Hunting Vulnerabilities of gRPC Protocol Armed Mobile - IoT Applications
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the security vulnerabilities in mobile and IoT applications using Google's gRPC protocol in this 33-minute Black Hat conference talk. Discover how the perceived reliability of this private protocol often leads developers to overlook crucial security verification mechanisms, resulting in numerous security flaws. Learn about the advantages of gRPC over traditional HTTPS, including improved speed, security, and usability. Gain insights from researchers Shijie Cao and Hao Zhao as they delve into the potential risks associated with gRPC implementation in applications supporting billions of daily network services. Access the full abstract and presentation materials to deepen your understanding of this critical cybersecurity topic.
Syllabus
Hunting Vulnerabilities of gRPC Protocol Armed Mobile/IoT Applications
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network