- Видео 76
- Просмотров 325 685
secappdev.org
Бельгия
Добавлен 23 мар 2013
We use this channel to publish recordings of our courses on Secure Application Development. It contains the recordings from 2013 onwards.
In the past, recordings were only published on our web site. So check it out to find recordings from between 2007 - 2012.
In the past, recordings were only published on our web site. So check it out to find recordings from between 2007 - 2012.
Between Testing and Formal Verification - Jan Tobias Muehlberg
The security testing of software is inherently difficult. This is because vulnerabilities typically emerge as unanticipated interactions in the design of a software component, as implementation artefacts that were not specified in the design, or as bugs, where design and implementation deviate. Thus, when searching for breaches of security properties we are looking for design or implementation details that can be abused in ways not considered by the designers, developers and testers of a software component.
Formal methods promise to systematise this search for needles in haystacks and use mathematical rigour to provide convincing arguments for the absence of such needles. Yet, with few ex...
Formal methods promise to systematise this search for needles in haystacks and use mathematical rigour to provide convincing arguments for the absence of such needles. Yet, with few ex...
Просмотров: 3 665
Видео
AuthN/Z for REST service - Johan Peeters
Просмотров 8107 лет назад
REST services are very popular. Unfortunately, many are not secure. In this session, we identify access control requirements for a range of application types and discuss how these can be delivered with current standards and tools. The presentation is interactive; we discuss the trade-offs when implementing typical requirements. OpenID Providers authenticate end users and issue a security token ...
Towards a Secure IoT Landscape - Danny De Cock
Просмотров 2467 лет назад
The Internet of Things (IOT) allows one to check and control devices and sensors fully automatically and remotely. All sorts of equipment including cameras, physical health monitors, domotics, alarms and access control systems can report events and the receiver of these notifications can take action when necessary. These devices and sensors can be used everywhere. Not only in the house, in hosp...
The Rise and Fall of Client-Side Web Security Technologies - Philippe De Ryck
Просмотров 6617 лет назад
The web used to be sever-centric, and the browser was merely a rendering engine to display information. Today, the introduction of numerous new technologies has made the web client-centric. A similar evolution can be seen in web security technologies. In recent years, numerous new security technologies can be configured by the server and are enforced by the browser. In this session, we investig...
Blockchain: Distributed Trust - Bart Preneel
Просмотров 3 тыс.7 лет назад
The Bitcoin ecosystem had a bumpy start, but driven in part by the demand created by the Silk Road and perhaps the Cyprus crisis, the impact grew quickly: the total value of bitcoins rose to several billion US$ in the first two years (currently it is around US$ 14 billion), hundreds of alternative cryptocurrencies (altcoins) were created and large mining entities were established, mostly in Chi...
New Security Control Enhancements Java 8 and 9 - Jim Manico
Просмотров 4437 лет назад
Secure software requires making a wide variety of security controls available to the developer. These controls range from automatic defenses to APIs that developers simply need to use, to controls that require extensive configuration and understanding to be used effectively. This session reviews several new security controls available in the Java 8 and 9 platforms. It also covers other importan...
OAuth 2.0 Security Introduction - Jim Manico
Просмотров 4,5 тыс.7 лет назад
OAuth is a delegation framework that appears on the radar of security professionals and developers more and more every day. OAuth intersects with authentication and access control, yet you would not likely use OAuth in and of itself for authentication, session management or an access control in your applications. Even more confusing, OAuth is not a standard and various service providers will li...
Data Mining for Security - Konrad Rieck
Просмотров 2,3 тыс.7 лет назад
Many tasks in computer security revolve around the manual analysis of data, such as the inspection of log files or network traffic. Data mining and machine learning can help to accelerate these tasks and provides versatile tools for detecting and analyzing security data. The sesions deals with the combination of machine learning and computer security. After a short introduction to the basics of...
Addressing Privacy in Cloud Service Development - Seda Gürses
Просмотров 2677 лет назад
Three major shifts have transformed the practice of software engineering over the last two decades. In short, these are the shifts from waterfall to agile development, from shrink-wrap software to services, and from the PC to the cloud. I will refer to this transformation as the 'agile turn’. After going over the different tenets of the agile turn based on interviews with developers in the US, ...
Building Secure Angular Application - Philippe De Ryck
Просмотров 1,7 тыс.7 лет назад
Angular is one of the most popular frameworks, and there is a huge amount of information available on building applications, improving performance, and various other topics. But do you know how to make your Angular applications secure? What kind of security features does Angular offer you, and which additional steps can you take to really boost the security of your applications? In this talk, y...
A day in the life of a malware analyst - Didier Stevens
Просмотров 14 тыс.7 лет назад
Join Didier Stevens (NVISO) in a typical day of a malware analyst. Following the malware response cycle, the analyst is first informed that (potential) malware is detected. Then a decision must be taken to analyze the malware or not. After analyzing the malware, appropriate actions are taken. This session requires no pre-requisite knowledge about malware or anti-virus. Didier will explain the d...
Privacy Research Paradigms - Seda Gürses
Просмотров 5827 лет назад
The number of privacy debacles of the last years in social networks, web tracking, NSA/GCHQ surveillance, and mass scale breaches have been adding up. Contrary to claims that “privacy is dead”, the popularity of court cases with national and international implications, like Apple vs. FBI, are indicators that people around the world do care about their privacy, and the ambition to design and mai...
The Web's Security Model in 2017 - Philippe De Ryck
Просмотров 1,4 тыс.7 лет назад
While the web has undergone a dramatic transformation since the first static HTML documents, the underlying security model has been largely unchanged. However, due to the vastly expanded client-side capabilities in modern web applications, the security model is now more important than ever. Understanding this security model is key to building secure web applications. In this session we explore ...
Practical Android Security - Dario Incalza
Просмотров 7117 лет назад
In this session we will cover different attack techniques on Android applications followed by common best practices to protect against these attacks. We start with an introduction to the Android platform stack, Android application and attack surfaces. We introduce several reverse engineering concepts and how they apply to Android applications. We look into how bad cryptography implementations i...
Secure Development Lifecycles (SDLC): Introduction and Process Models - Bart De Win
Просмотров 7 тыс.7 лет назад
It takes much more than a good developer to build secure software within an organisation. Indeed, building secure software is about ensuring that security is taken into consideration during the entire software lifecycle. It is about ensuring that security best practices are being employed efficiently, and that uncovered risks are appropriately dealt with in due time. In this session, an overvie...
The OWASP Top Ten Proactive Controls - Jim Manico
Просмотров 11 тыс.7 лет назад
The OWASP Top Ten Proactive Controls - Jim Manico
Efficient Tamper-Evident Data Structures for Untrusted Servers - Dan Wallach
Просмотров 4427 лет назад
Efficient Tamper-Evident Data Structures for Untrusted Servers - Dan Wallach
Recent Advances in System Software Security - Frank Piessens
Просмотров 5707 лет назад
Recent Advances in System Software Security - Frank Piessens
SSL/TLS Deployment Best Practices - Ivan Ristić
Просмотров 2,3 тыс.7 лет назад
SSL/TLS Deployment Best Practices - Ivan Ristić
Tales of a Bug Bounty Hunter - Arne Swinnen
Просмотров 3,4 тыс.7 лет назад
Tales of a Bug Bounty Hunter - Arne Swinnen
Cryptography in a post-Snowden era - Bart Preneel
Просмотров 1,3 тыс.8 лет назад
Cryptography in a post-Snowden era - Bart Preneel
Authorization with OAuth 2.0 - Stijn Van den Enden & Jan Van den Bergh
Просмотров 2518 лет назад
Authorization with OAuth 2.0 - Stijn Van den Enden & Jan Van den Bergh
Cryptographic and Information Security in the Post-Snowden Era - Bart Preneel
Просмотров 7408 лет назад
Cryptographic and Information Security in the Post-Snowden Era - Bart Preneel
Using SLL/TLS: a hands-on session - Thomas Herlea
Просмотров 4939 лет назад
Using SLL/TLS: a hands-on session - Thomas Herlea
Why code reviews and pen-tests are not enough - Jim DelGrosso
Просмотров 5889 лет назад
Why code reviews and pen-tests are not enough - Jim DelGrosso
Philip Friday Ede said that integrity matters security app secure
this is really awesome, I'd love to see a complete example. But this is already very good
Not writing down his email in a non-scrapable document, that's security.
Really wish after watching 1.5 hrs of this video that the computer screen or slides could’ve been shared for the last 20 minutes.
Why did he say that he was able to break sha2 in a minute with hashcat? I call mega BS
Thank you so much for this informative talk!
amazing history
amazing history
“Bitcoin will die” This aged well
WOW, JS security discussed here is almost 8 years old, but still relevant.
my man fighting for his life lol. great talk though
39:30 FYI - a notary public in U.S. does a very different job from a European notary public.
The awful meter intralysosomally harass because attraction curiosly battle minus a muddled eggnog. dear, smooth flag
Fantastic talk, Jan! Thank you for drawing such clear connections between testing and formal verification.
Thank you for your logical presentation and topic Focused to introduction level yet allows a much wider overview and.even wider awareness of important topics all related to real world problems . That affects all users and needs of business as well as home and student use of computers and devices . Without understanding the constantly aimed weapon at all users .No true effort could be made to support any new viral type infections . Your diagram of quarterly new infections of over 2 million new infections that were seen in only 6 months . With thousands of potential infections from each of these . Are more than a threat to everyday users . And needs for insurance and users classes certification to bring affordable insurance and devices verification education and certifications . That can start at a time before a computer users are allowed to use the web . This is such a problem that we as a society must not continue to discard as unattainable . A virtual computer system with a quantum encryption processing blending may be a first step . But international born infections into clouds now may be a greater false security in the near future . What can you predict and how would one currently set up a best use personal and business computer analysis team . That could be developed into local areas to augment computer repair and modification service with a strong computer static and dynamic analysis and threat evaluation .While enhancing public process of education and awareness and increasing the interest into the much needed field of computer security . And smart road map of those elderly or disabled children or children to a smart not overwhelmingly and heavy mind crushing multi path directions in such fast changing technology . That soon be a cloud based security enhanced operation . That still requires security on a personal based foundation. . I look forward to your future videos . And feel a hands on practical teaching of your topics will be a great tool to help to overcome the high jump to language learning . Rather than practical lab with learning to understand such topics as you describe . An application of learning the art of Analysis can be fun as well as educational when it has a road map to a OSI type format . But that is just a wild thought from a beginner. Thank you from Denver. Colorado , for your style of teaching .
Thank you this is very fun
This whole presentation is gold.
03:26 Attack payloads 04:49 3 variants of XSS 05:04 reflected 04:54 Stored 04:57 DOM XSS 05:04 Reflected XSS 05:28 Stored XSS ===================================== Input Validation (raw HTML input) ===================================== 06:33 Danger: XSS Weak Defense Used 06:55 how do you stop this 07:40 Eliminate, >, <, &, ", ', filter shorturl.at/yHU49 shorturl.at/qHQVX 08:30 irish, O'Shea , O'malley I can put my name on it, what's wrong with you ===================================== Output Encoding (Strings) ===================================== 09:09 input validation, we want to focus output encoding, output encoding that's gonna save us 10:00 Go 10:30 <, the browser thinks it's code , we have to escape it and convert to a form that's isnt executing < HTML entities, that would display but not execute it like code, use librairies ===================================== 11:41 Danger: Multiple context ===================================== 13:03 the best place to defeat XSS, JavaScript injection is in the user interface itself 14:00 HTML Body escaping , performance 16:03 HTML Attribute Ecaping examples 17:05 URL fragments, URL parameters escaping examples 18:10 Handling Untrusted URL's. Twitter 20:28 Wordpress 25:04 Advanced XSS Defence ===================================== ~26:00 HTML Sanitazation and XSS ===================================== ~ tinyMCE 31:17 few librairies, nodejs ===================================== 35:28 DOM XSS ===================================== Dangerous Javascript Sinks, eval ist just evil, 37:30 jQuery, JSON ===================================== 41:30 Sandboxing ===================================== ~ 44:00 don't put advertisement in your site 45:31 X-Xss-Protection, XSS A ===================================== Content Security Policy (CSP) ===================================== 49:54 CSP, 3rd group of UI defense 50:14 frameworks, angular. HTML sanitization 53:15 how to make our user interface super robust 53:49 Content Security Policy is probably the most important security that reduces the attack surface of your web application 54:23 We can move inline scripts 55:30 when did you apply CSP 56:04 these are response headers 57:02 default-src 'self' 58:21 twitter policy 58:25 Seriously, what is CSP 58:54 How, disable inline, eval 59:41 what is inline JavaScript shorturl.at/avLMZ 01:00:54 how does the browser know 01:01:32 CSP features
Buen video, me costo entender un poco pero si entendí algo jajaja
He talks about key algorithms in the beginning and then advice to use RSA because that is widely supported. Then, he says not to use RSA when talking about key exchange. Can some one shed some light?
as he said: wit RSA keyexchange, the keyexchange has a direct bond to the server's private key. Once you change the RSA key, the bond changes in exactly one way. it is simple, therefor was easy to implement with no further hassle. It is static and has no additional subset of identification or variation for how the keyexchange is actually performed - means there is not enough of additional random in a "second dimension" as it is the case with PFS keyexchanges like the EC keyechange provides. They use mathematical functions which do not relate at all to the actual keys, but their primes are choosen from within a whole (very big) range, resulting in a much larger number of possible keyexchanges. So, every keyexchange performed by EC is different, even if the server key stays one and the same. RSA-based encrypted traffic is still being (ab-)used to be "passively decrypted".(allows deep traffic inspection by middleboxes - it only requires the current server key of course to do so and can decrypt all traffic from and to the particular server). Which is not possible anymore when a connection uses strong EC keyexchange over a mathematical function (e.g. x25519) AND AEAD ciphers (such as AES256) . So, you can not revert the results in any way for extracting or relating to a specific key being used. For a wanna-be-middlebox in such case, solely owning the server key is no longer enough here. It also would require to know about all the random going on in the server when doing the EC keyexchange for every single connection. which is - simply spoken - impractical.
RSA is good to use because of how prolific it is. However it’s not the best idea for key exchange because it doesn’t support forward secrecy by default. Ecdhe supports forward secrecy by default but it’s more difficult to implement in larger enterprises. So the answer- it depends.
20:47 Jim says that the client secret is in the URL, that's just incorrect, isn't it?
Thank you for your valuable informations.
At 45:49 Jim recommends collecting pwned credentials from previous data breaches. Wouldn't an organizations run into compliance violations if they keep collecting and updating such breached data? Just a doubt I always had, as we too had this idea.
hello nate howes class
Hello! I think you beat a lot of us by a day
Material actually starts at 3:30
thank you
Excellent explanation.
Excellent. High engagement level! Also handouts.secappdev.org/handouts/2017/Jim%20Manico/04a.%20OAUTH%20Security%20Introduction%20MODULE%202-9-2017.pdf
Is there a link to the talk by Yo (sp?) about OIDC that was referenced around the 10 minute mark?
ruclips.net/video/PrCxuXOdDQc/видео.html and handouts.secappdev.org/handouts/2017/Johan%20Peeters/authNZ_REST.pdf
There is no absolute right or wrong, you can do a wrong thing right and you can do a right thing wrong.
I am big fan of Agile. But it can get very wrong if you don't do it right. When the boeing 737 accidents happened, first thing I checked was that they were doing Agile.
Software development evolves as a spiral curve. Started simple, gets complex, gets split into microservices...
Well, I still got 500 bills, hopefully they don’t disappear 😊
On slide 5, 10:39, I calculated the number of keys for symmetric is n*(n-1)/2, not n^2, and for asymmetric is n*2.
I like this guy
This guy is quite amazing
45:31 - Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions, Antoine Joux
How to restrict JavaScript code access from browser console??
can you give me some info about secure transport protocols and application protocols
Excellent talk!
excellent..easy to understand
Amazing speech.
He sounds really mad
Good stuff.
Learnt more in the last 90 minutes than reading over an year about the topic. One request though is to get to see the speakers, whiteboard and also to listen to the audiences questions just like the other videos.
While Mr. Preneel's content is always top-notch, the sound quality of this video is poor. Keep the content rolling, as it's rare to hear such in-depth expertise.
FYI at 59:00 it looks like the slides get out of sync with the presentation and don't catch up until 1:03:04
good video sir
Very good presentation, a good addition to his PHD thesis!
Super duper.. thanks for this video