Главная
Study mode:
on
1
How Your E-book Might Be Reading You: Exploiting EPUB Reading Systems
2
The e book ecosystem
3
Semi-automated black-box evaluation
4
JavaScript support Inline
5
Remote communication
6
Local file system access
7
Web engine evaluation
8
Results (3)
9
Case studies
10
Apple Books
11
EPUBReader: implementation
12
EPUBReader: exploit strategy
13
EPUBReader: putting the exploit together
14
Amazon Kindle: implementation
15
Amazon Kindle: exploitation (2)
16
Amazon Kindle: mitigation
17
Capability (ab)use in the wild
18
Feasibility of e-book distribution
19
Key takeaways
Description:
Explore the security vulnerabilities of EPUB reading systems in this 35-minute Black Hat conference talk. Delve into an analysis of 97 free EPUB reading applications across multiple platforms and e-readers using a semi-automated testbed. Discover how half of these applications fail to comply with EPUB security specifications, potentially compromising user privacy. Examine the e-book ecosystem, JavaScript support, remote communication capabilities, and local file system access. Learn about specific case studies involving Apple Books, EPUBReader, and Amazon Kindle, including implementation details, exploit strategies, and mitigation efforts. Gain insights into the feasibility of e-book distribution and the potential for capability abuse in the wild. Walk away with key takeaways on the security implications of e-book reading systems and their impact on user privacy.

How Your E-book Might Be Reading You - Exploiting EPUB Reading Systems

Black Hat
Add to list