Search






My Shopping Cart

[ 0 ] items in cart

View Cart | Checkout


Game Developer Research
bullet Research Reports

Gamasutra
bullet Contractor Listings

GDC Vault
bullet Individual Subscription

GDC Audio Recordings
bullet App Developers Conference 2013
bullet GDC Next 2013
bullet GDC Europe 2013
bullet GDC 2013
bullet GDC Online 2012
bullet GDC Europe 2012
bullet GDC 2012
bullet GDC 2011
bullet GDC 10
bullet GDC 09
bullet GDC Austin 08
bullet GDC Mobile 08
bullet GDC 08
bullet GDC Austin 07
bullet GDC Mobile 07
bullet GDC 07
bullet GDC 06
bullet GDC 05
bullet GDC 04
bullet GDC 03
bullet GDC 01
bullet GDC 2000 & Before


Newest Item(s)
bullet

Why Now Is the Best Time Ever to Be a Game Developer

Ingress: Design Principles Behind Google's Massively Multiplayer Geo Game

Playing with 'Game'

Gathering Your Party with Project Eternity (GDC Next 10)

D4: Dawn of the Dreaming Director's Drama (GDC Next 10)

Using Plot Devices to Create Gameplay in Storyteller (GDC Next 10)

How I Learned to Stop Worrying and Love Making CounterSpy (GDC Next 10)

Luck and Skill in Games

Minimalist Game Design for Mobile Devices

Broken Age: Rethinking a Classic Genre for the Modern Era (GDC Next 10)


Storefront > GDC Vault Store - Audio Recordings > ADC 2013


View larger image
 


QTY:

Smart Phone, Dumb Apps: How the Bad Guys View Your Mobile Applications
Price $3.95
Stock Unlimited
Status
Weight 0 lb, 0 oz
SKU ADC13-26868_JBNB
Statistics
Description
Smart Phone, Dumb Apps: How the Bad Guys View Your Mobile Applications
Dan Cornell | CTO, Denim Group

Location: 502 A
Date: Tuesday, November 05
Time: 2:00pm-3:00pm
Format: Session
Discipline: Programming & Architecture
Track: Enterprise Apps, Brand Marketing Apps
Vault Recording: Video


Companies are building increasingly sophisticated smartphone applications for platforms such as the Apple iPhone and Google Android. Many of these applications are constructed without fully considering the associated security implications of their deployment. Breaches can impact both app users as well as those distributing the application as attackers take advantage of expanded access to sensitive data and network services. In this talk Denim Group CTO, Dan Cornell, will discuss emerging threats associated with deploying smartphone apps. He will begin by looking at a threat model for a typical mobile application and then walking through an analysis of an example application from an attacker's perspective. He will show how to extract information from mobile applications and use that information to launch attacks against app users and app distribution companies.
Takeaway
Attendees of this talk will learn how attackers extract sensitive information from mobile apps, as well as how mobile applications and their supporting web services expose app developers and users to potential attacks. Attendees will discover proactive design and testing techniques that can help make mobile applications safer.

Please leave this field blank.

There are no related products to display.

Related Products...

Please leave this field blank.