Mobile Device Attack graphs for fun and profit presented at BSidesPDX 2012

by Jimmy Shah,

Tags: Security

Summary : Attack graphs represent the various options an attacker has available to achieve their goal. We often hear that mobile devices are bringing on totally new, never before seen attacks. The differences can be esoteric and difficult to explain to a non-technical audience. While they can open up new avenues of attack, they are similar in nature to previously seen attacks. We will show how a form of attack graph can work as a shorthand to explain these mobile attacks to management and others.
A beneficial side effect of these mobile attack graphs is the ability to overlay protection or mitigation methods. Not just scaring your audience but at a glance telling them how they can defend mobile attacks.