Difference between revisions of "EUTour2013 Lisbon Agenda"

From OWASP
Jump to: navigation, search
(OWASP Europe Tour - Lisbon 2013)
(OWASP Europe Tour - Lisbon 2013)
Line 54: Line 54:
 
|-
 
|-
 
| style="width:8%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | xx:xx - xx:xx
 
| style="width:8%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | xx:xx - xx:xx
| style="width:20%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="3" | Welcome note
+
| style="width:20%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="3" | Opening
 
|-
 
|-
 
| style="width:8%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | xx:xx - xx:xx
 
| style="width:8%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | xx:xx - xx:xx
Line 65: Line 65:
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Pedro Fortuna.<BR>CTO, Auditmark.
 
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Pedro Fortuna.<BR>CTO, Auditmark.
 
| style="width:65%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | '''Protecting JavaScript source code – Facts and Fiction'''.<BR>The goal of code obfuscation is to delay the understanding of a program does. It can be used, for example, in scenarios where the code contains Intellectual Property (algorithms) or when the owner wants to prevent a competitor for stealing and reusing the code. To achieve it, an obfuscation transformation translates easy to understand code into a much harder to understand form. But in order to be resilient, obfuscation transformations need also to resist automatic reversal performed using static or dynamic code analysis techniques. This presentation focuses on the specific case of JavaScript source obfuscation, main usage cases, presents some obfuscation examples and their value in providing real protection against reverse-engineering.  
 
| style="width:65%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | '''Protecting JavaScript source code – Facts and Fiction'''.<BR>The goal of code obfuscation is to delay the understanding of a program does. It can be used, for example, in scenarios where the code contains Intellectual Property (algorithms) or when the owner wants to prevent a competitor for stealing and reusing the code. To achieve it, an obfuscation transformation translates easy to understand code into a much harder to understand form. But in order to be resilient, obfuscation transformations need also to resist automatic reversal performed using static or dynamic code analysis techniques. This presentation focuses on the specific case of JavaScript source obfuscation, main usage cases, presents some obfuscation examples and their value in providing real protection against reverse-engineering.  
 +
|-
 +
|-
 +
| style="width:8%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | xx:xx - xx:xx
 +
| style="width:7%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[image:vicenteaguillera.png]]
 +
| style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Vicente Aguillera.<BR>CTO, Auditmark.
 +
| style="width:65%" valign="middle" height="30" bgcolor="#EEEEEE" align="justify" colspan="0" | '''Android reverse engineering: understanding third-party applications'''.<BR>It will present the objectives of the software reverse engineering and the techniques and tools to execute this process in Android applications. It will present, from a security analyst point of view and in a practical manner, the process of analyzing an existing application at Google Play Store.
 
|-
 
|-
 
| style="width:8%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | xx:xx - xx:xx
 
| style="width:8%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | xx:xx - xx:xx
 
| style="width:7%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="3" | Closure
 
| style="width:7%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="3" | Closure
 
|}
 
|}

Revision as of 09:58, 12 June 2013

Eu tour1.png

OWASP EUROPE TOUR 2013

Tour Home Page
Tour Scheadule
Tour Organizers Resources
Mailing List

CONFERENCE

OWASP Europe Tour - Lisbon 2013

Friday 21st June (Conference)

DESCRIPTION
OWASP Europe TOUR, is an event across the European region that promotes awareness about application security, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.
  • Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document & Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle.
  • This event aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them.
OWASP MEMBERSHIP
During the OWASP Europe Tour you could become a member and support our mission.

Become an OWASP member by clicking here


CONFERENCE (Friday 21st June)

Date Location
Friday 21st June Venue Location: ISCTE-IUL University Institute of Lisbon, Aud. B2.03

Venue Address: Avª das Forças Armadas, 1649-026 Lisboa
Venue Map: Google Maps

Price and registration
This event is FREE
Registration Link to the Europe Tour (Lisboa): Registration



Conference Details
Time Speaker Title / Description
xx:xx - xx:xx Opening
xx:xx - xx:xx Lievendesmet.png Lieven Desmet
DistriNet Research Group, Katholieke Universiteit Leuven, OWASP Benelux.
Sandboxing JavaScript.
- Discussing the problem of remote script inclusion based on an analysis of the Top 10.000 websites; - Overview of JavaScript sandboxing techniques, with particular focus on JSand (ie. a prototype we have developed at KU Leuven).
xx:xx - xx:xx Pedrofortuna.png Pedro Fortuna.
CTO, Auditmark.
Protecting JavaScript source code – Facts and Fiction.
The goal of code obfuscation is to delay the understanding of a program does. It can be used, for example, in scenarios where the code contains Intellectual Property (algorithms) or when the owner wants to prevent a competitor for stealing and reusing the code. To achieve it, an obfuscation transformation translates easy to understand code into a much harder to understand form. But in order to be resilient, obfuscation transformations need also to resist automatic reversal performed using static or dynamic code analysis techniques. This presentation focuses on the specific case of JavaScript source obfuscation, main usage cases, presents some obfuscation examples and their value in providing real protection against reverse-engineering.
xx:xx - xx:xx File:Vicenteaguillera.png Vicente Aguillera.
CTO, Auditmark.
Android reverse engineering: understanding third-party applications.
It will present the objectives of the software reverse engineering and the techniques and tools to execute this process in Android applications. It will present, from a security analyst point of view and in a practical manner, the process of analyzing an existing application at Google Play Store.
xx:xx - xx:xx Closure