Researching Android Device Security with the Help of a Droid Army

Researching Android Device Security with the Help of a Droid Army

44CON Information Security Conference via YouTube Direct link

Intro

1 of 38

1 of 38

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Researching Android Device Security with the Help of a Droid Army

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Agenda
  3. 3 Who am I
  4. 4 Motivation for this talk
  5. 5 fragmentation
  6. 6 the end effect
  7. 7 demo
  8. 8 existing solutions
  9. 9 vulnerability research
  10. 10 Zeroday discovery
  11. 11 Buying devices
  12. 12 Android TV sticks
  13. 13 More Android devices
  14. 14 More devices
  15. 15 Disaster strikes
  16. 16 The Hub
  17. 17 The Hubs
  18. 18 Futureproofing
  19. 19 Root Hub
  20. 20 Hub Control
  21. 21 Wall warts
  22. 22 Bitcoin forums
  23. 23 Assembled cable
  24. 24 Scale issues
  25. 25 One month later
  26. 26 Back in the house
  27. 27 Tools
  28. 28 App Kudo
  29. 29 Busybox
  30. 30 Stock ROMs
  31. 31 Droid Army Demo
  32. 32 Auditing Tasks
  33. 33 Compare Devices
  34. 34 Final Demo
  35. 35 Other Tasks
  36. 36 Conclusion
  37. 37 Distractions
  38. 38 Further Automation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.