Android

Title Speakers Conference Tags
Next generation rootkits for ARM based devices Thomas Roth hackinparis-2013 - Paris,France Android Rootkits Exploitation ARM TrustZone
Strategic Analysis of the iOS Jailbreak Development Community Dino Dai Zovi SourceBoston-2013 - Boston,USA Android Analysis iOS Jailbreak
An Android Hacker's Journey: Challenges in Android Security Research Joshua J Drake CanSecWest-2013 - Vancouver, Canada Android Introductory
DROID EXPLOITATION SAGA Aditya Gupta , Subho Halder Blackhat Abu Dhabi-2012 - Abu Dhabi, UAE Android Attack
UI REDRESSING ATTACKS ON ANDROID DEVICES Marcus Niemietz Blackhat Abu Dhabi-2012 - Abu Dhabi, UAE Android Attack Defence Tapjacking
INTRODUCING THE SMARTPHONE PENTEST FRAMEWORK Georgia Weidman Blackhat Abu Dhabi-2012 - Abu Dhabi, UAE Android Mobile Security Tools
ANDROID MALWARE DETECTION IN THE CLOUD Hermes Li Ruxcon-2012 - Melbourne, Australia Android Malware Defence Tools WebSense
TACKLING THE ANDROID CHALLENGE Joshua ( jduck ) Drake Breakpoint-2012 - Melbourne,Australia Android Introductory
ANDROID FORENSIC DEEP DIVE Bradley Schatz Breakpoint-2012 - Melbourne,Australia Android Computer Forensics YAFFS2
Into the Droid: Gaining Access to Android User Data Thomas Cannon DEF CON-20 - Las Vegas, USA Android Exploitation Mobile Security
Isn't it all just SMS-sending trojans?: Real advances in Android Malware Jimmy Shah ShakaCon-5 - Honolulu, USA Android Malware
Binary Instrumentation for Android Collin Mulliner SummerCon-2012 - Brooklyn, USA Android Instrumentation
Hijacking attacks on Android devices Marcus Niemietz Positive Hack Days-2012 - Moscow, Russia Android
RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks Yeongung Park , Choonghyun Lee , Chanhee Lee , Jihyeog Lim , Sangchul Han , Minkyu Park , Seong-je Cho 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats-2012 - San Francisco, USA Android Defence
Team Joch Vs. Android: The Ultimate Showdown Jon Oberheide , Zach Lanier ShmooCon-2011 - Washington DC, USA Mobile Security Android
Reverse Engineering Using The Android Emulator Scott Dunlop ShmooCon-2011 - Washington DC, USA Android
What'S Old Is New Again: An Overview Of Mobile Application Security Zach Lanier OWASP BASC-2010 - Boston, USA Mobile Security Android Security Hardware Reverse Engineering
Smart Phones With Dumb Apps: Threat Modeling For Mobile Applications Dan Dan cornell OWASP Appsec-2010 - Washington DC, USA Mobile Security Android Security Exploitation
Android Application Security, The Fun Details Jesse Burns hashdays-2010 - Lucerne, Switzerland Mobile Security Android
Smart Phones With Dumb Apps: Threat Modeling For Mobile Applications Dan Dan cornell OWASP Appsec-2010 - USA Mobile Security Android Others Hardware Reverse Engineering
Collaborative Monitoring Scheme For Mobile Phones Applications Yaniv Altshuler CollSec-2010 - Washington DC, USA Mobile Security Android Security Hardware General
Exploratory Android Surgery Jesse Burns Blackhat USA-2009 - Las Vegas, USA Android Security
Pulling A John Connor: Defeating Android Charlie Miller ShmooCon-2009 - Washington DC, USA Android Security
A Novel Approach For Anomaly Detection Over High-Speed Networks Osman Salem , Sandrine Vaton , Annie Gravey EC2ND-2007 - Heraklion, Greece Android Intrusion Detection Incident Response