13.07.2015 Views

Conference Program - OWASP AppSec USA 2011

Conference Program - OWASP AppSec USA 2011

Conference Program - OWASP AppSec USA 2011

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Application Security Debt & Application Interest RatesChris WysopalArchitects and developers are well aware of the term technicaldebt but many in the security community have never heardof this concept. Ward Cunningham, a programmer who developedthe first wiki program, describes it like this:“Shipping first time code is like going into debt. A little debtspeeds development so long as it is paid back promptly witha rewrite… The danger occurs when the debt is not repaid.Every minute spent on not-quite-right code counts as intereston that debt. Entire engineering organizations can be broughtto a stand-still under the debt load of an unconsolidatedimplementation, object-oriented or otherwise.”The cost of technical debt is the time and money it will taketo rewrite the poor code after you ship and bring it back tothe quality required to maintain the software over the longhaul. Using debt in the financial world costs more absolutedollars than not using debt but it allows financial flexibility todo things you couldn’t do without using debt. It’s this flexibilitythat makes debt a valuable business tool. Technical debtallows development teams to meet a ship deadline or get aparticular feature out to customers quickly which ultimatelyserves the business.Application Security Debt:We can think of all the latent vulnerabilities in a piece ofsoftware as its application security debt. Security debt accumulatesover time as more code is written without performingsecurity processes during the development life cycle. A projecttakes on a lot of debt during the design phase if there is nothreat modeling or architecture risk analysis performed. Thiswill translate into costly redesign work at a later date. If codeis written without using static analysis or following securecoding guidelines then security bugs are going to get into thefinal application that will eventually need to be eliminated at ahigher cost. The more code that is written this way the moresecurity debt accumulates.<strong>AppSec</strong> Inception - Exploiting Software CultureJeff WilliamsNo matter how fast you are at playing vulnerability whack-amole,eventually the moles always win. If you truly want toget in front of application security, you have to start looking atchanging your software development culture. In this talk, Jeffwill share experiences with multiple approaches to changingsecurity culture, going back to the late-80’s. Not surprisingly,few of these approaches have made any difference. <strong>OWASP</strong>represents a new approach, and is an interesting experiment7in how we change software culture worldwide. Jeff will extractand clarify the lessons from <strong>OWASP</strong> that you can use in yourown organization to bootstrap a software culture that generatessecurity.Behavioral Security Modeling: Eliminating Vulnerabilitiesby Building Predictable SystemsJohn BenninghoffIn addressing the human behavioral aspects of InformationSecurity, we’ve largely failed as a profession. Historically,we’ve tried to force people to adapt to the technology webuilt, and then blame the user when they fail to use it properly– the talking point is, “people are stupid, and you can’tfix stupid,” or “People should know better,” as discussed in arecent SANS ISC Diary posting on CVE-0. (http://isc.sans.org/diary.html?storyid=10933) Security Awareness training, one ofthe few tools we have to address people problems, has beenand continues to be poorly executed. At best, Awarenessexplains security rules well enough so that we can fire peoplewhen they break them, and at worst is a series of postersasking people to “do good things,” or tries to make themsecurity experts, with no evidence that it is even effective.Although we have started to improve, our understanding ofhuman/computer interaction (in the security context) is poor,and we do little, if any, to understand the motivation and behaviorof both external attackers as well as internal personnel.Behavioral Information Security, (BIS) A formal methodologyto manage information risk, derived from knowledgeof how humans behave and interact with information, is anew philosophy of information security that places peoplein the center of the model, and can be used to design andimplement security architectures and controls based on ourunderstanding of people. Borrowing from other professions,BIS seeks to develop practical tools for security practitioners,with the ultimate goal of reducing the cost and improving theeffectiveness of information security. This talk will introduceBehavioral Information Security, and Behavioral Security Modeling;a tool developed using BIS principles.Blackbox Android: Breaking “Enterprise Class” Applicationsand Secure ContainersMarc Blanchou, Justine Osborne, Mathew SolnikThe Android platform is growing in popularity and is quicklybeing adopted in the enterprise environment. In order tofacilitate this adoption, security solutions have been developed,such as “secure containers” which claim to provideenterprise grade security for Android devices. There is anincreasing need to be able to assess the security claims ofsuch “Enterprise Class” Android software vendors. Yet there

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!