Your SlideShare is downloading. ×
0
Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Blackhat USA Mobile Security Panel 2011

273

Published on

Introduction slides for mobile security panel at Blackhat USA 2011

Introduction slides for mobile security panel at Blackhat USA 2011

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
273
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. ModeratorTyler Shields• Security Researcher• Veracode Inc.• Formerly penetration tester with Symantec and @Stake• Presented at HOPE, Shmoocon, Source, and other industry conferences• Best known for creation of mobile spyware suite for Blackberry devices
  • 2. Mobile Security Stack Application Security Operating System Security Hardware / Firmware Security Infrastructure Security
  • 3. Infrastructure LayerNick DePetrillo• Security Researcher• Crucial Security Inc, Harris Corp• Formerly Security Consultant with Industrial Defender and engineer with Aruba Networks• Best known for recent research on issues in the global telephone networkDon Bailey• Security Consultant• iSec Partners• Has presented on topics including stealthy rootkits, 0-day exploit technology, DECT, GSM and embedded security• Best known for recent work on vulnerabilities in embedded architectures and issues with the global telephone network
  • 4. Hardware / Firmware LayerRalf-Phillipp Weinmann• PostDoc - Laboratory of Algorithms, Cryptology and Security, University of Luxembourg• Ph.D. from the Technical University of Darmstadt• Best known for Baseband Apocalypse presentation BHDC/CCC• Over-the-air exploitations of memory corruption in GSM/3GPP stacks
  • 5. Operating System LayerCharlie Miller• Principal Research Consultant• Accuvant Labs• Wrote the first public exploit for both iPhone and Android platforms• Won CanSecWest Pwn2Own for four consecutive years• Author of two infosecurity books• PhD from University of Notre DameDino Dai Zovi• Independent Researcher• Regular speaker at industry, academic, and hacker security conferences world wide• Significant research includes rootkit technologies, wireless security, exploit development, and mobile!• Has spoken at BlueHat, CanSecWest, USENIX, Blackhat, and Defcon• Author of “Mac Hackers Handbook” and “The Art of Software Security Testing”
  • 6. Application LayerChris Wysopal• CTO and Co-Founder• Veracode, Inc.• Original vulnerability researcher with L0pht Heavy Industries• Testified on Capitol Hill on security topics• Published first advisory in 1996• Author of “The Art of Software Security Testing”Anthony Lineberry• Security Researcher• Lookout Mobile Security• Previously employed by McAfee, NeuralIO, and has spoke at Defcon and BH USA and Europe• Specializes in reverse engineering, vulnerability research, and advanced exploit development• Assisted with first ever iPhone jailbreak
  • 7. The Game Rules of Engagement• Twitter - #bhmobile• Questions solicited • Leading up to the event • From each combatant prior to the event • Live from the audience May the riskiest security layer win!
  • 8. Are You Ready to Rumble
  • 9. And The Winner IS….

×