Android Security Vulnerabilities and Exploits
- Presentation speakers
One of the most exciting things to happen to a new Android device is to see it get rooted, liberated from manufacturer meddling, and to see the ROM devs go wild with it. Without root we have no recovery, no ROMs, and very limited development. On the flip side of this, the very exploits we often use to root our phones expose us and others to malicious activities such as spyware, bots, keyloggers and other forms of malware. JCase will discuss past vulnerabilities in applications and firmware, and how they are mitigated today. He will teach the audience about some of the tools and methods used in identifying vulnerabilities. After we have a nice understanding of the process, he will walk the audience through finding a vulnerability, and exploiting it. To end the presentation, we will publish and discuss a brand new root exploit for the LG Optimus series of phones.