Switch branches/tags
Nothing to show
Find file History
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
..
Failed to load latest commit information.
README.md
mobile_eip-04-19-2012.pdf
mobile_eip_2.pdf
mobile_eip_3.pdf
mobile_eip_podcast.mp3

README.md

Mobile Exploit Intelligence Project

As organizations look to deploy larger numbers of mobile devices over this year, there is widespread disagreement in the security industry over which platforms are more secure, what mobile security measures are effective, and what the greatest risks of these platforms are. At the same time, the mobile malware community, while still in its infancy, is developing rapidly and several successful attacks have been executed against iOS and Android in the last year. Mike demonstrates in his talk an intelligence-driven approach to mobile defense, focused on attacker capabilities and methods, with data collected from past remote attacks and jailbreaks against Android and iOS. This analysis identifies the means by which exploits are developed and distributed in attacks, separates defenses that work from defenses that don't, and provides analytical tools that attendees can use to objectively evaluate the exploitability of mobile operating systems. This empirical data on attacker capabilities is used to make projections on where mobile malware is headed in the near to long term.

More info

Authors

  • Dan Guido
  • Mike Arpaia