Mobile Security And Software Radio presented at BlueHat 2009

by Josh Lackey ( Microsoft ),

Tags: Security

Summary : Security research on mobile phones is quickly gaining critical mass. Researchers are examining the attack surface and disseminating their knowledge. There are projects aiming to crack the encryption, projects aiming to find implementation vulnerabilities, and projects that can attack the very infrastructure itself. Software radio, by allowing researchers to control the lowest levels of the applicable protocols, is assisting, and in some cases enabling, these attacks. This session will explore the current, public attacks against mobile phone security.