Caleb Sima

Caleb Sima

San Francisco Bay Area
19K followers 500+ connections

About

With over 25 years of experience in cybersecurity, I am passionate about building and…

Articles by Caleb

Activity

Join now to see all activity

Experience

  • WhiteRabbit Graphic

    WhiteRabbit

    San Francisco, California, United States

  • -

  • -

    San Francisco Bay Area

  • -

    San Francisco Bay Area

  • -

    San Francisco, California

  • -

    San Francisco, California

  • -

    San Francisco

  • -

  • -

  • -

  • -

  • -

  • -

Education

Publications

  • Hacking Exposed Web Applications 3rd Edition

    McGraw-Hill Professional

    Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. Integrating security into the Web…

    Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. Integrating security into the Web development lifecycle (SDL) and into the broader enterprise information security program is also covered in this comprehensive resource.

    Other authors
    See publication

Patents

  • Secure web application development and execution environment

    Issued US 8,800,042

    Providing secure web application development and operation. In a web development environment, code developed for the web application is analyzed to identify vulnerabilities and remedial actions are identified. The remedial actions may be automatically invoked or a developer can be prompted to take particular actions to remediate the vulnerability.

    See patent
  • Web application assessment based on intelligent generation of attack strings

    Issued US 8,656,495

    A web application is more efficiently analyzed by intelligently generating attack sequences to be used in the assessment. Rather than simply sending a canned list of static strings at a web application, the operation of the web application is analyzed to determine the filtering and acceptance characteristics of the web site. As this information is ascertained, a vocabulary of allowed symbols is created. This vocabulary is used in the building of attack strings and as such, the number of attack…

    A web application is more efficiently analyzed by intelligently generating attack sequences to be used in the assessment. Rather than simply sending a canned list of static strings at a web application, the operation of the web application is analyzed to determine the filtering and acceptance characteristics of the web site. As this information is ascertained, a vocabulary of allowed symbols is created. This vocabulary is used in the building of attack strings and as such, the number of attack strings fired at the web application is greatly reduced, as well as the number of false positives.

    See patent
  • System and method for testing web applications with recursive discovery and analysis

    Issued US 8,566,945

    A recursive web crawling and analysis tool that includes conducting an initial crawl of a target to identify testable or analyzable objects. The objects are then parsed to identify vulnerabilities, as well as additional objects that can be analyzed. An attack is then launched against the analyzable objects in an effort to break or verify the vulnerabilities. During this attack, additional analyzable objects may be discovered. If such additional objects are discovered, the web crawler is invoked…

    A recursive web crawling and analysis tool that includes conducting an initial crawl of a target to identify testable or analyzable objects. The objects are then parsed to identify vulnerabilities, as well as additional objects that can be analyzed. An attack is then launched against the analyzable objects in an effort to break or verify the vulnerabilities. During this attack, additional analyzable objects may be discovered. If such additional objects are discovered, the web crawler is invoked on the additional objects as well, and the results of the crawl are fed back into the parser and attacker functions.

    See patent
  • Secure web application development environment

    Issued US 8,266,700

    Various embodiments of systems, methods, software tools, etc. for providing secure web application development are provided. One embodiment comprises a method for developing a secure web application. One such method comprises: analyzing code associated with a web application to identify at least one vulnerable input; and validating the at least one vulnerable input.

    See patent
  • Integrated crawling and auditing of web applications and web content

    Issued US 7,765,597

    A vulnerability assessment tool that is operative to analyze web sites by simultaneously operating a crawling process and an audit process. Once the crawling process is invoked, the results are provided to the audit process. The audit process, rather than waiting until the crawl process is completed, simultaneously audits the web site based on the already provided crawl results. The results of the audit are also fed back to the crawl process to further enhance the crawl.

    See patent
  • Automated user interaction in application assessment

    Issued US 7,647,631

    Various embodiments of systems, methods, software tools, etc. for performing an assessment of an application are provided. One embodiment comprises a method for performing an assessment of a web application. One such method comprises: recording user interactions with a web application; and playing back the user interactions to perform an assessment of the web application.

    See patent
  • Web application auditing based on sub-application identification

    Filed US 20080120305

    Techniques to programmatically identify similar areas of a website or web application to reduce the scope required for a web security audit

    See patent
  • Characterization of web application inputs

    Filed US 20080120420

    Techniques to programmatically determine valid input for a given web application from the outside, including allow and denied sequences, to aid in the auditing of web site security

    See patent

Projects

  • Blackhat CISO & Entrepreneur Summit Committee

    Help build the Blackhat agendas and topics as well as create the first Entrepreneur Summit

  • Investor & Advisor

    Portfolio includes but not limited to: ArmorBlox, Bridgecrew, Cequence, CloudZero, Cobalt, Capsule8, Cyral, DeepFactor, Drata, Eclypsium, Endor Labs, Fossa, Halcyon, Hivewatch, Incode, Island, JupiterOne, Noq, Orca, Otterize, Permiso, Pindrop, Polaris, ProjectDiscovery, Remediant, Resourcely, Rezilion, Truffle, Tines, Tonic, Tromzo, Phylum, Traceable, Wing, Kabbage, Veza

  • Riskrubric.ai

    -

Organizations

  • SVCI - Silicon Valley CISO Investments

    Investor

    - Present
  • Pindrop Security

    Investor & Advisor

    - Present

Recommendations received

More activity by Caleb

View Caleb’s full profile

  • See who you know in common
  • Get introduced
  • Contact Caleb directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Add new skills with these courses