Hunting Vulnerabilities of gRPC Protocol Armed Mobile - IoT Applications
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the security vulnerabilities in mobile and IoT applications using Google's gRPC protocol in this 33-minute Black Hat conference talk. Discover how the perceived reliability of this private protocol often leads developers to overlook crucial security verification mechanisms, resulting in numerous security flaws. Learn about the advantages of gRPC over traditional HTTPS, including improved speed, security, and usability. Gain insights from researchers Shijie Cao and Hao Zhao as they delve into the potential risks associated with gRPC implementation in applications supporting billions of daily network services. Access the full abstract and presentation materials to deepen your understanding of this critical cybersecurity topic.
Syllabus
Hunting Vulnerabilities of gRPC Protocol Armed Mobile/IoT Applications
Taught by
Black Hat
Related Courses
Разработка веб-сервисов на Golang, часть 2Moscow Institute of Physics and Technology via Coursera TensorFlow Serving with Docker for Model Deployment
Coursera Project Network via Coursera gRPC [Java] Master Class: Build Modern API & Micro services
Udemy The complete gRPC course 2020 [Golang + Java + Protobuf]
Udemy Provisioning and Managing Networks Using Common Automation Tools
Pluralsight