Главная
Study mode:
on
1
Introduction
2
Title
3
About Divya
4
Outline of the talk
5
Difference between code level bugs and design flow
6
What is a design flaw
7
What is a code flaw
8
Web application example
9
Static analysis
10
Design review
11
Design flaws
12
Current approaches
13
Threestep approach
14
Creating the specification
15
Examples
16
Apache Shido
17
Work Specification
18
Suggest Remediation
19
Summary
20
Realworld examples
21
The most critical level
22
Next steps
Description:
Explore a novel technique for automatically detecting missing and inconsistent authorization checks in web applications through static analysis. Learn about the challenges of implementing proper access control policies and the impact of gaps in enforcement. Discover different methods for specifying access control requirements in web applications, including configuration- and annotation-based approaches. Gain insights into the speaker's approach for static detection of missing checks and remediation suggestions. Examine empirical results from applying this technique to real-world applications, understanding common authorization mistakes made by developers. Delve into the importance of robust access control in modern software systems and the potential consequences of privilege escalation vulnerabilities.

Automatic Detection of Inadequate Authorization Checks in Web Applications

OWASP Foundation
Add to list
0:00 / 0:00