OWASP AppSec DC 2012/Mobile Application Security Who how and why

Revision as of 20:03, 11 March 2012 by Mark.bristow (talk | contribs)

Jump to: navigation, search


Registration Now OPEN! | Hotel | Schedule | Convention Center | AppSecDC.org

The Presentation

This will be a continuation and expansion of the Android Security talk and presentation from AppsecUSA in September 2011. It will include new material on the mobile threat-scape, new material on iOS and additional examples from real life mobile penetration tests conducted by SpiderLabs Application Security Services.
The talk start with a general review of the security landscape by Charles Henderson, with reference to our latest Global Security report and how it applies to the mobile application space. This will include who is doing the attacking and why. It will touch on the target rich environment in mobile applications as well the types of applications targeted
The talk will then move on to concrete examples of how and why mobile applications and platforms are susceptible to the kind hacking and attacking just presented.
Stating with an overview of iOS, the iPhone\iPad platform and they ways it is attacked will be presented, including why data is leaked and how developers can defend against it.
The presentation will then continue into explaining how Android is different - not better or worse, but merely different. Again, touching on how Android is attacked, how data is leaked and how developers can defend on this platform.
The talk will wrap up the talk by speculating about the future of mobile security and mobile application penetration testing.
Throughout the presentation, real-world (though, obviously, sanitized) examples from real penetration tests conducted over the past few years at SpiderLabs will be used as illustrations. Where appropriate, there will be demonstrations of some of points with live or recorded demos of the issues and techniques discussed.
As usual, there to be a lively discussion and tough questions following the talk.

The Speakers

Charles Henderson

Owasp logo normal.jpg

Mike Park

AppSecDC12-mike park.jpg
Mike Park is a Managing Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 12 years experience building and securing software for a variety of companies. Mike is a CISSP and specializes in application security assessment, penetration testing, reverse engineering and secure development life cycle. Mike is an active member of the Ottawa ISSA.

Gold Sponsors

Aspect logo owasp.jpg AppSecDC2009-Sponsor-securicon.gif AppSecDC2009-Sponsor-mandiant.gif AppSecDC2012-ISC2.gif

Silver Sponsors


Small Business

AppSecDC2012-Sponsor-sideas.gif BayShoreNetworks.png


link=http://www.codenomicon.com/ Codenomicon WhiteHat Logo.png AppSecDC2012-HP.jpg WSI - Logo.jpg