Главная
Study mode:
on
1
Introduction
2
Mobile Top Ten
3
Transport Layer Protection
4
Threat Model
5
Authorization Authentication
6
We know the weaknesses
7
Broken cryptography
8
Encoding
9
Encryption
10
Clientside
11
Data Validation
12
Input Validation
13
Know Your Services
14
Security Decisions Via untrusted and Inputs
15
Session Handling
16
Authentication State Changes
17
Use Industry Standards
18
Lack of Binary Protection
19
Preventing Reverse Engineering
20
Security Starts With You
21
Always Assume Insecurity
22
You Dont Be Yourself
23
Never Compromise Security
24
Example
25
Open Source
26
Permissions
27
Reputation
Description:
Explore the OWASP Mobile Top Ten security vulnerabilities and their significance in a comprehensive conference talk. Learn about critical mobile security issues, including transport layer protection, threat modeling, authorization, authentication, broken cryptography, and data validation. Discover best practices for preventing reverse engineering, implementing industry standards, and making secure decisions. Gain insights into the importance of assuming insecurity, maintaining vigilance, and never compromising on security. Examine real-world examples, open-source solutions, and the role of permissions and reputation in mobile app security.

OWASP Mobile Top Ten - Why They Matter and What We Can Do

Add to list
0:00 / 0:00