YoVDO

Rooting SIM Cards

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Mobile Development Courses Cybersecurity Courses

Course Description

Overview

Explore the hidden vulnerabilities of SIM cards in this eye-opening Black Hat USA 2013 conference talk. Delve into the world of these ubiquitous computing platforms, with over 7 billion cards in active use, and challenge the long-held belief of their impenetrable security. Discover how SIM cards, beyond their primary function of subscriber identification, offer programmable Java runtimes that position them as potential trust anchors for smartphones, embedded devices, and cars. Uncover the implementation and configuration bugs that plague these seemingly unbreakable systems, shattering the myth of their invulnerability. Learn from security expert Karsten Nohl as he exposes the realities of SIM card security, providing crucial insights for professionals in the field of mobile and embedded device security.

Syllabus

Black Hat USA 2013 - Rooting SIM cards


Taught by

Black Hat

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network