Security Mar 6, 2020

Using ML models to detect and stop authorization bypass vulnerabilities | Juan Berner | NULLCON

Talk: Rage against the IDOR’s: Using Machine Learning models to detect and stop authorization bypass vulnerabilities Presentation from the talk: https://bit.ly/JuanBernerPresentation

Abstract: One of the most common vulnerabilities that can be found in web applications is authorization bypass vulnerabilities. These vulnerabilities exploit a lack of authorization controls or bugs in them which would allow unauthorized parties to access user’s data. While many solutions attempt to detect when a possible attack might be happening, alert fatigue can affect teams trying to detect these types of attacks allowing real attacks to go unnoticed. This talk will focus on how we can leverage open-source machine learning tools and techniques to detect when those attempts are successful and blocking them before the user’s data can be compromised.

About Juan Berner: Juan Berner is a security researcher with over 9 years of experience in the field, currently working as Security Lead Developer at Booking.com, as SME for Application Security and Architect for security solutions.

He has given talks in the past on how to build an open-source SIEM, exploiting A/B Testing frameworks (Exploiting A/B Testing for Fun and Profit) or building open source WAF architectures that do not incur on latency or false positives.


#Nullcon2020 #MachineLearning #Security

Follow nullcon on Facebook: https://www.facebook.com/nullcon Twitter: https://twitter.com/nullcon LinkedIn: https://www.linkedin.com/company/null… Website: https://nullcon.net