| 2025-08-07 | Talk | Blackhat |
Uncovering ‘NASty’ 5G Baseband Vulnerabilities through Dependency-Aware Fuzzing
| Kanika Gupta | reverse-engineeringfirmware-analysismobile-security+2 |
| 2025-08-06 | Tool demo | Blackhat |
MORF โ Mobile Reconnaissance Framework
| Amrudesh Balakrishnan, Abhishek Jm | mobile-securityapp-securitymobile-pentesting+4 |
| 2024-11-28 | Talk | Blackhat |
A Tale of Pwning 500+ Vehicle Anti-theft Devices
| Umair Nehri | mobile-securityvulnerability-assessmentiot-pentesting+1 |
| 2024-08-30 | Talk | Hitb Sec Conf |
Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles
| Ravi Rajput | web-securitypentestingexploitation+4 |
| 2024-06-27 | Talk | Troopers |
The Hidden Dangers Lurking in Your Pocket โ Pwning Apple Wallet ecosystem and its apps
| Priyank Nigam | mobile-securitypentestingapi-security+2 |
| 2023-08-07 | Talk | C0c0n |
Cellibrite Premium Mobile Forensic tool iPhone analysis
| Vaibhav Kumar | mobile-securitymobile-forensicsreverse-engineering+3 |
| 2023-08-07 | Talk | C0c0n |
Citizen Mobile Security: Responsibilities, Accountability, and Impacts
| Satyendra Verma | mobile-securitysecurity-awarenessrisk-management+1 |
| 2023-08-07 | Talk | C0c0n |
Uncovering the Hidden Dangers Lurking as Android Apps using ML Algos
| Nikhil Prabhakar | android-securitymobile-securityreverse-engineering+1 |
| 2022-09-24 | Talk | C0c0n |
Citizen Mobile Security (ICAMPS)
| Satyendra Verma | mobile-securityandroid-securityios-security+4 |
| 2022-09-23 | Talk | C0c0n |
Pwning Android Apps at Scale
| Sparsh Kulshrestha, Shashank Barthwal | android-securitymobile-securitymobile-pentesting+3 |
| 2022-08-11 | Talk | The Diana Initiative |
The Real Cost of Free: What you need to know before downloading a free app
| Ruchira Pokhriyal | mobile-securityapp-securityprivacy+3 |
| 2022-07-24 | Talk | May Contain Hackers |
No Permissions Needed!
| Aditi Bhatnagar | android-securitymobile-securityprivacy+3 |
| 2021-11-13 | Talk | C0c0n |
Case study - E-crime group targeting mobile users
| Rahul Sasi | mobile-securityincident-responsevulnerability-management |
| 2019-08-11 | Talk | Defcon |
Exploiting and Securing iOS Apps using OWASP iGoat
| Swaroop Yermalkar | mobile-securityios-securityapplication-pentesting+4 |
| 2019-08-08 | Talk | Defcon |
YOUR PHONE IS USING TOR AND LEAKING YOUR PII
| Milind Bhargava | mobile-securityprivacypentesting |
| 2018-06-27 | Talk | First |
Securing your in-ear fitness coach: Challenges in hardening next generation wearables
| Sumanth Naropanth, Sunil Kumar | mobile-securitysecure-developmentvulnerability-management+2 |
| 2018-03-13 | Talk | Troopers |
Securing your in-ear fitness coach: Challenges in hardening next generation wearables
| Sumanth Naropanth, Kavya Racharla | mobile-securitysecure-developmentvulnerability-management+2 |
| 2017-09-21 | Talk | App Sec Usa |
Androsia: A tool for securing in memory sensitive data
| Samit Anwer | android-securitymobile-securitystatic-analysis+1 |
| 2017-08-18 | Talk | C0c0n |
Case study: Security of Digital Wallet apps in India
| Ashwath Kumar, Sandesh Mysore Anand | mobile-securityapplication-securitymobile-pentesting |
| 2017-08-18 | Talk | C0c0n |
Mobile Banking (In)Security
| Sneha Rajguru | mobile-securityapplication-securitypurpleteam+2 |
| 2017-08-18 | Talk | C0c0n |
Threats with online gaming and issues with games like Pokemon
| Riyaz Walikar, Akash Mahajan | security-awarenessmobile-securityvulnerability-management+1 |
| 2016-11-06 | Talk | Ground Zero Summit |
Hacking The Droids
| Anto Joseph | android-securitymobile-securityreverse-engineering+3 |
| 2016-10-13 | Talk | App Sec Usa |
When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE
| Sumanth Naropanth, Kavya Racharla | mobile-securityvulnerability-managementreverse-engineering+1 |
| 2014-11-13 | Talk | Ground Zero Summit |
Detecting Fake Cell Phone Towers
| Vijay Mukhi | network-pentestingnetwork-forensicsmobile-security+2 |
| 2014-09-26 | Talk | Virus Bulletin |
Evolution of Android exploits from a static analysis tools perspective
| Jagadeesh Chandraiah | android-securitystatic-analysisvulnerability-management+2 |
| 2012-11-23 | Talk | Malcon |
Surprise paper!
| Atul Alex | malwarereverse-engineeringmobile-security |
| 2012-10-25 | Talk | App Sec Usa |
Cracking the Code of Mobile Application
| Sreenarayan Ashokkumar | mobile-securityreverse-engineeringmobile-pentesting+3 |
| 2012-10-23 | Talk | Hacklu |
Buster: Android Security Buster
| Atul Alex | android-securitymobile-securityreverse-engineering+1 |
| 2012-09-28 | Talk | Nullcon |
Attacking Angry Droids
| Aditya Gupta, Subho Halder | android-securitymobile-securityreverse-engineering+2 |
| 2011-08-03 | Talk | Blackhat |
Femtocells: A poisonous needle in the operator’s hay stack
| Ravishankar Borgaonkar | network-pentestingmobile-securityvulnerability-management |
| 2010-10-29 | Talk | T2 |
Hacking Femtocells
| Ravishankar Borgaonkar | mobile-securityreverse-engineeringvulnerability-management |