Automatic Detection of Inadequate Authorization Checks in Web Applications
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Explore a novel technique for automatically detecting missing and inconsistent authorization checks in web applications through static analysis. Learn about the challenges of implementing proper access control policies and the impact of gaps in enforcement. Discover different methods for specifying access control requirements in web applications, including configuration- and annotation-based approaches. Gain insights into the speaker's approach for static detection of missing checks and remediation suggestions. Examine empirical results from applying this technique to real-world applications, understanding common authorization mistakes made by developers. Delve into the importance of robust access control in modern software systems and the potential consequences of privilege escalation vulnerabilities.
Syllabus
Introduction
Title
About Divya
Outline of the talk
Difference between code level bugs and design flow
What is a design flaw
What is a code flaw
Web application example
Static analysis
Design review
Design flaws
Current approaches
Threestep approach
Creating the specification
Examples
Apache Shido
Work Specification
Suggest Remediation
Summary
Realworld examples
The most critical level
Next steps
Taught by
OWASP Foundation
Related Courses
Secure Software Development: Verification and More Specialized TopicsLinux Foundation via edX Developing Secure Software
LinkedIn Learning Ethical Hacking: Mobile Devices and Platforms
LinkedIn Learning Tüm Aşamalarıyla İnşaat Eğitimi - AUTOCAD/STA4/EXCEL/PROJECT
Udemy Mobile Security: Reverse Engineer Android Apps From Scratch
Udemy