Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Researching Android Device Security with the Help of a Droid Army

44CON Information Security Conference via YouTube

Overview

This course focuses on researching Android device security by utilizing a diverse cluster of Android devices, known as a Droid Army. The learning outcomes include understanding the challenges posed by Android device diversity, learning how to create a heterogeneous cluster of devices for research purposes, and gaining insights into vulnerability research and exploit development. The course teaches skills such as auditing devices, comparing similarities and differences between devices, and automating research tasks. The teaching method involves a presentation by the instructor, Joshua J. Drake, with demonstrations and examples. The intended audience for this course is security researchers, Android developers, and individuals interested in mobile device security.

Syllabus

Intro
Agenda
Who am I
Motivation for this talk
fragmentation
the end effect
demo
existing solutions
vulnerability research
Zeroday discovery
Buying devices
Android TV sticks
More Android devices
More devices
Disaster strikes
The Hub
The Hubs
Futureproofing
Root Hub
Hub Control
Wall warts
Bitcoin forums
Assembled cable
Scale issues
One month later
Back in the house
Tools
App Kudo
Busybox
Stock ROMs
Droid Army Demo
Auditing Tasks
Compare Devices
Final Demo
Other Tasks
Conclusion
Distractions
Further Automation

Taught by

44CON Information Security Conference

Reviews

Start your review of Researching Android Device Security with the Help of a Droid Army

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.