Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Black-Box Approximate Taint Tracking by Utilizing Data Partitioning

OWASP Foundation via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a novel approach to black-box approximate taint tracking in this AppSecUSA 2017 conference talk. Learn about utilizing data partitioning to observe user inputs and system outputs, allowing for the detection of potential security vulnerabilities without requiring extensive code modifications. Discover how this method addresses the challenges of ensuring user input safety, overcoming performance impacts, and enabling cost-effective implementation of taint tracking in existing systems. Gain insights into runtime attack monitoring and protection for web applications, covering OWASP Top 10 and beyond. Delve into topics such as runtime AppSec technologies, RASP, the dangers of user input, escape techniques, and the history of taint tracking. Understand the concept of approximate taint tracking, its benefits, and practical applications in modern web security.

Syllabus

Intro
Runtime AppSec Technologies
What is RASP?
The Dangers of User Input
Escape
History of Taint Tracking
How would you do it?
Approximations
Hooking the app server
Window Size Tuning
Questions
Taint Tracking Tools
Data Partitioning
Sliding window

Taught by

OWASP Foundation

Reviews

Start your review of Black-Box Approximate Taint Tracking by Utilizing Data Partitioning

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.