Montreal is known for its daring and creative attitude, which routinely leads to fantastic innovations. Its artistic scene, multicultural character, and excellent universities make the biggest cities in the world envious – and are so evident that Facebook and Google have established centres in Montreal. And there is a rich pool of talent: École de… Lire la suite Meet OWASP Montreal
My WordPress Site Has Been Hacked
The statistics for my WordPress photo blog show over 51,000 visits. The blog presents part of my unconventional journey through a collection of pictures of my work during two years of sabbatical. It includes images relating to the Printemps Érable in 2012, the election of Pauline Marois as the first female Prime Minister of Quebec,… Lire la suite My WordPress Site Has Been Hacked
TOM
A tool for manual secure code reviews. Created @ GoSecure. Special thanks to Erwann Traourouder.
User Behavior Analytics: Leveraging Hadoop and MapReduce to Detect Security Threats during a Web Session
Abstract. A web session is associated with a user in order to keep track of who the user is and what privileges he/she has in a given application [1]. This association is created after the authentication mechanism and, in the vast majority of today’s applications, usernames and passwords are used. The session exists until… Lire la suite User Behavior Analytics: Leveraging Hadoop and MapReduce to Detect Security Threats during a Web Session
By the Book
I am writing a book about the letters A and Z; with definitions and measures. If you have any thoughts on the following topic: "What does it take to start a project and actually finish it", please share it with me at info@annegauthier.ca. More details coming soon.
Attack Vectors Finder Project: A White Box Approach
Abstract. The Attack Vectors Finder project provides a methodology to assess the security posture of an application using a hybrid security testing approach. To facilitate the white box part of the assessment, a prototype of a web-based tool has been created that includes a questionnaire whose information provides a comprehensive view of the attack surface,… Lire la suite Attack Vectors Finder Project: A White Box Approach
Differential Cryptanalysis on Data Encryption Standard
Introduction People are using cryptography to secure their communication by preventing an adversary from having access to their secret messages. There are several known algorithms that can be used to encrypt plaintext. The objective is that only one who have the secret key must be able to decrypt the ciphertext and read the actual private… Lire la suite Differential Cryptanalysis on Data Encryption Standard
