Skip to content

What we’re about

OWASP Vancouver Chapter, free to join, open to all. We meet to discuss & demonstrate web and browser-based vulnerabilities, tools & solutions. More information about the OWASP Vancouver Chapter can be found at https://www.owasp.org/index.php/Vancouver.

Upcoming events

2

See all
  • DBL Header: Move Fast and Secure Things & Turning the dial on SAST

    DBL Header: Move Fast and Secure Things & Turning the dial on SAST

    SFU Harbour Center - Venture Labs, 555 West Hastings St, Suite #1100, Vancouver, BC, CA

    Thank you to Venture Labs for hosting, and Spring Financial for sponsoring this event! 🙏

    Move Fast and Secure Things: A Guide to Scaling Security with Greg Sienkiewicz

    Scaling security isn’t just about checking boxes - it’s about evolving from survival mode to a mature, developed program. Startups move fast, but as you scale, customers demand trust, compliance becomes mandatory, and security debt turns into real risk.
    This is real talk from the trenches - we’ll share exactly how we evolved our security program from one built around reactive chaos to proactive resilience. If you’re scaling fast, these lessons will help you move fast - without breaking trust.

    Greg Sienkiewicz is a DevSecOps engineer at Rewind, an Ottawa-based scale-up focused on protecting SaaS and cloud data. He holds multiple industry certifications, including ISC2 Certified Cloud Security Professional (CCSP) and AWS Certified Security - Specialty. He is a long-time supporter of OWASP - holds a Lifetime Membership - and is actively involved in the Ottawa chapter.

    Turning the dial on SAST: Reducing False Positives with Call Graph–Driven LLM Reasoning with Vrushal Nedungadi

    Static analysis tools are an integral part of modern-day software development processes to find bugs and security vulnerabilities. However, they suffer from a drawback: false positive findings. False positives are findings that are incorrectly identified by the static analysis tools as a vulnerability. Such alerts may waste developers' time and effort since these are not exploitable and need no patching. A substantial number of false positives can lead to developer fatigue and reduce the adoption of static analysis tools within software development teams. This may cause real vulnerabilities to go unnoticed, and thereby increasing the software's overall attack surface. Therefore, it is imperative that false positives from SAST findings, and the noise that it creates, be reduced significantly.

    In an attempt to realize this objective, we propose a novel approach that combines inter-procedural call graph analysis with large-language model reasoning to identify false positives in SAST findings. Our approach constructs precise call-graphs with bidirectional execution context (caller chain and callee chain) to help the LLM conduct a comprehensive data flow analysis. To help the LLM reason better, our method guides the LLMs using CWE-specific prompts which drives more accurate results.

    The system detects over 90% false positives for specific CWEs like CWE-22 (Path Traversal) and CWE-89 (SQL Injection). Our research demonstrates that inter-procedural call graph analysis coupled with LLM reasoning powered by CWE-specific prompting can significantly reduce the number of false positives in SAST findings, thereby increasing the usability of SAST tools.

    • Photo of the user
    • Photo of the user
    • Photo of the user
    129 attendees

Group links

Members

2,212
See all
Photo of the user Reza Zeinali
Photo of the user Eric Finlay
Photo of the user Lucas Amorim
Photo of the user Simon Tin-Yul Kok
Photo of the user Dave Kichler
Photo of the user Anthony
Photo of the user Paul Monk
Photo of the user Babak Roohhbakhsh
Photo of the user Gord Harris
Photo of the user Alex Han
Photo of the user Adam Harrison
Photo of the user Gustavo