{"id":1160,"date":"2012-10-29T21:00:51","date_gmt":"2012-10-29T20:00:51","guid":{"rendered":"http:\/\/cerezo.name\/blog\/?p=1160"},"modified":"2024-10-14T13:47:55","modified_gmt":"2024-10-14T11:47:55","slug":"new-presentations-on-mobile-security","status":"publish","type":"post","link":"http:\/\/cerezo.name\/blog\/2012\/10\/29\/new-presentations-on-mobile-security\/","title":{"rendered":"New Presentations on Mobile Security"},"content":{"rendered":"<p style=\"text-align: justify;\">I\u2019ve just updated the <a href=\"http:\/\/cerezo.name\/blog\/2011\/02\/25\/presentations-on-smartphone-security\/\" target=\"_blank\" rel=\"noopener\">list of presentations on mobile security<\/a>:<\/p>\n<ul>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/www2.dcsec.uni-hannover.de\/files\/android\/p50-fahl.pdf\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">Why Eve and Mallory Love Android: An Analysis of Android <span class=\"caps\">SSL<\/span> (In)Security<\/a>. <span class=\"caps\">SSL<\/span> is hard for developers, mobile or&nbsp;not.<\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/www.isti.tu-berlin.de\/fileadmin\/fg214\/Papers\/conf_t2_2010.pdf\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">Hacking Femtocell<\/a>, <a href=\"http:\/\/www.isti.tu-berlin.de\/fileadmin\/fg214\/Papers\/conf_eusectwest10.pdf\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">Immature Femtocells<\/a> and <a href=\"http:\/\/www.isti.tu-berlin.de\/fileadmin\/fg214\/ravi\/FEMTOCELL_etsi.pdf\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">Security challenges for Femtocell communication architecture<\/a><\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/gmr.crypto.rub.de\/slides\/oakland.pdf\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">Don\u2019t Trust Satellite Phone \u2014 an Analysis of the <span class=\"caps\">GMR<\/span>\u20111 and <span class=\"caps\">GMR<\/span>\u20112 Standards<\/a>. Not even satellite phones are&nbsp;safe!<\/li>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/www.owasp.org\/images\/5\/5e\/The_smartphone_penetration_testing_framework-Georgia_Weidman.pdf\" target=\"_blank\" rel=\"noopener\">Introducing the Smartphone Pentesting Framework<\/a>. Very useful, albeit basic, set of pentesting tools.<\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/korben.info\/wp-content\/uploads\/defcon\/SpeakerPresentations\/Pan\/DEFCON-20-Pan-APK-File-Infection-on-Android-System.pdf\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\"><span class=\"caps\">APK<\/span> Infection on Android<\/a>. Easy virii for Android install files.<\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/media.risky.biz\/EUSecWest-SoBenn-Transit2012-Preview.pdf\" target=\"_blank\" rel=\"noopener\"><span class=\"caps\">NFC<\/span> for Free Rides and Rooms<\/a>. How to UltraReset the transit cards.<\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/www.ruxconbreakpoint.com\/assets\/Uploads\/bpx\/D1T2%20-%20Mark%20Dowd%20&amp;%20Tarjei%20Mandt%20-%20iOS6%20Security.pdf\" target=\"_blank\" rel=\"noopener\">iOS 6 Security<\/a>.<\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/www.ruxconbreakpoint.com\/assets\/Uploads\/bpx\/Breakpoint2012-Android-Schatz.pdf\" target=\"_blank\" rel=\"noopener\">Android Forensic Deep Dive<\/a>.<\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/mulliner.org\/security\/pmon\/mulliner_pmon_2012.pdf\" target=\"_blank\" rel=\"noopener\">Probing Mobile Operator Networks<\/a>. What would you find by network scanning the mobile telcos?<\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/www.mulliner.org\/android\/feed\/binaryinstrumentationandroid_mulliner_summercon12.pdf\" target=\"_blank\" rel=\"noopener\">Binary Instrumentation Framework for Android<\/a>. Binary instrumentation for <span class=\"caps\">NFC<\/span>\/<span class=\"caps\">RFID<\/span> tag reading.<\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/conference.hitb.org\/hitbsecconf2012ams\/materials\/D2T1%20-%20Georgia%20Weidman%20-%20Bypassing%20the%20Android%20Permission%20Model.pdf\">Bypassing the Android Permission Model<\/a><\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/conference.hitb.org\/hitbsecconf2012ams\/materials\/D1T2%20-%20MuscleNerd%20-%20Evolution%20of%20iPhone%20Baseband%20and%20Unlocks.pdf\">Evolution of iPhone Baseband and Unlocks<\/a><\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/korben.info\/wp-content\/uploads\/defcon\/SpeakerPresentations\/Cannon\/DEFCON-20-Cannon-Into-The-Droid.pdf\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">Into the Droid: Gaining Access to Android User&nbsp;Data<\/a><\/li>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/media.blackhat.com\/bh-us-12\/Briefings\/Rowley\/BH_US_12_Rowley_Microcell_Bricks_Slides.pdf\" target=\"_blank\" rel=\"noopener\">How many bricks does it take to crack a microcell?<\/a><\/li>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/media.blackhat.com\/bh-us-12\/Briefings\/Esser\/BH_US_12_Esser_iOS_Kernel_Heap_Armageddon_Slides.pdf\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">iOS Kernel Heap Armageddon Revisited<\/a><\/li>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/media.blackhat.com\/bh-us-12\/Briefings\/Oi\/BH_US_12_Oi_Windows_Phone_Slides.pdf\" target=\"_blank\" rel=\"noopener\">Windows Phone 7 Internals and Exploitability<\/a><\/li>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/media.blackhat.com\/bh-eu-12\/Erasmus\/bh-eu-12-Erasmus-Heavy-Metal_Poisoned_Droid-Slides.pdf\" target=\"_blank\" rel=\"noopener\">The Heavy Metal That Poisoned the Droid<\/a>. Reduce the attack surface of Android applications.<\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/www.fortiguard.com\/files\/insomnidroid.pdf\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">Android Reverse Engineering Tools<\/a><\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/conference.hitb.org\/hitbsecconf2012kul\/materials\/D1T1%20-%20Philippe%20Langlois%20and%20Emmanuel%20Gadaix%20-%206000%20Ways%20and%20More.pdf\" target=\"_blank\" rel=\"noopener\">Why Telcos Keep Getting Hacked<\/a>. Interesting research on the history of telco security.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>I\u2019ve just updated the list of presentations on mobile security: Why Eve and Mallory Love Android: An Analysis of Android <span class=\"caps\">SSL<\/span> (In)Security. <span class=\"caps\">SSL<\/span> is hard for developers, mobile or&nbsp;not. Hacking Femtocell, Immature Femtocells and Security challenges for Femtocell communication architecture Don\u2019t Trust Satellite Phone \u2014 an Analysis of the <span class=\"caps\">GMR<\/span>\u20111 and <span class=\"caps\">GMR<\/span>\u20112 Standards. Not&nbsp;even&nbsp;[\u2026]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"wp_typography_post_enhancements_disabled":false,"ngg_post_thumbnail":0},"categories":[6,3],"tags":[],"_links":{"self":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1160"}],"collection":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/comments?post=1160"}],"version-history":[{"count":11,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1160\/revisions"}],"predecessor-version":[{"id":1571,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1160\/revisions\/1571"}],"wp:attachment":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/media?parent=1160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/categories?post=1160"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/tags?post=1160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}