A list of the best presentations about smartphone security all over the net:
- Smartphone In(Security). Android/iPhone multi-platform shellcode.
- Post Exploitation Bliss: Meterpreter for iPhone. iPhone shellcode development.
- The Smart-Phones Nightmare. iPhone shellcode development.
- ARM Exploitation ROPMAP. ROP automation for ARM.
- Antid0te 2.0 — ASLR in iOS. Perfecting the ASLR protection of iOS.
- Overcoming iOS Data Protection to Re-enable iPhone Forensic. A summary on iOS protections.
- Targeting the iOS kernel. Advanced security-related debugging techniques.
- iOS 6 Security. New iOS security features.
- Evolution of iPhone Baseband and Unlocks.
- iOS Kernel Heap Armageddon Revisited.
- Popping Shell on A(ndroid)RM Devices. Android shellcode development.
- Beating up on Android. Android exploit recap and development.
- Why Eve and Mallory Love Android: An Analysis of Android SSL (In)Security. SSL is hard for developers, mobile or not.
- Hacking Android for fun & profit. In-depth view of the Android security system.
- APK Infection on Android. Easy virii for Android install files.
- Android Forensic Deep Dive.
- Android Reverse Engineering Tools.
- Bypassing the Android Permission Model.
- Into the Droid: Gaining Access to Android User Data.
- The Heavy Metal That Poisoned the Droid. Reduce the attack surface of Android applications.
- Inside Apple’s MDM Black Box. Just an overview of Apple’s Mobile Device Management system.
- These aren’t the permissions you’re looking for. Weak permissions on the Android file system and applications.
- Exploiting Symbian. Symbian shellcode development.
- iPhone Rootkit? There’s an App for That!. How to make iPhone rootkits from jailbreaks.
- Secure Development in iOS. The point of view of a pentester.
- Introducing the Smartphone Pentesting Framework. Very useful, albeit basic, set of pentesting tools.
- This is not the droid you’re looking for. Android rootkit development.
- iPhone Privacy. Handset data privacy and the SpyPhone app.
- App Attack. Android/iPhone apps security analysis.
- A Study of Android Application Security. Mass-scale Android app decompilation.
- Reversing Android Apps. Good overview of tools for decompilation.
- Windows Pwn 7 OEM – Owned Every Mobile? Always easy hacks on new OSes.
- Windows Phone 7 Internals and Exploitability.
- Detecting Mobile Phone Spy Tools. FlexiSpy and its spawn.
- Mobile App Moolah: Profit taking with Mobile Malware. An overview of frequent malware.
- Mobile Malware Madness and How to Cap the Mad Hatters. On behavioural detection of mobile malware.
- Transparent Botnet Control for Smartphones over SMS. Basic Android botnet with SMS C&C.
- Rise of the iBots: 0wning a telco network. Botnet architecture with SMS/P2P C&C.
- Exploratory Android Surgery. Android Intent fuzzing and sniffing.
- Blackbox Android. Breaking “Enterprise Class” Applications and Secure Containers.
- Pwning a 4G Device for the Lulz. Multiple attack recombination.
- Advanced Attacks Against PocketPC Phones. PocketPC MMS User Agent attack.
- Analyzing Complex Systems: The Blackberry Case. General Blackberry security.
- Smartphone Backdoors: An Analysis of Blackberry and Other Mobile Device Spyware. On the Blackberry TXSBBSpy backdoor.
- Symbian Phone Security. General Symbian security.
- Symbian Malware. Basics on Symbian malware.
- Attacking NFC Mobile Phones. Simple DoS and authentication issues on S40 phones.
- Hacking NFC and NDEF. Revisiting the previous slides.
- NFC for Free Rides and Rooms. How to UltraReset the transit cards.
- Binary Instrumentation Framework for Android. Binary instrumentation for NFC/RFID tag reading.
- Intercepting GSM traffic. A5/1 cracking.
- GSM — SRSLY?. More on A5/1 cracking and A5/3 cracking.
- GPRS Intercept: Wardriving your country. Old attacks, not going fast.
- Defending mobile phones. On the predictable padding of the GSM protocol.
- Open source 4G radio. A WiMAX scanner in Matlab.
- All Your Baseband Are Belong To Us. An exploration on remote baseband exploitation.
- Vulnerabilities in Dual-mode/Wi-Fi phones. VoIP vulnerabilities.
- Telecom Signaling Attacks on 3G and LTE networks. Advanced scanning in telco networks.
- A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications. GPRS/EDGE connection hijacking via a rogue base station attack.
- GPRS Intercept: Wardriving your country.
- An OpenBTS GSM Replication Jail for Mobile Malware. DIY network cell.
- Attacking 3G and 4G mobile telecommunications networks. An exploration on network scanning 3G/4G networks.
- Attacking GRX. Attacking The GPRS Roaming eXchange.
- Playing with the GSM RF interface. Random Access Channel bursts (RACH) flooding.
- Base Jumping. GSM DoS (RACH, IMSI Flood, IMSI Detach).
- SIM Toolkit Attack. SIM-playing made easy.
- The blackbox in your phone. An easier overview on the functionalities of the SIM.
- Machine-to-machine (M2M) security. Easy attacks on common setups.
- Fuzzing your GSM phone using OpenBSC and scapy. GSM protocol introduction with some details on how to fuzz the GSM stack (no particular attack is discussed).
- Extending Scapy by a GSM Air Interface. Advanced toolkit for GSM DoS.
- Fuzzing the Phone in Your Phone. Discovering DoS attacks and remote exploits with fuzzed SMSs on iPhone/Android/WinMo.
- The Carmen-San Diego Project. Tricks of the trade to geolocate any mobile phone.
- Locating Mobile Phones using Signalling System #7. A different way to explain mobile phone geolocation.
- Android geolocation using GSM network. How to extract geolocation information from an Android smartphone.
- Attacking SMS. It’s No Longer Your BFF. Mail2SMS and IM2SMS abuses.
- Hijacking Mobile Data Connections. WAP-provisioning spoofing to hijack mobile connections.
- Attacking Mobile Phone Messaging. MMS spoofing, fingerprinting and various attacks.
- Random tales from a mobile phone hacker. On the MSISDN disclosure in HTTP headers by web proxies and other curiosities.
- A Million Little Tracking Devices. Zoombak in-depth analysis.
- Mobile and Contactless Payment Security. Introduction to protocols, formats and attacks.
- Probing Mobile Operator Networks. What would you find by network scanning the mobile telcos?
- Why Telcos Keep Getting Hacked. Interesting research on the history of telco security.
- Satellite Telephony Security. Introduction to protocols and call interception.
- Don’t Trust Satellite Phone — an Analysis of the GMR‑1 and GMR‑2 Standards. Not even satellite phones are safe!
- Intelligent Bluetooth Fuzzing. The ignored but omnipresent protocol.
- Femtocells: a Poisonous Needle in the Operator’s Hay Stack. Interceptions, injections and invading the operator network. Also Hacking Femtocell, Immature Femtocells and Security challenges for Femtocell communication architecture from the same author.
- How many bricks does it take to crack a microcell?
Note: this post will be expanded in the future.