YoVDO

Automatic Detection of Inadequate Authorization Checks in Web Applications

Offered By: OWASP Foundation via YouTube

Tags

Web Application Security Courses Access Control Courses Authorization Courses Privilege Escalation Courses Static Analysis Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a novel technique for automatically detecting missing and inconsistent authorization checks in web applications through static analysis. Learn about the challenges of implementing proper access control policies and the impact of gaps in enforcement. Discover different methods for specifying access control requirements in web applications, including configuration- and annotation-based approaches. Gain insights into the speaker's approach for static detection of missing checks and remediation suggestions. Examine empirical results from applying this technique to real-world applications, understanding common authorization mistakes made by developers. Delve into the importance of robust access control in modern software systems and the potential consequences of privilege escalation vulnerabilities.

Syllabus

Introduction
Title
About Divya
Outline of the talk
Difference between code level bugs and design flow
What is a design flaw
What is a code flaw
Web application example
Static analysis
Design review
Design flaws
Current approaches
Threestep approach
Creating the specification
Examples
Apache Shido
Work Specification
Suggest Remediation
Summary
Realworld examples
The most critical level
Next steps


Taught by

OWASP Foundation

Related Courses

Secure Software Development: Verification and More Specialized Topics
Linux Foundation via edX
Developing Secure Software
LinkedIn Learning
Ethical Hacking: Mobile Devices and Platforms
LinkedIn Learning
Tüm Aşamalarıyla İnşaat Eğitimi - AUTOCAD/STA4/EXCEL/PROJECT
Udemy
Mobile Security: Reverse Engineer Android Apps From Scratch
Udemy