Difference between revisions of "OWASP Israel 2009 12"

From OWASP
Jump to: navigation, search
(Created page with 'The meeting will be held in Tuesday, Dec 8th, 2009. Agenda & venue information will be provided closer to the meeting.')
 
Line 1: Line 1:
 
The meeting will be held in Tuesday, Dec 8th, 2009.
 
The meeting will be held in Tuesday, Dec 8th, 2009.
  
 +
Location: IBM/Watchfire Offices, Sapir 1, Herzliya Pituach
  
Agenda & venue information will be provided closer to the meeting.
+
Map: [http://maps.google.com/maps?f=q&source=s_q&hl=iw&geocode=&q=ספיר+1,+הרצליה&sll=32.226743,34.747009&sspn=2.304774,4.22699&ie=UTF8&hq=&hnear=ספיר+1,+הרצליה,+ישראל&z=17&iwloc=A]
 +
 
 +
== '''Agenda''' ==
 +
 
 +
== OWASP DC 2009 Highlights ==
 +
Ofer Maor, Hacktics
 +
 
 +
In this lecture we will review the highlights of the last global OWASP Conference in DC. We will review some of the new aspects in application security, and new OWASP Projects. Among other topics, we will discuss the upcoming launch of the new OWASP Top 10 (2010), which is now in Release Candidate state, and reflects the changes in the spread of various application attacks.
 +
 
 +
 
 +
== Decompilation Injection ==
 +
Maty Siman, Checkmarx
 +
 
 +
The presentation will show a novel way to protect .NET assemblies against reverse-engineering and recompilation. By injecting them with commands that are activated only at the recompilation stage, the application retroactively detects the reverse-engineering process and acts upon it.

Revision as of 10:05, 6 December 2009

The meeting will be held in Tuesday, Dec 8th, 2009.

Location: IBM/Watchfire Offices, Sapir 1, Herzliya Pituach

Map: [1]

Agenda

OWASP DC 2009 Highlights

Ofer Maor, Hacktics

In this lecture we will review the highlights of the last global OWASP Conference in DC. We will review some of the new aspects in application security, and new OWASP Projects. Among other topics, we will discuss the upcoming launch of the new OWASP Top 10 (2010), which is now in Release Candidate state, and reflects the changes in the spread of various application attacks.


Decompilation Injection

Maty Siman, Checkmarx

The presentation will show a novel way to protect .NET assemblies against reverse-engineering and recompilation. By injecting them with commands that are activated only at the recompilation stage, the application retroactively detects the reverse-engineering process and acts upon it.