ModeratorTyler Shields• Security Researcher• Veracode Inc.• Formerly penetration tester  with Symantec and @Stake• Present...
Mobile Security Stack          Application Security       Operating System Security         Hardware / Firmware           ...
Infrastructure LayerNick DePetrillo•   Security Researcher•   Crucial Security Inc, Harris Corp•   Formerly Security Consu...
Hardware / Firmware LayerRalf-Phillipp Weinmann• PostDoc - Laboratory of Algorithms,  Cryptology and Security, University ...
Operating System LayerCharlie Miller•   Principal Research Consultant•   Accuvant Labs•   Wrote the first public exploit f...
Application LayerChris Wysopal•   CTO and Co-Founder•   Veracode, Inc.•   Original vulnerability researcher with    L0pht ...
The Game    Rules of Engagement• Twitter - #bhmobile• Questions solicited   • Leading up to the event   • From each combat...
Are You Ready to Rumble
And The Winner IS….
Blackhat USA Mobile Security Panel 2011
Upcoming SlideShare
Loading in …5
×

Blackhat USA Mobile Security Panel 2011

769 views
697 views

Published on

Introduction slides for mobile security panel at Blackhat USA 2011

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
769
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Blackhat USA Mobile Security Panel 2011

  1. 1. ModeratorTyler Shields• Security Researcher• Veracode Inc.• Formerly penetration tester with Symantec and @Stake• Presented at HOPE, Shmoocon, Source, and other industry conferences• Best known for creation of mobile spyware suite for Blackberry devices
  2. 2. Mobile Security Stack Application Security Operating System Security Hardware / Firmware Security Infrastructure Security
  3. 3. Infrastructure LayerNick DePetrillo• Security Researcher• Crucial Security Inc, Harris Corp• Formerly Security Consultant with Industrial Defender and engineer with Aruba Networks• Best known for recent research on issues in the global telephone networkDon Bailey• Security Consultant• iSec Partners• Has presented on topics including stealthy rootkits, 0-day exploit technology, DECT, GSM and embedded security• Best known for recent work on vulnerabilities in embedded architectures and issues with the global telephone network
  4. 4. Hardware / Firmware LayerRalf-Phillipp Weinmann• PostDoc - Laboratory of Algorithms, Cryptology and Security, University of Luxembourg• Ph.D. from the Technical University of Darmstadt• Best known for Baseband Apocalypse presentation BHDC/CCC• Over-the-air exploitations of memory corruption in GSM/3GPP stacks
  5. 5. Operating System LayerCharlie Miller• Principal Research Consultant• Accuvant Labs• Wrote the first public exploit for both iPhone and Android platforms• Won CanSecWest Pwn2Own for four consecutive years• Author of two infosecurity books• PhD from University of Notre DameDino Dai Zovi• Independent Researcher• Regular speaker at industry, academic, and hacker security conferences world wide• Significant research includes rootkit technologies, wireless security, exploit development, and mobile!• Has spoken at BlueHat, CanSecWest, USENIX, Blackhat, and Defcon• Author of “Mac Hackers Handbook” and “The Art of Software Security Testing”
  6. 6. Application LayerChris Wysopal• CTO and Co-Founder• Veracode, Inc.• Original vulnerability researcher with L0pht Heavy Industries• Testified on Capitol Hill on security topics• Published first advisory in 1996• Author of “The Art of Software Security Testing”Anthony Lineberry• Security Researcher• Lookout Mobile Security• Previously employed by McAfee, NeuralIO, and has spoke at Defcon and BH USA and Europe• Specializes in reverse engineering, vulnerability research, and advanced exploit development• Assisted with first ever iPhone jailbreak
  7. 7. The Game Rules of Engagement• Twitter - #bhmobile• Questions solicited • Leading up to the event • From each combatant prior to the event • Live from the audience May the riskiest security layer win!
  8. 8. Are You Ready to Rumble
  9. 9. And The Winner IS….

×