YoVDO

Dangerous Hare - Hanging Attribute References Hazards Due to Vendor Customization

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Operating System Security Courses Android Security Courses

Course Description

Overview

Explore the security implications of hanging attribute references (Hare) in customized Android systems during this Black Hat conference talk. Delve into how aggressive customization by hardware manufacturers, device makers, and carriers has led to a fragmented ecosystem with compromised component relationships. Discover how malicious apps can exploit these vulnerabilities to acquire critical system capabilities. Learn about the 21,557 likely Hare flaws found across 97 popular Android devices, including examples of stealing voice notes, controlling screen unlock processes, and injecting messages into popular apps. Gain insights into new techniques for automatically detecting Hare flaws and receive guidance on avoiding these pitfalls in future system development.

Syllabus

Dangerous Hare: Hanging Attribute References Hazards Due to Vendor Customization


Taught by

Black Hat

Related Courses

Ethical Hacking for Mobile Phones, Facebook & Social Media!
Udemy
Android Security: Effective Permission Handling
Pluralsight
Learning Mobile Device Security
LinkedIn Learning
Securing Android Apps
LinkedIn Learning
Ethical Hacking | Metasploit Tutorial | من الصفر للاحتراف
Udemy