Mobile Security

Title Speakers Conference Tags
EXCHANGING DEMANDS Peter Hannay BlackHat USA-2012 - Las Vegas, USA Mobile Security
WHEN SECURITY GETS IN THE WAY: PENTESTING MOBILE APPS THAT USE CERTIFICATE PINNING Justine Osborne , Alban Diquet BlackHat USA-2012 - Las Vegas, USA Mobile Security Application Security Certificate Pinning
PROBING MOBILE OPERATOR NETWORKS Collin Mulliner BlackHat USA-2012 - Las Vegas, USA Mobile Security Survey Scan
Team Joch Vs. Android: The Ultimate Showdown Jon Oberheide , Zach Lanier ShmooCon-2011 - Washington DC, USA Mobile Security Android
Dankam : Augmented Reality For Color Blindness Dan Kaminsky Berlinsides-2010 - Berlin, Germany Mobile Security
Femtocell Security Tsaitgaist ( tsaitgaist ) Berlinsides-2010 - Berlin, Germany Mobile Security
Sms-O-Death Nico Golde , Collin Mulliner Chaos Communication Congress-27 - Berlin, Germany Mobile Security Analysis
Hacking Smart Phones Ilja Sprundel , Ilja van Sprundel Chaos Communication Congress-27 - Berlin, Germany Mobile Security
A Crumple Zone For Service Oriented Architectures Andrew Gronosky OWASP BASC-2010 - Boston, USA Mobile Security Others Deep Knowledge
What'S Old Is New Again: An Overview Of Mobile Application Security Zach Lanier OWASP BASC-2010 - Boston, USA Mobile Security Android Security Hardware Reverse Engineering
Coffee Shop Warefare:Protecting Yourself In Dark Territory Anonymous Speaker OWASP BASC-2010 - Boston, USA Mobile Security Wireless Others
Smart Phones With Dumb Apps: Threat Modeling For Mobile Applications Dan Dan cornell OWASP Appsec-2010 - Washington DC, USA Mobile Security Android Security Exploitation
Osmocombb: A Tool For Gsm Protocol Level Security Analysis Of Gsm Networks Harald Welte hashdays-2010 - Lucerne, Switzerland Mobile Security Security Others
Android Application Security, The Fun Details Jesse Burns hashdays-2010 - Lucerne, Switzerland Mobile Security Android
Pwn On The Go! Mj Keith House Con-2010 - USA Mobile Security Wireless Web
Smart Phones With Dumb Apps Dan Dan cornell House Con-2010 - USA Mobile Security Security Exploitation
How I Met Your Girlfriend Samy Kamkar LASCON-2010 - Austin, USA Mobile Security Web Firewall Privacy Risk
Windows Phone 7 Security Talk Geir Olsen BlueHat-2010 - Redmond, USA Mobile Security Security Application Security
Attacking Gsm Base Stations And Mobile Phone Basebands The Grugq HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia Mobile Security Security
Iphone Hackery Ross Simpson ZaCon-2 - Johannesburg, South Africa Mobile Security Security Rootkits
Gsm Security: Fact And Fiction Fabian Van den broek BruCON-2010 - Brussels, Belgium Mobile Security Security Network Penetration
Nokia Nfc Malicious Content Sharing Roel Verdult , Fkooman Fkooman BruCON-2010 - Brussels, Belgium Mobile Security Network Penetration
Smart Phones With Dumb Apps Dan Dan cornell OWASP Dublin-2010 - Ireland Mobile Security Security Hardware Reverse Engineering
Microsoft'S Security Development Lifecycle For Agile Development Nick Coblentz OWASP Dublin-2010 - Ireland Mobile Security Development
Smart Phones With Dumb Apps: Threat Modeling For Mobile Applications Dan Dan cornell OWASP Appsec-2010 - USA Mobile Security Android Others Hardware Reverse Engineering
Collaborative Monitoring Scheme For Mobile Phones Applications Yaniv Altshuler CollSec-2010 - Washington DC, USA Mobile Security Android Security Hardware General
Working With Symbian Tam Hanna NinjaCon-2010 - Vienna, Austria Mobile Security Security Hardware Reverse Engineering
Base Jumping: Attacking Gsm Base Station Systems And Mobile Phone Base Bands The Grugq NinjaCon-2010 - Vienna, Austria Mobile Security Security Wireless
How To Stay Invisible (Still Using Cellphones) Kugg Hossi Phrosit NinjaCon-2010 - Vienna, Austria Mobile Security Security Others
Hijacking Mobile Data Connections: State Of The Art Roberto Gassira , Roberto Piccirillo HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands Mobile Security Security Routing Privacy
Having Fun With Apples Iokit Ilja Van sprundel HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands Mobile Security Rootkits
Web Frameworks And How They Kill Traditional Security Scanning Lars Andren , Christian Hang OWASP Appsec-2010 - Stocholm, Sweden Mobile Security Web
Product Security Management In Agile Product Management Antti Vähä Sipilä OWASP Appsec-2010 - Stocholm, Sweden Mobile Security Security Development
“Mobile Privacy: Tor On The Iphone And Other Unusual Devices”, Marco Bonetti AthCon-2010 - Athens, Greece Mobile Security Security Hardware General
Making Mobile Security Work For The Business: Strategies To Limit Risk And Protect Your Mobile Assets Nader Henein ITWeb Security Summit-2010 - Johannesburg, South Africa Mobile Security
Smartphone Security: The Past, Present And The Future Charlie Vedaa ITWeb Security Summit-2010 - Johannesburg, South Africa Mobile Security
Securing The Mobile Enterprise Samresh Ramjith ITWeb Security Summit-2010 - Johannesburg, South Africa Mobile Security
Hacking With The Iphone Snide CarolinaCon6-2010 - Raleigh, USA Mobile Security Security Hardware Reverse Engineering Hardware General
How The Droid Was Rooted Michael Goffin CarolinaCon6-2010 - Raleigh, USA Mobile Security Hardware Reverse Engineering Hardware General
Red And Tiger Team Chris Nickerson BruCON-2009 - Brussels, Belgium Mobile Security Security Others Deep Knowledge Application Security Monitoring Social Engineering Reverse Engineering Network Penetration Physical Pentesting
Fuzzing the Phone in your Phone Collin Mulliner SEC-T-2009 - Stockholm, Sweden Mobile Security Security
Lessons Learned From The Vodafone Wiretapping Incident Vassilis Prevelakis EC2ND-2007 - Heraklion, Greece Mobile Security
Mobile Security: Sms And Wap Job de Haas Blackhat Europe-2001 - Amsterdam, The Netherlands Mobile Security Security Others Access