From the Archive: Application security from the inside [Presentation at OWASP]

Today we are sharing a presentation that our CTO Jean-Baptiste Aviat did at the OWASP (Open Web Application Security Project) a couple of months ago.

Hackers have several ways to access sensitive information and modify them. From CPU registers, addressable memory of the whole process, threads etc. nothing is safe from returning modified values.

The presentation explains how runtime security is the best place to protect an app from attacks. It shows examples of:

  1. SQL Injection
  2. Cross Site Scripting (XSS)
  3. Third party components vulnerabilities
  4. Shell injection

and how runtime security can protect your app from these threats.

Notify of
Inline Feedbacks
View all comments