YoVDO

Unwrapping the Truth - Analysis of Mobile Application Wrapping Solutions

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cryptography Courses Reverse Engineering Courses Vulnerability Assessment Courses Security Analysis Courses Android Security Courses iOS Security Courses

Course Description

Overview

Dive into a comprehensive analysis of Mobile Application Management (MAM) solutions in this 54-minute Black Hat conference talk by Ron Gutierrez and Stephen Komal. Explore the latest trends in BYOD (Bring Your Own Device) solutions, focusing on application wrapping techniques that enforce policies and enhance security at the application layer. Gain insights into the complex landscape of BYOD application wrapping products, their security claims, and their effectiveness against real-world mobile threats. Learn about the reverse engineering process for iOS and Android application wrapping solutions, examining their authentication methods, cryptographic implementations, interprocess communication (IPC), and client-side security controls. Discover security vulnerabilities uncovered in major vendor products and understand their potential impact on sensitive information. Equip yourself with valuable knowledge to make informed decisions about mobile application security in organizational settings.

Syllabus

Unwrapping the Truth: Analysis of Mobile Application Wrapping Solutions


Taught by

Black Hat

Related Courses

Requirements Specifications: Goals and Conflict Analysis
University of Colorado System via Coursera
Threat and Vulnerability Management for CompTIA CySA+
Pluralsight
Network Security Monitoring (NSM) with Security Onion
Pluralsight
Security Event Triage: Operationalizing Security Analysis
Pluralsight
Complete Guide to Elasticsearch
Udemy