Description: As organizations adopt mobile computing devices to support their mission, the adversaries are beginning to change their tools, techniques, and procedures to take advantage of the evolving attack surface. This presentation will explore attack vectors for popular mobile computing devices such as Android, iOS, and RIM. We will explore malware examples culled from the real world and begin to understand how to dynamically and statically analyze the samples to extract intelligence. This presentation will demonstrate analytic tools and techniques to allow the Computer Network Defender to begin to tackle the emerging threat of mobile malware. In addition, topics will be covered including acquiring data, counter measures/mitigations, and network defense tools which can aid in defending the mobile threatscape.
Adam Meyers is the Director of Intelligence for CrowdStrike, in this role he oversees the team's daily activity, and provides direction and strategic vision for the company's intelligence collection, reverse engineering, and analysis efforts. He also serves as a senior security researcher, who focuses on reverse engineering targeted malware threats, mobile malware and related technologies. Previously he was the Director, Cyber Security Intelligence with the National Products and Offerings Division of SRA International. In that role Mr. Meyers served as a senior subject matter expert for cyber threat and cyber security matters for a variety of SRA projects. Mr. Meyers provided both technical expertise at the tactical level and strategic
guidance on overall security program objectives. Mr. Meyers also acted as the product manager for SRA Cyberlock, a dynamic malware analysis platform.
http://www.sourceconference.com/publications/bos12pubs/Meyers%20-%20Reserve%20Engineers%20Mobile%20Apps.pdf
Tags: securitytube , hacking , hackers , information security , convention , computer security , SOURCE-boston-2012 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.