European Roadmap for Research on Web Security

The Web platform is a hotbed of innovation that will affect deployment of technologies and applications for the next decade, and will influence the security and privacy that European users and service providers can achieve. The STREWS project will link European security and trust related research and development with ongoing standards and development work for the Web in IETF and W3C.

The project will develop a technical state of practice document for Web Security as a basis for case studies on selected Web security topics. A roadmap for future research and standardization in the Web security field will provide guidance for ongoing and future research. Over the course of the project, STREWS will reach out to European industry and projects, and organize a series of workshops to collect broad input into its roadmapping and case study work, and to create a European Web security community across academia and practice

Feeds from partners

From IAB: RFC 7397: Report from the Smart Object Security Workshop

15 December 2014, 5:56 pm

The IAB has published RFC 7397: Report from the Smart Object Security Workshop. Abstract: This document provides a summary of a workshop on ‘Smart Object Security’ that took place in Paris on March 23, 2012.  The main goal of the workshop was to allow participants to share their thoughts about the ability to utilize existing […]

>> Read more...

From STREWS: Reports available from the W3C Workshop on Privacy and User–Centric Controls

11 December 2014, 12:56 pm

The minutes from the W3C Workshop on Privacy and User–Centric Controls were published at the end of November. This workshop was organised by W3C, with support from STREWS. The organisation was led by Rigo Wenning. The workshop was held November 20–21 in Berlin. The workshop attracted a good mix of implementers, content providers and...

>> Read more...

From STREWS: Publications 2014

9 December 2014, 2:49 pm

Publications Large-scale Security Analysis of the Web: Challenges and Findings, Tom van Goethem, Ping Chen, Nick Nikiforakis, Lieven Desmet, Wouter Joosen, TRUST 2014, Berlin Heidelberg, Germany, http://link.springer.com/chapter/10.1007%2F978-3-319-08593-7_8 Stateful declassification policies for event-driven programs, CSF 2014Mathy Vanhoef,...

>> Read more...

From STREWS: Some non-STREWS publications

4 December 2014, 11:59 pm

A few recent publications, which are not (co-)written by STREWS, but may be of interest to the STREWS community. Study on cryptographic protocols – by ENISA ENISA (the EU agency for network and information security) published a report on cryptographic protocols. The protocols studied are lower-level protocols, such as TLS, SSH, UMTS and...

>> Read more...

From STREWS: D1.2 Case Study: Security Assessment of WebRTC

5 November 2014, 9:33 pm

STREWS published its first Security Case Study on WebRTC:    Case study 1 Report: WebRTC [PDF] Erratum (until updated publication): In Section 3.2 the WebRTC report notes that: But unlike in Chrome, all permissions are only for the duration of the session, that is, until the browser closes. There is no way to revoke a permission, except by...

>> Read more...

From STREWS: Rigo Wenning at the W3C Workshop on Privacy and User–Centric Controls

15 October 2014, 2:39 pm

The W3C Workshop on Privacy and User–Centric Controls aims to study strategies for protecting people's private data on mobile devices. It brings together researchers and software developers, but also network operators and legislators. Protecting data can take many forms: better user interfaces to make it clear to people what their data is used...

>> Read more...

From OWASP: OWASP August 19 Connector

19 August 2014, 10:32 pm

August 19, 2014 | | www.owasp.org | Contact Us | Brought to you by the OWASP Foundation Featured OWASP ProjectOWASP Web Spa Project The OWASP WebSpa Project is a Java web knocking tool for sending a single HTTP/S request to your web server in order to authorize the execution of a premeditated Operating System (O/S)...

>> Read more...

From OWASP: OWASP ASVS 2.0 (Application Security Verification Standard)

18 August 2014, 10:32 pm

(From Daniel Cuthbert) OWASP Community, It gives me immense pleasure to finally release version 2 of the OWASP Application Security Verification Standard for all to enjoy. The community feedback on this has been overwhelming and it's great to see so many of you investing time and effort into what Sahba and I feel is an incredibly...

>> Read more...

From OWASP:

15 August 2014, 5:57 pm

OWASP AppSec USA 2014 Adds Leading Global Experts to List of Speakers Are you registered for the upcoming OWASP conference? We are excited to be getting closer to the OWASP AppSec USA event and we have now announced our roster of keynote speakers.  The premier software security conference for developers, auditors, risk managers,...

>> Read more...

From OWASP: Call for Speakers: OWASP Ghana Cybersecurity Conference

13 August 2014, 7:40 pm

Maa chi, maa ha, maa jo, OWASP Community, eti sen? The OWASP Ghana Cybersecurity Conference will take place in Accra, Ghana this December for the second year in a row! The event dates are December 10 - 11, 2014. It amazes me that there are so many places on planet earth where OWASP is active in some way. If you are interested in speaking at this...

>> Read more...

From OWASP: THIS FRIDAY is the DEADLINE to SUBMIT your CANDIDACY for the 2014 OWASP BOARD OF DIRECTORS

13 August 2014, 5:02 pm

Just a reminder that this FRIDAY, AUGUST 15 is the DEADLINE to submit your candidacy for the 2014 OWASP Global Board Of Directors.  For Information including eligibility requirements, primary responsibilities, election timeline and other important information, please visit our election...

>> Read more...

From Nessos: QASA 2014 - Program Available

24 June 2014, 9:44 am

3rd International Workshop on Quantitative Aspects in Security Assurance Affiliated workshop with ESORICS 2014 Wroclaw, Poland, September 11, 2014 www.iit.cnr.it/qasa2014 *** Invited Speakers: Elisa Bertino and  Audun Josang *** *Overview* There is an increasing demand for techniques to deal with quantitative aspects of...

>> Read more...

From Nessos: The 14th edition of the summer school on Foundations of Security Analysis and Design (FOSAD)

21 May 2014, 4:46 pm

14  Edition of the summer school on Foundations of Security Analysis and Design (FOSAD 2014)http://www.sti.uniurb.it/events/fosad14/ The 14th edition of the summer school on Foundations of Security Analysis and Design will be held in in the fascinating Rock of Bertinoro, Italy. This year edition is co-sponsored by NESSoS and...

>> Read more...

From Nessos: The Final version of the NESSoS research roadmap is available

2 February 2014, 9:45 pm

The final version of the NESSoS research roadmap is available at the URL:  http://www.nessos-project.eu/media/deliverables/y3/NESSoS-D4.3-PartII-Roadmap.pdf

>> Read more...

From Nessos: Project description

12 November 2010, 1:39 pm

The Network of Excellence on Engineering Secure Future Internet Software Services and Systems (NESSoS) aims at constituting and integrating a long lasting research community on engineering secure software-based services and systems.

>> Read more...

From Recent RFCs: RFC 7397: Report from the Smart Object Security Workshop

This document provides a summary of a workshop on 'Smart Object Security' that took place in Paris on March 23, 2012. The main goal of the workshop was to allow participants to share their thoughts about the ability to utilize existing and widely deployed security mechanisms for smart objects. This report summarizes the discussions and lists...

>> Read more...