Главная
Study mode:
on
1
Introduction
2
Outline
3
What makes mobile special
4
Why is that a problem
5
We need data on the device
6
We have to reconcile the two concepts
7
Theres no such thing as absolute security
8
Remote attackers
9
Coffee shop attacker
10
Casual thief
11
Targeted attacks
12
Casual thieves
13
Mobile data security
14
Mobile device encryption
15
iOS security features
16
How we implement encryption
17
Secure Enclave
18
iOS File Encryption
19
File System Key
20
Class Keys
21
iOS RS Keychain
22
Why We Need All These Different Classes
23
Data Needs To Be Accessible
24
Other Credentials
25
Touch ID
26
User Presence
27
Security Threats
28
Android Adoption
29
Why is this important
30
Device Encryption
31
Key Encryption Key
32
Lock Screen
33
Full Disk Encryption
34
Android Credential Storage
35
Boot Security
36
Odin Mode
37
Little Kernel
38
Laugh
39
Faux Disk Encryption
40
Making The Kernel
41
Testing The Bootloader
42
Drew Soapbox
43
App Container
44
Data On Device
45
Android
46
Outlook
47
Takeaways
48
References
Description:
Explore the complexities of secure data storage on mobile devices in this 44-minute Black Hat conference talk. Delve into the challenges faced by mobile app developers in securing locally cached data, debunk common misconceptions about full-disk encryption, and examine sophisticated secure storage techniques for iOS and Android. Learn about the technical operations of various security mechanisms, their practical implications, and potential vulnerabilities even when following best practices. Gain insights into reconciling security needs with mobility, accessibility, and usability requirements, and discover how to uncover secure storage flaws in real-world applications. Understand the significance of mobile device security in an era where mobile users outnumber desktop users, and explore solutions to address current shortcomings in secure storage on portable devices.

Faux Disk Encryption - Realities of Secure Storage on Mobile Devices

Black Hat
Add to list
0:00 / 0:00