Rooting SIM Cards
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the hidden vulnerabilities of SIM cards in this eye-opening Black Hat USA 2013 conference talk. Delve into the world of these ubiquitous computing platforms, with over 7 billion cards in active use, and challenge the long-held belief of their impenetrable security. Discover how SIM cards, beyond their primary function of subscriber identification, offer programmable Java runtimes that position them as potential trust anchors for smartphones, embedded devices, and cars. Uncover the implementation and configuration bugs that plague these seemingly unbreakable systems, shattering the myth of their invulnerability. Learn from security expert Karsten Nohl as he exposes the realities of SIM card security, providing crucial insights for professionals in the field of mobile and embedded device security.
Syllabus
Black Hat USA 2013 - Rooting SIM cards
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network