File:20130305-sarantis.pdf

The goal of this presentation is to show typical exploitation scenarios of Android applications and how they can be used or manipulated to steal credentials and information from a user. The scenarios include installation of malicious programs, e.g. malicious keyboards, manipulations on the application to bypass security authentications, code injections inside an apk and phishing attacks targeting specific applications.