Sched.com Conference Mobile Apps
AppSecUSA 2012
has ended
Create Your Own Event
Menu
Schedule
Speakers
Attendees
Search
Log in
Sign up
AppSecUSA 2012
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Attendees
Search
or browse by date + venue
Architecture
Attack
Case Studies
Cloud
Conference Event
Developer
Keynote
Mobile
Reverse Engineering
Rugged DevOps
Popular
Popular Events
#1
KEYNOTE: Securing JavaScript by Douglas Crockford
#2
KEYNOTE: Some Lessons from the Trenches by Michael Howard
#3
KEYNOTE: The State of OWASP
#4
Lunch and Speed Debates
#5
LASCON Style Happy Hour
#6
Lunch and WASPY Awards
#7
Closing Remarks and Prizes
#8
Why Web Security Is Fundamentally Broken
#9
Real World Cloud Application Security
#10
XSS & CSRF with HTML5 - Attack, Exploit and Defense
#11
Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews
#12
Top Ten Web Defenses
#13
Special Sneak Preview of the REBOOT Film
#14
Effective approaches to web application security
#15
Blended Threats and JavaScript: A Plan for Permanent Network Compromise
#16
Rebooting (secure) software development with continuous deployment
#17
Put your robots to work: security automation at Twitter
#18
Analyzing and Fixing Password Protection Schemes
#19
AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life
#20
Reverse Engineering “Secure” HTTP APIs With An SSL Proxy
#21
The 7 Qualities of Highly Secure Software
#22
DevOps Distilled: The DevOps Panel at AppSec USA
#23
The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems
#24
The Same-Origin Saga
#25
Hacking with WebSockets
#26
Gauntlt: Rugged by Example
#27
Four Axes of Evil
#28
Demystifying Security in the Cloud: AWS Scout
#29
Exploiting Internal Network Vulns via the Browser using BeEF Bind
#30
Building a Web Attacker Dashboard with ModSecurity and BeEF
#31
Cracking the Code of Mobile Application
#32
SQL Server Exploitation, Escalation, and Pilfering
#33
Hacking .NET Application: Reverse Engineering 101
#34
The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code & Server Side Memory Structure of ANY Application (OWASP ZAP extension)
#35
Get off your AMF and don’t REST on JSON
#36
Using Interactive Static Analysis for Early Detection of Software Vulnerabilities
#37
Counterintelligence Attack Theory
#38
Mobile Applications & Proxy Shenanigans
#39
How we tear into that little green man
#40
WTF - WAF Testing Framework
#41
Spin the bottle: Coupling technology and SE for one awesome hack
#42
Web Framework Vulnerabilities
#43
Bug Bounty Programs
#44
Security at Scale
#45
Iran's real life cyberwar
#46
NoSQL, no security?
#47
Payback on Web Attackers: Web Honeypots
#48
Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs
#49
I>S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST
#50
Cross Site Port Scanning
Popular by Type
All Types
Architecture
Attack
Case Studies
Cloud
Conference Event
Developer
Keynote
Mobile
Reverse Engineering
Rugged DevOps
Popular by Day
All days
Thursday, Oct 25
Friday, Oct 26
Recently Active Attendees
Steve Springett
Maty Siman
Dan Cornell
John Kent
Carl Sampson
PHIL PURVIANCE
Mano 'dash4rk' Paul
Ian Dickmann
More →