YoVDO

Hunting Vulnerabilities of gRPC Protocol Armed Mobile - IoT Applications

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses gRPC Courses Vulnerability Analysis Courses

Course Description

Overview

Explore the security vulnerabilities in mobile and IoT applications using Google's gRPC protocol in this 33-minute Black Hat conference talk. Discover how the perceived reliability of this private protocol often leads developers to overlook crucial security verification mechanisms, resulting in numerous security flaws. Learn about the advantages of gRPC over traditional HTTPS, including improved speed, security, and usability. Gain insights from researchers Shijie Cao and Hao Zhao as they delve into the potential risks associated with gRPC implementation in applications supporting billions of daily network services. Access the full abstract and presentation materials to deepen your understanding of this critical cybersecurity topic.

Syllabus

Hunting Vulnerabilities of gRPC Protocol Armed Mobile/IoT Applications


Taught by

Black Hat

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network