Главная
Study mode:
on
1
Intro
2
Runtime AppSec Technologies
3
What is RASP?
4
The Dangers of User Input
5
Escape
6
History of Taint Tracking
7
How would you do it?
8
Approximations
9
Hooking the app server
10
Window Size Tuning
11
Questions
12
Taint Tracking Tools
13
Data Partitioning
14
Sliding window
Description:
Explore a novel approach to black-box approximate taint tracking in this AppSecUSA 2017 conference talk. Learn about utilizing data partitioning to observe user inputs and system outputs, allowing for the detection of potential security vulnerabilities without requiring extensive code modifications. Discover how this method addresses the challenges of ensuring user input safety, overcoming performance impacts, and enabling cost-effective implementation of taint tracking in existing systems. Gain insights into runtime attack monitoring and protection for web applications, covering OWASP Top 10 and beyond. Delve into topics such as runtime AppSec technologies, RASP, the dangers of user input, escape techniques, and the history of taint tracking. Understand the concept of approximate taint tracking, its benefits, and practical applications in modern web security.

Black-Box Approximate Taint Tracking by Utilizing Data Partitioning

OWASP Foundation
Add to list
0:00 / 0:00