๐Ÿงช Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Android Security

12
Total Entries
15
Contributors

Top Contributors

Abhishek Jm(1) Aditi Bhatnagar(1) Aditya Gupta(1) Amrudesh Balakrishnan(1) Anto Joseph(1)

All Entries (12 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-06Tool demoBlackhat MORF โ€“ Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jmmobile-securityapp-securitymobile-pentesting+4
2023-08-07TalkC0c0n Uncovering the Hidden Dangers Lurking as Android Apps using ML Algos Video Nikhil Prabhakarandroid-securitymobile-securityreverse-engineering+1
2022-09-24TalkC0c0n Citizen Mobile Security (ICAMPS) Satyendra Vermamobile-securityandroid-securityios-security+4
2022-09-23TalkC0c0n Pwning Android Apps at Scale Sparsh Kulshrestha, Shashank Barthwalandroid-securitymobile-securitymobile-pentesting+3
2022-07-24TalkMay Contain Hackers No Permissions Needed! Aditi Bhatnagarandroid-securitymobile-securityprivacy+3
2017-09-21TalkApp Sec Usa Androsia: A tool for securing in memory sensitive data Video Samit Anwerandroid-securitymobile-securitystatic-analysis+1
2016-11-06TalkGround Zero Summit Hacking The Droids Anto Josephandroid-securitymobile-securityreverse-engineering+3
2015-09-24TalkApp Sec Usa QARK: Android App Exploit and SCA Tool Video Tushar Dalviandroid-securityscasoftware-composition-analysis
2014-09-26TalkVirus Bulletin Evolution of Android exploits from a static analysis tools perspective Presentation Whitepaper Video Jagadeesh Chandraiahandroid-securitystatic-analysisvulnerability-management+2
2012-10-25TalkApp Sec Usa Cracking the Code of Mobile Application Video Sreenarayan Ashokkumarmobile-securityreverse-engineeringmobile-pentesting+3
2012-10-23TalkHacklu Buster: Android Security Buster Atul Alexandroid-securitymobile-securityreverse-engineering+1
2012-09-28TalkNullcon Attacking Angry Droids Aditya Gupta, Subho Halderandroid-securitymobile-securityreverse-engineering+2