This event has ended

November 2011 OWASP Bay Area Chapter Meeting

OWASP Bay Area

Wednesday, November 30, 2011 from 5:30 PM to 8:00 PM (PST)

Stanford, CA

Ticket Information

Type End Quantity
Entry for One Ended Free  

Share November 2011 OWASP Bay Area Chapter Meeting

Event Details

OWASP Bay Area Chapter Meeting - November 30, 2011

Stanford Campus, Alumni Center, Lane/Ladato rooms


Parking will be available on Galvez field right next to the center.


5:30pm - Welcome

5:40pm - Jason Chan, Practical Cloud Security

6:15pm - Luca Carettoni, From CVE-2010-0738 to the recent JBoss worm

6:50pm - David Fifield, Evading censorship with browser-based proxies 

7:25pm - Abraham Kang, DOM-based XSS and output encoding

You must RSVP prior to attending, we need to know how many people are coming to make sure we have the correct room sizing.


Jason Chan - Practical Cloud Security

Over the past several years, there has been much hand wringing and teeth gnashing related to public cloud security. Because of this, many organizations have limited or delayed their cloud usage.

Faced with business and market imperatives that demanded scale and elasticity that traditional data center architectures could not provide, Netflix jumped head first into the public cloud two years ago.  As we continue to mature our environment, we’ve also begun leveraging the benefits of the public cloud to enhance our security posture and capabilities.

This presentation will be a practical examination of Netflix’s approach to cloud security. Topics covered include:

•       Using public cloud automation and APIs to enhance security visibility

•       Netflix’s “Security Monkey” tool for cloud security monitoring and alerting

•       Inter-host reachability and connectivity analysis for firewall policy evaluation and optimization

•       Netflix’s model-driven architecture for securing and managingsystems and applications

•       Call to action: Cloud Security Gap Analysis and Next Steps

Luca Carettoni - From CVE-2010-0738 to the recent JBoss worm

Being a widely deployed enterprise application server, JBoss has always been a juicy target for attackers. Security vulnerabilities and misconfigurations in critical components, such as the infamous JMX-console, can be exploited in order to execute arbitrary code and harm the confidentiality, integrity and availability of the entire system. Our quick journey through JBoss insecurity will start from the analysis of a critical authentication bypass flaw to the recent JBoss worm which affected numerous installations worldwide. This presentation will also cover practical aspects on how to detect misconfigurations and secure your application server.  

David Fifield - Evading censorship with browser-based proxies

Proxy systems like Tor and VPNs can be used to get around Internet censorship and access blocked resources, but what happens when the circumvention system itself is blocked? A flash proxy is a miniature proxy that runs in a web browser, that can be activated just by viewing a web page. Web site visitors provide a large and constantly changing pool of proxy addresses that are difficult to block. Even though each proxy may last only seconds or minutes, it is possible to switch between them in a way that makes web browsing more or less seamless. We will share details of our flash proxy implementation and explain how to add a proxy to your web page.

Abraham Kang - DOM-based XSS and output encoding

An interactive presentation that intends to turn all of the listeners of the presentation into XSS experts and help them understand how to mitigate XSS properly using output encoding.

Have questions about November 2011 OWASP Bay Area Chapter Meeting? Contact OWASP Bay Area

When & Where

Stanford, CA 94305

Wednesday, November 30, 2011 from 5:30 PM to 8:00 PM (PST)

  Add to my calendar


OWASP Bay Area

Questions? Contact

  Contact the Organizer

Please log in or sign up

In order to purchase these tickets in installments, you'll need an Eventbrite account. Log in or sign up for a free account to continue.