๐Ÿงช Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Mobile Security

31
Total Entries
33
Contributors

Top Contributors

Sumanth Naropanth(3) Atul Alex(2) Kavya Racharla(2) Ravishankar Borgaonkar(2) Satyendra Verma(2)

All Entries (31 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07TalkBlackhat Uncovering ‘NASty’ 5G Baseband Vulnerabilities through Dependency-Aware Fuzzing Kanika Guptareverse-engineeringfirmware-analysismobile-security+2
2025-08-06Tool demoBlackhat MORF โ€“ Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jmmobile-securityapp-securitymobile-pentesting+4
2024-11-28TalkBlackhat A Tale of Pwning 500+ Vehicle Anti-theft Devices Umair Nehrimobile-securityvulnerability-assessmentiot-pentesting+1
2024-08-30TalkHitb Sec Conf Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles Presentation Video Ravi Rajputweb-securitypentestingexploitation+4
2024-06-27TalkTroopers The Hidden Dangers Lurking in Your Pocket โ€“ Pwning Apple Wallet ecosystem and its apps Presentation Priyank Nigammobile-securitypentestingapi-security+2
2023-08-07TalkC0c0n Cellibrite Premium Mobile Forensic tool iPhone analysis Vaibhav Kumarmobile-securitymobile-forensicsreverse-engineering+3
2023-08-07TalkC0c0n Citizen Mobile Security: Responsibilities, Accountability, and Impacts Satyendra Vermamobile-securitysecurity-awarenessrisk-management+1
2023-08-07TalkC0c0n Uncovering the Hidden Dangers Lurking as Android Apps using ML Algos Video Nikhil Prabhakarandroid-securitymobile-securityreverse-engineering+1
2022-09-24TalkC0c0n Citizen Mobile Security (ICAMPS) Satyendra Vermamobile-securityandroid-securityios-security+4
2022-09-23TalkC0c0n Pwning Android Apps at Scale Sparsh Kulshrestha, Shashank Barthwalandroid-securitymobile-securitymobile-pentesting+3
2022-08-11TalkThe Diana Initiative The Real Cost of Free: What you need to know before downloading a free app Ruchira Pokhriyalmobile-securityapp-securityprivacy+3
2022-07-24TalkMay Contain Hackers No Permissions Needed! Aditi Bhatnagarandroid-securitymobile-securityprivacy+3
2021-11-13TalkC0c0n Case study - E-crime group targeting mobile users Rahul Sasimobile-securityincident-responsevulnerability-management
2019-08-11TalkDefcon Exploiting and Securing iOS Apps using OWASP iGoat Swaroop Yermalkarmobile-securityios-securityapplication-pentesting+4
2019-08-08TalkDefcon YOUR PHONE IS USING TOR AND LEAKING YOUR PII Presentation Milind Bhargavamobile-securityprivacypentesting
2018-06-27TalkFirst Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Sumanth Naropanth, Sunil Kumarmobile-securitysecure-developmentvulnerability-management+2
2018-03-13TalkTroopers Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Video Sumanth Naropanth, Kavya Racharlamobile-securitysecure-developmentvulnerability-management+2
2017-09-21TalkApp Sec Usa Androsia: A tool for securing in memory sensitive data Video Samit Anwerandroid-securitymobile-securitystatic-analysis+1
2017-08-18TalkC0c0n Case study: Security of Digital Wallet apps in India Ashwath Kumar, Sandesh Mysore Anandmobile-securityapplication-securitymobile-pentesting
2017-08-18TalkC0c0n Mobile Banking (In)Security Sneha Rajgurumobile-securityapplication-securitypurpleteam+2
2017-08-18TalkC0c0n Threats with online gaming and issues with games like Pokemon Riyaz Walikar, Akash Mahajansecurity-awarenessmobile-securityvulnerability-management+1
2016-11-06TalkGround Zero Summit Hacking The Droids Anto Josephandroid-securitymobile-securityreverse-engineering+3
2016-10-13TalkApp Sec Usa When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE Video Sumanth Naropanth, Kavya Racharlamobile-securityvulnerability-managementreverse-engineering+1
2014-11-13TalkGround Zero Summit Detecting Fake Cell Phone Towers Vijay Mukhinetwork-pentestingnetwork-forensicsmobile-security+2
2014-09-26TalkVirus Bulletin Evolution of Android exploits from a static analysis tools perspective Presentation Whitepaper Video Jagadeesh Chandraiahandroid-securitystatic-analysisvulnerability-management+2
2012-11-23TalkMalcon Surprise paper! Atul Alexmalwarereverse-engineeringmobile-security
2012-10-25TalkApp Sec Usa Cracking the Code of Mobile Application Video Sreenarayan Ashokkumarmobile-securityreverse-engineeringmobile-pentesting+3
2012-10-23TalkHacklu Buster: Android Security Buster Atul Alexandroid-securitymobile-securityreverse-engineering+1
2012-09-28TalkNullcon Attacking Angry Droids Aditya Gupta, Subho Halderandroid-securitymobile-securityreverse-engineering+2
2011-08-03TalkBlackhat Femtocells: A poisonous needle in the operator’s hay stack Presentation Whitepaper Video Ravishankar Borgaonkarnetwork-pentestingmobile-securityvulnerability-management
2010-10-29TalkT2 Hacking Femtocells Ravishankar Borgaonkarmobile-securityreverse-engineeringvulnerability-management