YoVDO

Dangerous Hare - Hanging Attribute References Hazards Due to Vendor Customization

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Operating System Security Courses Android Security Courses

Course Description

Overview

Explore the security implications of hanging attribute references (Hare) in customized Android systems during this Black Hat conference talk. Delve into how aggressive customization by hardware manufacturers, device makers, and carriers has led to a fragmented ecosystem with compromised component relationships. Discover how malicious apps can exploit these vulnerabilities to acquire critical system capabilities. Learn about the 21,557 likely Hare flaws found across 97 popular Android devices, including examples of stealing voice notes, controlling screen unlock processes, and injecting messages into popular apps. Gain insights into new techniques for automatically detecting Hare flaws and receive guidance on avoiding these pitfalls in future system development.

Syllabus

Dangerous Hare: Hanging Attribute References Hazards Due to Vendor Customization


Taught by

Black Hat

Related Courses

Introduction to Operating Systems
Indian Institute of Technology Madras via Swayam
Home Networking Basics
Cisco via Coursera
Cybersecurity Roles, Processes & Operating System Security
IBM via Coursera
Operating Systems and Security
IBM via edX
A Complete Cyber Security Guide For Beginners 2024
Udemy