Worth reading articles

Expert knowledge,
that brings you further

Whether you need background information on best SAP® practices, the state of SAP security and quality today or in-depth guidance on risk mitigation and cutting-edge tools, we have captured expert insights. Our white papers provide actionable tips and guidance you can use to improve your SAP security and quality programs.

Static Data Leak Prevention (S-DLP)

The Weaknesses in existing DLP methodologies which are primarily related to unreliable identification of critical business data. (Whitepaper by Andreas Wiegenstein)

Details and download

SAP® Security Recommendations - Protecting Java- and ABAP-based SAP Applications

Published here with friendly permission of SAP AG. This SAP white paper has been developed with support from Virtual Forge.

Details and download

The ABAP Underverse

Latest Research results about risky ABAP to Kernel communication and ABAP-tunneled buffer overflows.
by Andreas Wiegenstein, presented at Blackhat Europe, Barcelona, 2011

Details and download

Software Supply Chain Integrity in SAP Applications

Article in Security Acts, by Sebastian Schinzel, Gunter Bitz, Andreas Wiegenstein, Markus Schumacher & Frederik Weidemann, 2009

Details and download

Writing Fast and Secure Code in C

Describes the special vulnerability for buffer overflows in C, and explains how developers can harden their code against this and other vulnerabilities. (Whitepaper by Sebastian Schinzel)

Details and download

Web Application Vulnerability Scanners - a Benchmark

Analyzes the efficiency and reliability of black box scanners when searching for vulnerabilities in Web applications
By Andreas Wiegenstein, Frederik Weidemann, Sebastian Schinzel, Dr. Markus Schumacher

Details and download

The Cross Site Scripting Threat

Detailed (technical) discussion of Cross-Site Scripting vulnerabilities and their damage potential.
By Andreas Wiegenstein, Dr. Markus Schumacher, Xu Jia, Frederik Weidemann

Details and download

The Impact of Cross-Site Scripting on Your Business

High-level overview of the business risks related to Cross-Site Scripting vulnerabilities.
By Andreas Wiegenstein

Details and download

Cookies on the Virtual Forge website

To offer you the best possible service, Virtual Forge uses cookies to store information about your visit to our website. We also use the Facebook Pixel to learn more about how our website is used. Cookies thus enable us to measure the response to our marketing efforts on Facebook and find out how we could improve them. By using this website, you consent to our use of cookies.

Please click here to learn more about how cookies are used on this website. Here, you can also dissent to the use of cookies and adjust your browser’s settings accordingly.

I consent!