The Past, Present, and Future of Cross-Site/Cross-Origin Request Forgery
Conference (INTERMEDIATE level)
Room C
Cross-Site Request Forgery (CSRF) attacks have been around for more than a decade. The modern developer's toolbox contains various defenses against CSRF, including the recently introduced SameSite cookies. Unfortunately, modern defenses are often misunderstood or ineffective to cover new variations of CSRF attacks. One illustration is the rise of Cross-Origin Request Forgery attacks against API-based applications.
In this session, we explore the past, present, and future of Cross-Site and Cross-Origin Request Forgery attacks. We identify the attack pattern and the impact on the application. We explore how typical defenses mitigate the attacks, but also how their shortcomings often fail to stop all attack vectors. We also identify how API-based applications become vulnerable to CSRF attacks, along with best practice defenses for APIs. You will walk away from this session with a solid understanding of CSRF attacks, the necessary prerequisites to become vulnerable to such attacks, and best practice defenses to stop CSRF once and for all.
Philippe De Ryck
Pragmatic Web Security
Philippe De Ryck helps developers protect companies through better web security. His Ph.D. in web security from KU Leuven lies at the basis of his exceptional knowledge of the security landscape. As the founder of Pragmatic Web Security, Philippe delivers security training and security consulting to companies worldwide. His online course platform allows anyone to learn complex security topics at their own pace. Philippe is a Google Developer Expert and an Auth0 Ambassador for his community contributions on the security of web applications and APIs.