Главная
Study mode:
on
1
Introduction
2
Outline
3
Key Words
4
Sample App
5
Secure Password wrapper
6
Secure Password helper
7
How far do I want to go
8
Dont touch me like that
9
Network Security
10
Android Keystore
11
How does this work
12
Keystore
13
Lock Screen Flow
14
Challenges
15
Remove Fingerprints
16
How do you use it
17
What is insecure hardware
18
How to generate a key
19
How to generate a private key
20
Steps
21
First Check
22
Fingerprints
23
Authentication callback
24
Authentication result
25
Previous slide
26
Exceptions
27
Key Management
28
Good and Bad
29
No Control
30
No Keystore
31
Big Integers
32
Secret Keys
33
The Story
34
The Secret Key
35
Storage
36
Summary
37
Round Keys
38
Bounce Call
39
Android Know How
Description:
Explore Android device security strategies in this 38-minute conference talk from the OWASP Netherlands Chapter Meeting. Delve into various approaches for safeguarding secrets within Android applications, covering topics from protecting authentication information to securing keys. Learn about secure password wrappers, network security, and the Android Keystore. Understand the challenges of fingerprint authentication, key generation, and management. Gain insights into secure key storage techniques, including the use of big integers and secret keys. Discover best practices for implementing robust security measures in Android app development, enhancing your ability to protect sensitive information on mobile devices.

How to Keep Your Secrets Safe - Alternatives to 'Just Don't' on an Android Device

Cooper
Add to list
0:00 / 0:00