worked with the OpenNet Initiative, investigating Internet censorship. He then worked for the Tor Project, on improving the security and usability of the Tor anonymity system. Currently he is supported by the Royal Society on developing methods to understand complex system security. He is also working on analyzing the security of banking systems especially Chip & PIN/EMV, and is Chief Security Architect of Cronto, an online authentication technology provider.

PRESENTATIONS

The slides are available online!

  • OWASP Update (by Lieven Desmet) (PDF)
  • 25 Years of Vulnerabilities (by Yves Younan, Sourcefire) (PDF)
  • Banking Security: Attacks and Defences (by Steven Murdoch, University of Cambridge) (PDF)

COVERAGE

Follow what they say about us...

Past Events

  • Events held in 2012
  • Events held in 2011
  • Events held in 2010
  • Events held in 2009
  • Events held in 2008
  • Events held in 2007
  • Events held in 2006
  • Events held in 2005

The Belgium Chapter is supported by the following board:

  • Erwin Geirnaert, Zion Security
  • Philippe Bogaerts, F5
  • André Mariën, Inno.com
  • Lieven Desmet, K.U.Leuven
  • Sebastien Deleersnyder, freelance
  • Bart De Win, Ascure
  • David Mathy, Focus ICT
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects.