secappdev.org
secappdev.org
  • Видео 76
  • Просмотров 325 685
Between Testing and Formal Verification - Jan Tobias Muehlberg
The security testing of software is inherently difficult. This is because vulnerabilities typically emerge as unanticipated interactions in the design of a software component, as implementation artefacts that were not specified in the design, or as bugs, where design and implementation deviate. Thus, when searching for breaches of security properties we are looking for design or implementation details that can be abused in ways not considered by the designers, developers and testers of a software component.
Formal methods promise to systematise this search for needles in haystacks and use mathematical rigour to provide convincing arguments for the absence of such needles. Yet, with few ex...
Просмотров: 3 665

Видео

AuthN/Z for REST service - Johan Peeters
Просмотров 8107 лет назад
REST services are very popular. Unfortunately, many are not secure. In this session, we identify access control requirements for a range of application types and discuss how these can be delivered with current standards and tools. The presentation is interactive; we discuss the trade-offs when implementing typical requirements. OpenID Providers authenticate end users and issue a security token ...
Towards a Secure IoT Landscape - Danny De Cock
Просмотров 2467 лет назад
The Internet of Things (IOT) allows one to check and control devices and sensors fully automatically and remotely. All sorts of equipment including cameras, physical health monitors, domotics, alarms and access control systems can report events and the receiver of these notifications can take action when necessary. These devices and sensors can be used everywhere. Not only in the house, in hosp...
The Rise and Fall of Client-Side Web Security Technologies - Philippe De Ryck
Просмотров 6617 лет назад
The web used to be sever-centric, and the browser was merely a rendering engine to display information. Today, the introduction of numerous new technologies has made the web client-centric. A similar evolution can be seen in web security technologies. In recent years, numerous new security technologies can be configured by the server and are enforced by the browser. In this session, we investig...
Blockchain: Distributed Trust - Bart Preneel
Просмотров 3 тыс.7 лет назад
The Bitcoin ecosystem had a bumpy start, but driven in part by the demand created by the Silk Road and perhaps the Cyprus crisis, the impact grew quickly: the total value of bitcoins rose to several billion US$ in the first two years (currently it is around US$ 14 billion), hundreds of alternative cryptocurrencies (altcoins) were created and large mining entities were established, mostly in Chi...
New Security Control Enhancements Java 8 and 9 - Jim Manico
Просмотров 4437 лет назад
Secure software requires making a wide variety of security controls available to the developer. These controls range from automatic defenses to APIs that developers simply need to use, to controls that require extensive configuration and understanding to be used effectively. This session reviews several new security controls available in the Java 8 and 9 platforms. It also covers other importan...
OAuth 2.0 Security Introduction - Jim Manico
Просмотров 4,5 тыс.7 лет назад
OAuth is a delegation framework that appears on the radar of security professionals and developers more and more every day. OAuth intersects with authentication and access control, yet you would not likely use OAuth in and of itself for authentication, session management or an access control in your applications. Even more confusing, OAuth is not a standard and various service providers will li...
Data Mining for Security - Konrad Rieck
Просмотров 2,3 тыс.7 лет назад
Many tasks in computer security revolve around the manual analysis of data, such as the inspection of log files or network traffic. Data mining and machine learning can help to accelerate these tasks and provides versatile tools for detecting and analyzing security data. The sesions deals with the combination of machine learning and computer security. After a short introduction to the basics of...
Addressing Privacy in Cloud Service Development - Seda Gürses
Просмотров 2677 лет назад
Three major shifts have transformed the practice of software engineering over the last two decades. In short, these are the shifts from waterfall to agile development, from shrink-wrap software to services, and from the PC to the cloud. I will refer to this transformation as the 'agile turn’. After going over the different tenets of the agile turn based on interviews with developers in the US, ...
Building Secure Angular Application - Philippe De Ryck
Просмотров 1,7 тыс.7 лет назад
Angular is one of the most popular frameworks, and there is a huge amount of information available on building applications, improving performance, and various other topics. But do you know how to make your Angular applications secure? What kind of security features does Angular offer you, and which additional steps can you take to really boost the security of your applications? In this talk, y...
A day in the life of a malware analyst - Didier Stevens
Просмотров 14 тыс.7 лет назад
Join Didier Stevens (NVISO) in a typical day of a malware analyst. Following the malware response cycle, the analyst is first informed that (potential) malware is detected. Then a decision must be taken to analyze the malware or not. After analyzing the malware, appropriate actions are taken. This session requires no pre-requisite knowledge about malware or anti-virus. Didier will explain the d...
Privacy Research Paradigms - Seda Gürses
Просмотров 5827 лет назад
The number of privacy debacles of the last years in social networks, web tracking, NSA/GCHQ surveillance, and mass scale breaches have been adding up. Contrary to claims that “privacy is dead”, the popularity of court cases with national and international implications, like Apple vs. FBI, are indicators that people around the world do care about their privacy, and the ambition to design and mai...
The Web's Security Model in 2017 - Philippe De Ryck
Просмотров 1,4 тыс.7 лет назад
While the web has undergone a dramatic transformation since the first static HTML documents, the underlying security model has been largely unchanged. However, due to the vastly expanded client-side capabilities in modern web applications, the security model is now more important than ever. Understanding this security model is key to building secure web applications. In this session we explore ...
Practical Android Security - Dario Incalza
Просмотров 7117 лет назад
In this session we will cover different attack techniques on Android applications followed by common best practices to protect against these attacks. We start with an introduction to the Android platform stack, Android application and attack surfaces. We introduce several reverse engineering concepts and how they apply to Android applications. We look into how bad cryptography implementations i...
Secure Development Lifecycles (SDLC): Introduction and Process Models - Bart De Win
Просмотров 7 тыс.7 лет назад
It takes much more than a good developer to build secure software within an organisation. Indeed, building secure software is about ensuring that security is taken into consideration during the entire software lifecycle. It is about ensuring that security best practices are being employed efficiently, and that uncovered risks are appropriately dealt with in due time. In this session, an overvie...
The OWASP Top Ten Proactive Controls - Jim Manico
Просмотров 11 тыс.7 лет назад
The OWASP Top Ten Proactive Controls - Jim Manico
Android Security - Dan Wallach
Просмотров 2317 лет назад
Android Security - Dan Wallach
Hardening Mobile Apps - Ken van Wyk
Просмотров 2097 лет назад
Hardening Mobile Apps - Ken van Wyk
Efficient Tamper-Evident Data Structures for Untrusted Servers - Dan Wallach
Просмотров 4427 лет назад
Efficient Tamper-Evident Data Structures for Untrusted Servers - Dan Wallach
Access Control - Maarten Decat
Просмотров 5937 лет назад
Access Control - Maarten Decat
Recent Advances in System Software Security - Frank Piessens
Просмотров 5707 лет назад
Recent Advances in System Software Security - Frank Piessens
SSL/TLS Deployment Best Practices - Ivan Ristić
Просмотров 2,3 тыс.7 лет назад
SSL/TLS Deployment Best Practices - Ivan Ristić
Tales of a Bug Bounty Hunter - Arne Swinnen
Просмотров 3,4 тыс.7 лет назад
Tales of a Bug Bounty Hunter - Arne Swinnen
Cryptography in a post-Snowden era - Bart Preneel
Просмотров 1,3 тыс.8 лет назад
Cryptography in a post-Snowden era - Bart Preneel
Authorization with OAuth 2.0 - Stijn Van den Enden & Jan Van den Bergh
Просмотров 2518 лет назад
Authorization with OAuth 2.0 - Stijn Van den Enden & Jan Van den Bergh
Cryptographic and Information Security in the Post-Snowden Era - Bart Preneel
Просмотров 7408 лет назад
Cryptographic and Information Security in the Post-Snowden Era - Bart Preneel
XSS Defense - Jim Manico
Просмотров 2 тыс.8 лет назад
XSS Defense - Jim Manico
Using SLL/TLS: a hands-on session - Thomas Herlea
Просмотров 4939 лет назад
Using SLL/TLS: a hands-on session - Thomas Herlea
Access control - Frank Piessens
Просмотров 5149 лет назад
Access control - Frank Piessens
Why code reviews and pen-tests are not enough - Jim DelGrosso
Просмотров 5889 лет назад
Why code reviews and pen-tests are not enough - Jim DelGrosso

Комментарии

  • @NgwuaniphilipFridayEde-c6q
    @NgwuaniphilipFridayEde-c6q 23 дня назад

    Philip Friday Ede said that integrity matters security app secure

  • @shikida
    @shikida 4 месяца назад

    this is really awesome, I'd love to see a complete example. But this is already very good

  • @bocckoka
    @bocckoka 10 месяцев назад

    Not writing down his email in a non-scrapable document, that's security.

  • @GuyThompsonFWTX
    @GuyThompsonFWTX Год назад

    Really wish after watching 1.5 hrs of this video that the computer screen or slides could’ve been shared for the last 20 minutes.

  • @hsharma3933
    @hsharma3933 2 года назад

    Why did he say that he was able to break sha2 in a minute with hashcat? I call mega BS

  • @shengweiyou1792
    @shengweiyou1792 2 года назад

    Thank you so much for this informative talk!

  • @Douglas_Gillette
    @Douglas_Gillette 2 года назад

    amazing history

  • @Douglas_Gillette
    @Douglas_Gillette 2 года назад

    amazing history

  • @hsharma3933
    @hsharma3933 2 года назад

    “Bitcoin will die” This aged well

  • @likhitgatagat
    @likhitgatagat 3 года назад

    WOW, JS security discussed here is almost 8 years old, but still relevant.

  • @ibroschool
    @ibroschool 3 года назад

    my man fighting for his life lol. great talk though

  • @for2utube
    @for2utube 3 года назад

    39:30 FYI - a notary public in U.S. does a very different job from a European notary public.

  • @arunsecret2943
    @arunsecret2943 3 года назад

    The awful meter intralysosomally harass because attraction curiosly battle minus a muddled eggnog. dear, smooth flag

  • @isaacdefrain9595
    @isaacdefrain9595 3 года назад

    Fantastic talk, Jan! Thank you for drawing such clear connections between testing and formal verification.

  • @colinbyerly5212
    @colinbyerly5212 3 года назад

    Thank you for your logical presentation and topic Focused to introduction level yet allows a much wider overview and.even wider awareness of important topics all related to real world problems . That affects all users and needs of business as well as home and student use of computers and devices . Without understanding the constantly aimed weapon at all users .No true effort could be made to support any new viral type infections . Your diagram of quarterly new infections of over 2 million new infections that were seen in only 6 months . With thousands of potential infections from each of these . Are more than a threat to everyday users . And needs for insurance and users classes certification to bring affordable insurance and devices verification education and certifications . That can start at a time before a computer users are allowed to use the web . This is such a problem that we as a society must not continue to discard as unattainable . A virtual computer system with a quantum encryption processing blending may be a first step . But international born infections into clouds now may be a greater false security in the near future . What can you predict and how would one currently set up a best use personal and business computer analysis team . That could be developed into local areas to augment computer repair and modification service with a strong computer static and dynamic analysis and threat evaluation .While enhancing public process of education and awareness and increasing the interest into the much needed field of computer security . And smart road map of those elderly or disabled children or children to a smart not overwhelmingly and heavy mind crushing multi path directions in such fast changing technology . That soon be a cloud based security enhanced operation . That still requires security on a personal based foundation. . I look forward to your future videos . And feel a hands on practical teaching of your topics will be a great tool to help to overcome the high jump to language learning . Rather than practical lab with learning to understand such topics as you describe . An application of learning the art of Analysis can be fun as well as educational when it has a road map to a OSI type format . But that is just a wild thought from a beginner. Thank you from Denver. Colorado , for your style of teaching .

  • @nataliah4478
    @nataliah4478 3 года назад

    Thank you this is very fun

  • @marcusbk7317
    @marcusbk7317 3 года назад

    This whole presentation is gold.

  • @domaincontroller
    @domaincontroller 4 года назад

    03:26 Attack payloads 04:49 3 variants of XSS 05:04 reflected 04:54 Stored 04:57 DOM XSS 05:04 Reflected XSS 05:28 Stored XSS ===================================== Input Validation (raw HTML input) ===================================== 06:33 Danger: XSS Weak Defense Used 06:55 how do you stop this 07:40 Eliminate, >, <, &, ", ', filter shorturl.at/yHU49 shorturl.at/qHQVX 08:30 irish, O'Shea , O'malley I can put my name on it, what's wrong with you ===================================== Output Encoding (Strings) ===================================== 09:09 input validation, we want to focus output encoding, output encoding that's gonna save us 10:00 Go 10:30 <, the browser thinks it's code , we have to escape it and convert to a form that's isnt executing &lt; HTML entities, that would display but not execute it like code, use librairies ===================================== 11:41 Danger: Multiple context ===================================== 13:03 the best place to defeat XSS, JavaScript injection is in the user interface itself 14:00 HTML Body escaping , performance 16:03 HTML Attribute Ecaping examples 17:05 URL fragments, URL parameters escaping examples 18:10 Handling Untrusted URL's. Twitter 20:28 Wordpress 25:04 Advanced XSS Defence ===================================== ~26:00 HTML Sanitazation and XSS ===================================== ~ tinyMCE 31:17 few librairies, nodejs ===================================== 35:28 DOM XSS ===================================== Dangerous Javascript Sinks, eval ist just evil, 37:30 jQuery, JSON ===================================== 41:30 Sandboxing ===================================== ~ 44:00 don't put advertisement in your site 45:31 X-Xss-Protection, XSS A ===================================== Content Security Policy (CSP) ===================================== 49:54 CSP, 3rd group of UI defense 50:14 frameworks, angular. HTML sanitization 53:15 how to make our user interface super robust 53:49 Content Security Policy is probably the most important security that reduces the attack surface of your web application 54:23 We can move inline scripts 55:30 when did you apply CSP 56:04 these are response headers 57:02 default-src 'self' 58:21 twitter policy 58:25 Seriously, what is CSP 58:54 How, disable inline, eval 59:41 what is inline JavaScript shorturl.at/avLMZ 01:00:54 how does the browser know 01:01:32 CSP features

  • @CoolPlay100
    @CoolPlay100 4 года назад

    Buen video, me costo entender un poco pero si entendí algo jajaja

  • @techevangelist8373
    @techevangelist8373 4 года назад

    He talks about key algorithms in the beginning and then advice to use RSA because that is widely supported. Then, he says not to use RSA when talking about key exchange. Can some one shed some light?

    • @berndp3426
      @berndp3426 4 года назад

      as he said: wit RSA keyexchange, the keyexchange has a direct bond to the server's private key. Once you change the RSA key, the bond changes in exactly one way. it is simple, therefor was easy to implement with no further hassle. It is static and has no additional subset of identification or variation for how the keyexchange is actually performed - means there is not enough of additional random in a "second dimension" as it is the case with PFS keyexchanges like the EC keyechange provides. They use mathematical functions which do not relate at all to the actual keys, but their primes are choosen from within a whole (very big) range, resulting in a much larger number of possible keyexchanges. So, every keyexchange performed by EC is different, even if the server key stays one and the same. RSA-based encrypted traffic is still being (ab-)used to be "passively decrypted".(allows deep traffic inspection by middleboxes - it only requires the current server key of course to do so and can decrypt all traffic from and to the particular server). Which is not possible anymore when a connection uses strong EC keyexchange over a mathematical function (e.g. x25519) AND AEAD ciphers (such as AES256) . So, you can not revert the results in any way for extracting or relating to a specific key being used. For a wanna-be-middlebox in such case, solely owning the server key is no longer enough here. It also would require to know about all the random going on in the server when doing the EC keyexchange for every single connection. which is - simply spoken - impractical.

    • @hsharma3933
      @hsharma3933 2 года назад

      RSA is good to use because of how prolific it is. However it’s not the best idea for key exchange because it doesn’t support forward secrecy by default. Ecdhe supports forward secrecy by default but it’s more difficult to implement in larger enterprises. So the answer- it depends.

  • @Wastl-lb8oe
    @Wastl-lb8oe 4 года назад

    20:47 Jim says that the client secret is in the URL, that's just incorrect, isn't it?

  • @babupriya8814
    @babupriya8814 4 года назад

    Thank you for your valuable informations.

  • @alexmathews6387
    @alexmathews6387 4 года назад

    At 45:49 Jim recommends collecting pwned credentials from previous data breaches. Wouldn't an organizations run into compliance violations if they keep collecting and updating such breached data? Just a doubt I always had, as we too had this idea.

  • @itsdalena
    @itsdalena 5 лет назад

    hello nate howes class

    • @CannonBurton
      @CannonBurton 5 лет назад

      Hello! I think you beat a lot of us by a day

  • @cjzake3878
    @cjzake3878 5 лет назад

    Material actually starts at 3:30

  • @jacekmalota5571
    @jacekmalota5571 5 лет назад

    thank you

  • @hackersguild8445
    @hackersguild8445 5 лет назад

    Excellent explanation.

  • @BrunoVernay
    @BrunoVernay 5 лет назад

    Excellent. High engagement level! Also handouts.secappdev.org/handouts/2017/Jim%20Manico/04a.%20OAUTH%20Security%20Introduction%20MODULE%202-9-2017.pdf

  • @knsfritz1
    @knsfritz1 5 лет назад

    Is there a link to the talk by Yo (sp?) about OIDC that was referenced around the 10 minute mark?

    • @johanpeeters4833
      @johanpeeters4833 5 лет назад

      ruclips.net/video/PrCxuXOdDQc/видео.html and handouts.secappdev.org/handouts/2017/Johan%20Peeters/authNZ_REST.pdf

  • @lijie2511
    @lijie2511 5 лет назад

    There is no absolute right or wrong, you can do a wrong thing right and you can do a right thing wrong.

  • @lijie2511
    @lijie2511 5 лет назад

    I am big fan of Agile. But it can get very wrong if you don't do it right. When the boeing 737 accidents happened, first thing I checked was that they were doing Agile.

  • @lijie2511
    @lijie2511 5 лет назад

    Software development evolves as a spiral curve. Started simple, gets complex, gets split into microservices...

  • @lijie2511
    @lijie2511 5 лет назад

    Well, I still got 500 bills, hopefully they don’t disappear 😊

  • @lijie2511
    @lijie2511 5 лет назад

    On slide 5, 10:39, I calculated the number of keys for symmetric is n*(n-1)/2, not n^2, and for asymmetric is n*2.

  • @kevintruong9506
    @kevintruong9506 5 лет назад

    I like this guy

  • @rockYhre
    @rockYhre 5 лет назад

    This guy is quite amazing

  • @foobargorch
    @foobargorch 5 лет назад

    45:31 - Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions, Antoine Joux

  • @anbuanbu6591
    @anbuanbu6591 5 лет назад

    How to restrict JavaScript code access from browser console??

  • @subashtamang2771
    @subashtamang2771 6 лет назад

    can you give me some info about secure transport protocols and application protocols

  • @Vtiralovec
    @Vtiralovec 6 лет назад

    Excellent talk!

  • @abczwq8364
    @abczwq8364 6 лет назад

    excellent..easy to understand

  • @fulliculli
    @fulliculli 6 лет назад

    Amazing speech.

  • @Bridgelessalex
    @Bridgelessalex 6 лет назад

    He sounds really mad

  • @CyberAbyss007
    @CyberAbyss007 6 лет назад

    Good stuff.

  • @vijayshreenivos9417
    @vijayshreenivos9417 6 лет назад

    Learnt more in the last 90 minutes than reading over an year about the topic. One request though is to get to see the speakers, whiteboard and also to listen to the audiences questions just like the other videos.

  • @jeffreyroberthagen
    @jeffreyroberthagen 6 лет назад

    While Mr. Preneel's content is always top-notch, the sound quality of this video is poor. Keep the content rolling, as it's rare to hear such in-depth expertise.

  • @wayneallan8964
    @wayneallan8964 6 лет назад

    FYI at 59:00 it looks like the slides get out of sync with the presentation and don't catch up until 1:03:04

  • @MrRahulsangwan
    @MrRahulsangwan 6 лет назад

    good video sir

  • @michaelj.schulz9250
    @michaelj.schulz9250 6 лет назад

    Very good presentation, a good addition to his PHD thesis!

  • @kvrkid
    @kvrkid 6 лет назад

    Super duper.. thanks for this video