YoVDO

The Hidden RCE Surfaces That Control the Droids

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Remote Code Execution (RCE) Courses APIs Courses

Course Description

Overview

Explore the hidden Remote Code Execution (RCE) vulnerabilities in Android OS libraries that process incoming files through various APIs. Dive into how these libraries handle files from untrusted sources, including those sent via MMS, chat apps, emails, and web browsers. Learn about the potential security risks associated with processing these files in system applications like Gallery, Photos, and Settings. Presented by Qidan He and Juntao Wu, this 42-minute Black Hat conference talk uncovers critical security insights for Android developers and cybersecurity professionals.

Syllabus

The Hidden RCE Surfaces That Control the Droids


Taught by

Black Hat

Related Courses

Web Development
Udacity
Do-It-Yourself Geo Apps
Esri via Independent
Software Construction: Object-Oriented Design
The University of British Columbia via edX
Full-Text Search with SAP HANA Platform
SAP Learning
Tools for Data Science
IBM via Coursera