Black-Box Approximate Taint Tracking by Utilizing Data Partitioning
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Explore a novel approach to black-box approximate taint tracking in this AppSecUSA 2017 conference talk. Learn about utilizing data partitioning to observe user inputs and system outputs, allowing for the detection of potential security vulnerabilities without requiring extensive code modifications. Discover how this method addresses the challenges of ensuring user input safety, overcoming performance impacts, and enabling cost-effective implementation of taint tracking in existing systems. Gain insights into runtime attack monitoring and protection for web applications, covering OWASP Top 10 and beyond. Delve into topics such as runtime AppSec technologies, RASP, the dangers of user input, escape techniques, and the history of taint tracking. Understand the concept of approximate taint tracking, its benefits, and practical applications in modern web security.
Syllabus
Intro
Runtime AppSec Technologies
What is RASP?
The Dangers of User Input
Escape
History of Taint Tracking
How would you do it?
Approximations
Hooking the app server
Window Size Tuning
Questions
Taint Tracking Tools
Data Partitioning
Sliding window
Taught by
OWASP Foundation
Related Courses
Software TestingNPTEL via Swayam Introduction to Software Testing
University of Minnesota via Coursera Black-box and White-box Testing
University of Minnesota via Coursera Software Testing and Automation
University of Minnesota via Coursera Математика в тестировании дискретных систем
Tomsk State University via Coursera