Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a novel approach to black-box approximate taint tracking in this AppSecUSA 2017 conference talk. Learn about utilizing data partitioning to observe user inputs and system outputs, allowing for the detection of potential security vulnerabilities without requiring extensive code modifications. Discover how this method addresses the challenges of ensuring user input safety, overcoming performance impacts, and enabling cost-effective implementation of taint tracking in existing systems. Gain insights into runtime attack monitoring and protection for web applications, covering OWASP Top 10 and beyond. Delve into topics such as runtime AppSec technologies, RASP, the dangers of user input, escape techniques, and the history of taint tracking. Understand the concept of approximate taint tracking, its benefits, and practical applications in modern web security.
Syllabus
Intro
Runtime AppSec Technologies
What is RASP?
The Dangers of User Input
Escape
History of Taint Tracking
How would you do it?
Approximations
Hooking the app server
Window Size Tuning
Questions
Taint Tracking Tools
Data Partitioning
Sliding window
Taught by
OWASP Foundation