Главная
Study mode:
on
1
Introduction
2
Agenda
3
Ping Pong Virus
4
Stuxnet
5
Pegasus
6
Xcode Ghost
7
Inspector
8
Google Play
9
Skype
10
Apps
11
Accessibility API
12
Accessibility Checking
13
Draw of Your Apps
14
Demo
15
Android
16
Droid 505
17
Dynamic Analysis
18
Bypassing Analysis
19
Static Analysis
20
Advantages of Static Analysis
21
Paint Analysis
22
Model Analysis
23
Model Analysis Problematic
24
Dynamic Code
25
Summary
26
Live Example
27
Limitations
28
Solutions
29
Recommendation
Description:
Explore cutting-edge mobile malware techniques and defense strategies in this 42-minute AppSecUSA 2016 conference talk. Delve into sophisticated attack methods used by hackers to bypass mobile security measures like app-sandboxing and containers. Analyze current malware identification techniques, including signatures, static analysis, and dynamic analysis, while understanding their strengths and weaknesses. Witness a live demonstration of mobile malware creation designed to evade detection by static and runtime analysis technologies. Learn from Yair Amit, CTO and Founder of Skycure, as he shares insights on regaining control and countering next-generation mobile threats. Gain valuable knowledge on topics such as Ping Pong Virus, Stuxnet, Pegasus, Xcode Ghost, accessibility API exploitation, and various analysis techniques to enhance your mobile security expertise.

The Ways Hackers Are Taking To Win The Mobile Malware Battle

OWASP Foundation
Add to list
0:00 / 0:00