- 76
- 326 007
secappdev.org
Belgium
เข้าร่วมเมื่อ 23 มี.ค. 2013
We use this channel to publish recordings of our courses on Secure Application Development. It contains the recordings from 2013 onwards.
In the past, recordings were only published on our web site. So check it out to find recordings from between 2007 - 2012.
In the past, recordings were only published on our web site. So check it out to find recordings from between 2007 - 2012.
Between Testing and Formal Verification - Jan Tobias Muehlberg
The security testing of software is inherently difficult. This is because vulnerabilities typically emerge as unanticipated interactions in the design of a software component, as implementation artefacts that were not specified in the design, or as bugs, where design and implementation deviate. Thus, when searching for breaches of security properties we are looking for design or implementation details that can be abused in ways not considered by the designers, developers and testers of a software component.
Formal methods promise to systematise this search for needles in haystacks and use mathematical rigour to provide convincing arguments for the absence of such needles. Yet, with few exceptions in safety-critical systems engineering, the adoption of formal techniques in software development processes is low. Furthermore, formal methods traditionally focus on safety aspects of software, i.e., functional correctness and the absence of runtime exceptions of software. In this talk I will outline the advantages and disadvantages of modern approaches to formal software analysis and verification. I will focus on tools and techniques that can be integrated efficiently with testing efforts, in particular in security testing.
Jan Tobias Muehlberg work as a researcher at imec-DistriNet, KU Leuven (BE). I am active in the fields of software
security, and formal verification and validation of software systems, specifically for embedded systems and low-level operating system
components. I am particularly interested in security architectures for safety-critical embedded systems and for the Internet of Things.
Formal methods promise to systematise this search for needles in haystacks and use mathematical rigour to provide convincing arguments for the absence of such needles. Yet, with few exceptions in safety-critical systems engineering, the adoption of formal techniques in software development processes is low. Furthermore, formal methods traditionally focus on safety aspects of software, i.e., functional correctness and the absence of runtime exceptions of software. In this talk I will outline the advantages and disadvantages of modern approaches to formal software analysis and verification. I will focus on tools and techniques that can be integrated efficiently with testing efforts, in particular in security testing.
Jan Tobias Muehlberg work as a researcher at imec-DistriNet, KU Leuven (BE). I am active in the fields of software
security, and formal verification and validation of software systems, specifically for embedded systems and low-level operating system
components. I am particularly interested in security architectures for safety-critical embedded systems and for the Internet of Things.
มุมมอง: 3 688
วีดีโอ
AuthN/Z for REST service - Johan Peeters
มุมมอง 8117 ปีที่แล้ว
REST services are very popular. Unfortunately, many are not secure. In this session, we identify access control requirements for a range of application types and discuss how these can be delivered with current standards and tools. The presentation is interactive; we discuss the trade-offs when implementing typical requirements. OpenID Providers authenticate end users and issue a security token ...
Towards a Secure IoT Landscape - Danny De Cock
มุมมอง 2477 ปีที่แล้ว
The Internet of Things (IOT) allows one to check and control devices and sensors fully automatically and remotely. All sorts of equipment including cameras, physical health monitors, domotics, alarms and access control systems can report events and the receiver of these notifications can take action when necessary. These devices and sensors can be used everywhere. Not only in the house, in hosp...
The Rise and Fall of Client-Side Web Security Technologies - Philippe De Ryck
มุมมอง 6657 ปีที่แล้ว
The web used to be sever-centric, and the browser was merely a rendering engine to display information. Today, the introduction of numerous new technologies has made the web client-centric. A similar evolution can be seen in web security technologies. In recent years, numerous new security technologies can be configured by the server and are enforced by the browser. In this session, we investig...
Blockchain: Distributed Trust - Bart Preneel
มุมมอง 3K7 ปีที่แล้ว
The Bitcoin ecosystem had a bumpy start, but driven in part by the demand created by the Silk Road and perhaps the Cyprus crisis, the impact grew quickly: the total value of bitcoins rose to several billion US$ in the first two years (currently it is around US$ 14 billion), hundreds of alternative cryptocurrencies (altcoins) were created and large mining entities were established, mostly in Chi...
New Security Control Enhancements Java 8 and 9 - Jim Manico
มุมมอง 4457 ปีที่แล้ว
Secure software requires making a wide variety of security controls available to the developer. These controls range from automatic defenses to APIs that developers simply need to use, to controls that require extensive configuration and understanding to be used effectively. This session reviews several new security controls available in the Java 8 and 9 platforms. It also covers other importan...
OAuth 2.0 Security Introduction - Jim Manico
มุมมอง 4.5K7 ปีที่แล้ว
OAuth is a delegation framework that appears on the radar of security professionals and developers more and more every day. OAuth intersects with authentication and access control, yet you would not likely use OAuth in and of itself for authentication, session management or an access control in your applications. Even more confusing, OAuth is not a standard and various service providers will li...
Data Mining for Security - Konrad Rieck
มุมมอง 2.3K7 ปีที่แล้ว
Many tasks in computer security revolve around the manual analysis of data, such as the inspection of log files or network traffic. Data mining and machine learning can help to accelerate these tasks and provides versatile tools for detecting and analyzing security data. The sesions deals with the combination of machine learning and computer security. After a short introduction to the basics of...
Addressing Privacy in Cloud Service Development - Seda Gürses
มุมมอง 2677 ปีที่แล้ว
Three major shifts have transformed the practice of software engineering over the last two decades. In short, these are the shifts from waterfall to agile development, from shrink-wrap software to services, and from the PC to the cloud. I will refer to this transformation as the 'agile turn’. After going over the different tenets of the agile turn based on interviews with developers in the US, ...
Building Secure Angular Application - Philippe De Ryck
มุมมอง 1.7K7 ปีที่แล้ว
Angular is one of the most popular frameworks, and there is a huge amount of information available on building applications, improving performance, and various other topics. But do you know how to make your Angular applications secure? What kind of security features does Angular offer you, and which additional steps can you take to really boost the security of your applications? In this talk, y...
A day in the life of a malware analyst - Didier Stevens
มุมมอง 14K7 ปีที่แล้ว
Join Didier Stevens (NVISO) in a typical day of a malware analyst. Following the malware response cycle, the analyst is first informed that (potential) malware is detected. Then a decision must be taken to analyze the malware or not. After analyzing the malware, appropriate actions are taken. This session requires no pre-requisite knowledge about malware or anti-virus. Didier will explain the d...
Privacy Research Paradigms - Seda Gürses
มุมมอง 5897 ปีที่แล้ว
The number of privacy debacles of the last years in social networks, web tracking, NSA/GCHQ surveillance, and mass scale breaches have been adding up. Contrary to claims that “privacy is dead”, the popularity of court cases with national and international implications, like Apple vs. FBI, are indicators that people around the world do care about their privacy, and the ambition to design and mai...
The Web's Security Model in 2017 - Philippe De Ryck
มุมมอง 1.4K7 ปีที่แล้ว
While the web has undergone a dramatic transformation since the first static HTML documents, the underlying security model has been largely unchanged. However, due to the vastly expanded client-side capabilities in modern web applications, the security model is now more important than ever. Understanding this security model is key to building secure web applications. In this session we explore ...
Practical Android Security - Dario Incalza
มุมมอง 7177 ปีที่แล้ว
In this session we will cover different attack techniques on Android applications followed by common best practices to protect against these attacks. We start with an introduction to the Android platform stack, Android application and attack surfaces. We introduce several reverse engineering concepts and how they apply to Android applications. We look into how bad cryptography implementations i...
Secure Development Lifecycles (SDLC): Introduction and Process Models - Bart De Win
มุมมอง 7K7 ปีที่แล้ว
It takes much more than a good developer to build secure software within an organisation. Indeed, building secure software is about ensuring that security is taken into consideration during the entire software lifecycle. It is about ensuring that security best practices are being employed efficiently, and that uncovered risks are appropriately dealt with in due time. In this session, an overvie...
The OWASP Top Ten Proactive Controls - Jim Manico
มุมมอง 11K7 ปีที่แล้ว
The OWASP Top Ten Proactive Controls - Jim Manico
Efficient Tamper-Evident Data Structures for Untrusted Servers - Dan Wallach
มุมมอง 4427 ปีที่แล้ว
Efficient Tamper-Evident Data Structures for Untrusted Servers - Dan Wallach
Recent Advances in System Software Security - Frank Piessens
มุมมอง 5707 ปีที่แล้ว
Recent Advances in System Software Security - Frank Piessens
SSL/TLS Deployment Best Practices - Ivan Ristić
มุมมอง 2.4K7 ปีที่แล้ว
SSL/TLS Deployment Best Practices - Ivan Ristić
Tales of a Bug Bounty Hunter - Arne Swinnen
มุมมอง 3.5K7 ปีที่แล้ว
Tales of a Bug Bounty Hunter - Arne Swinnen
Cryptography in a post-Snowden era - Bart Preneel
มุมมอง 1.3K8 ปีที่แล้ว
Cryptography in a post-Snowden era - Bart Preneel
Authorization with OAuth 2.0 - Stijn Van den Enden & Jan Van den Bergh
มุมมอง 2528 ปีที่แล้ว
Authorization with OAuth 2.0 - Stijn Van den Enden & Jan Van den Bergh
Cryptographic and Information Security in the Post-Snowden Era - Bart Preneel
มุมมอง 7408 ปีที่แล้ว
Cryptographic and Information Security in the Post-Snowden Era - Bart Preneel
Using SLL/TLS: a hands-on session - Thomas Herlea
มุมมอง 4939 ปีที่แล้ว
Using SLL/TLS: a hands-on session - Thomas Herlea
Why code reviews and pen-tests are not enough - Jim DelGrosso
มุมมอง 5929 ปีที่แล้ว
Why code reviews and pen-tests are not enough - Jim DelGrosso
‘Security landscape’ is an overused, vague and cliche phrase.
Philip Friday Ede said that integrity matters security app secure
this is really awesome, I'd love to see a complete example. But this is already very good
Not writing down his email in a non-scrapable document, that's security.
Really wish after watching 1.5 hrs of this video that the computer screen or slides could’ve been shared for the last 20 minutes.
Why did he say that he was able to break sha2 in a minute with hashcat? I call mega BS
Thank you so much for this informative talk!
amazing history
amazing history
“Bitcoin will die” This aged well
WOW, JS security discussed here is almost 8 years old, but still relevant.
my man fighting for his life lol. great talk though
39:30 FYI - a notary public in U.S. does a very different job from a European notary public.
The awful meter intralysosomally harass because attraction curiosly battle minus a muddled eggnog. dear, smooth flag
Fantastic talk, Jan! Thank you for drawing such clear connections between testing and formal verification.
Thank you for your logical presentation and topic Focused to introduction level yet allows a much wider overview and.even wider awareness of important topics all related to real world problems . That affects all users and needs of business as well as home and student use of computers and devices . Without understanding the constantly aimed weapon at all users .No true effort could be made to support any new viral type infections . Your diagram of quarterly new infections of over 2 million new infections that were seen in only 6 months . With thousands of potential infections from each of these . Are more than a threat to everyday users . And needs for insurance and users classes certification to bring affordable insurance and devices verification education and certifications . That can start at a time before a computer users are allowed to use the web . This is such a problem that we as a society must not continue to discard as unattainable . A virtual computer system with a quantum encryption processing blending may be a first step . But international born infections into clouds now may be a greater false security in the near future . What can you predict and how would one currently set up a best use personal and business computer analysis team . That could be developed into local areas to augment computer repair and modification service with a strong computer static and dynamic analysis and threat evaluation .While enhancing public process of education and awareness and increasing the interest into the much needed field of computer security . And smart road map of those elderly or disabled children or children to a smart not overwhelmingly and heavy mind crushing multi path directions in such fast changing technology . That soon be a cloud based security enhanced operation . That still requires security on a personal based foundation. . I look forward to your future videos . And feel a hands on practical teaching of your topics will be a great tool to help to overcome the high jump to language learning . Rather than practical lab with learning to understand such topics as you describe . An application of learning the art of Analysis can be fun as well as educational when it has a road map to a OSI type format . But that is just a wild thought from a beginner. Thank you from Denver. Colorado , for your style of teaching .
Thank you this is very fun
This whole presentation is gold.
03:26 Attack payloads 04:49 3 variants of XSS 05:04 reflected 04:54 Stored 04:57 DOM XSS 05:04 Reflected XSS 05:28 Stored XSS ===================================== Input Validation (raw HTML input) ===================================== 06:33 Danger: XSS Weak Defense Used 06:55 how do you stop this 07:40 Eliminate, >, <, &, ", ', filter shorturl.at/yHU49 shorturl.at/qHQVX 08:30 irish, O'Shea , O'malley I can put my name on it, what's wrong with you ===================================== Output Encoding (Strings) ===================================== 09:09 input validation, we want to focus output encoding, output encoding that's gonna save us 10:00 Go 10:30 <, the browser thinks it's code , we have to escape it and convert to a form that's isnt executing < HTML entities, that would display but not execute it like code, use librairies ===================================== 11:41 Danger: Multiple context ===================================== 13:03 the best place to defeat XSS, JavaScript injection is in the user interface itself 14:00 HTML Body escaping , performance 16:03 HTML Attribute Ecaping examples 17:05 URL fragments, URL parameters escaping examples 18:10 Handling Untrusted URL's. Twitter 20:28 Wordpress 25:04 Advanced XSS Defence ===================================== ~26:00 HTML Sanitazation and XSS ===================================== ~ tinyMCE 31:17 few librairies, nodejs ===================================== 35:28 DOM XSS ===================================== Dangerous Javascript Sinks, eval ist just evil, 37:30 jQuery, JSON ===================================== 41:30 Sandboxing ===================================== ~ 44:00 don't put advertisement in your site 45:31 X-Xss-Protection, XSS A ===================================== Content Security Policy (CSP) ===================================== 49:54 CSP, 3rd group of UI defense 50:14 frameworks, angular. HTML sanitization 53:15 how to make our user interface super robust 53:49 Content Security Policy is probably the most important security that reduces the attack surface of your web application 54:23 We can move inline scripts 55:30 when did you apply CSP 56:04 these are response headers 57:02 default-src 'self' 58:21 twitter policy 58:25 Seriously, what is CSP 58:54 How, disable inline, eval 59:41 what is inline JavaScript shorturl.at/avLMZ 01:00:54 how does the browser know 01:01:32 CSP features
Buen video, me costo entender un poco pero si entendí algo jajaja
He talks about key algorithms in the beginning and then advice to use RSA because that is widely supported. Then, he says not to use RSA when talking about key exchange. Can some one shed some light?
as he said: wit RSA keyexchange, the keyexchange has a direct bond to the server's private key. Once you change the RSA key, the bond changes in exactly one way. it is simple, therefor was easy to implement with no further hassle. It is static and has no additional subset of identification or variation for how the keyexchange is actually performed - means there is not enough of additional random in a "second dimension" as it is the case with PFS keyexchanges like the EC keyechange provides. They use mathematical functions which do not relate at all to the actual keys, but their primes are choosen from within a whole (very big) range, resulting in a much larger number of possible keyexchanges. So, every keyexchange performed by EC is different, even if the server key stays one and the same. RSA-based encrypted traffic is still being (ab-)used to be "passively decrypted".(allows deep traffic inspection by middleboxes - it only requires the current server key of course to do so and can decrypt all traffic from and to the particular server). Which is not possible anymore when a connection uses strong EC keyexchange over a mathematical function (e.g. x25519) AND AEAD ciphers (such as AES256) . So, you can not revert the results in any way for extracting or relating to a specific key being used. For a wanna-be-middlebox in such case, solely owning the server key is no longer enough here. It also would require to know about all the random going on in the server when doing the EC keyexchange for every single connection. which is - simply spoken - impractical.
RSA is good to use because of how prolific it is. However it’s not the best idea for key exchange because it doesn’t support forward secrecy by default. Ecdhe supports forward secrecy by default but it’s more difficult to implement in larger enterprises. So the answer- it depends.
20:47 Jim says that the client secret is in the URL, that's just incorrect, isn't it?
Thank you for your valuable informations.
At 45:49 Jim recommends collecting pwned credentials from previous data breaches. Wouldn't an organizations run into compliance violations if they keep collecting and updating such breached data? Just a doubt I always had, as we too had this idea.
hello nate howes class
Hello! I think you beat a lot of us by a day
Material actually starts at 3:30
thank you
Excellent explanation.
Excellent. High engagement level! Also handouts.secappdev.org/handouts/2017/Jim%20Manico/04a.%20OAUTH%20Security%20Introduction%20MODULE%202-9-2017.pdf
Is there a link to the talk by Yo (sp?) about OIDC that was referenced around the 10 minute mark?
th-cam.com/video/PrCxuXOdDQc/w-d-xo.html and handouts.secappdev.org/handouts/2017/Johan%20Peeters/authNZ_REST.pdf
There is no absolute right or wrong, you can do a wrong thing right and you can do a right thing wrong.
I am big fan of Agile. But it can get very wrong if you don't do it right. When the boeing 737 accidents happened, first thing I checked was that they were doing Agile.
Software development evolves as a spiral curve. Started simple, gets complex, gets split into microservices...
Well, I still got 500 bills, hopefully they don’t disappear 😊
On slide 5, 10:39, I calculated the number of keys for symmetric is n*(n-1)/2, not n^2, and for asymmetric is n*2.
I like this guy
This guy is quite amazing
45:31 - Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions, Antoine Joux
How to restrict JavaScript code access from browser console??
can you give me some info about secure transport protocols and application protocols
Excellent talk!
excellent..easy to understand
Amazing speech.
He sounds really mad
Good stuff.
Learnt more in the last 90 minutes than reading over an year about the topic. One request though is to get to see the speakers, whiteboard and also to listen to the audiences questions just like the other videos.
While Mr. Preneel's content is always top-notch, the sound quality of this video is poor. Keep the content rolling, as it's rare to hear such in-depth expertise.
FYI at 59:00 it looks like the slides get out of sync with the presentation and don't catch up until 1:03:04
good video sir
Very good presentation, a good addition to his PHD thesis!