SlideShare a Scribd company logo
1 of 52
FFRI,Inc.
1
Security in the IoT World:
Analyzing the Security of Mobile Apps for Automobiles
Naohide Waguri
FFRI, Inc.
waguri@ffri.jp
October 21, 2016
CODE BLUE 2016
FFRI,Inc.
Who am I?
• I previously worked as a network engineer.
(Software QA, Software Developer)
• My current job is investigating and researching automotive security.
• I talked about Windows 10 IoT Core
at CODE BLUE 2015.
• I build CAN transceivers and diagnostic tools as a hobby.
(to repair my cars… )
2
FFRI,Inc.
Internet of Things (IoT)
• Several years have passed since use of this term started.
• A wide variety of devices are now connected to the Internet.
• The growth rate is particularly high in sectors related to human life,
such as the automotive, industrial, and medical sectors.
3
総務省 平成27年度版 情報通信白書より抜粋
(出展) IHS Technology
FFRI,Inc.
Current State of Automotive Security
• There are two entry points for researching and investigating attacks
on automobiles.
4
Message injection to (CAN) buses
Exploiting vulnerabilities in systems (or devices) connected to the
Internet
FFRI,Inc.
Current State of Automotive Security
• There are two entry points for researching and investigating attacks
on automobiles.
5
Message injection to (CAN) buses
Exploiting vulnerabilities in systems (or devices) connected to the
Internet
We will talk about this entry point. But…
FFRI,Inc.
Current State of Automotive Security
• There are two entry points for researching and investigating attacks
on automobiles.
6
Message injection to (CAN) buses
Exploiting vulnerabilities in systems (or devices) connected
to the Internet
We will talk about this entry point. But…
First of all
FFRI,Inc.
Current State of Automotive Security
• There are two entry points for researching and investigating attacks
on automobiles.
7
Message injection to (CAN) buses
Abusing vulnerabilities in the systems (or devices) that
connected to the Internet
We will talk about this entry point… But,
We will talk A LITTLE about this entry point.
FFRI,Inc.
Current State of Automotive Security
• In most cases, the target of this entry point is a
diagnostic port.
• Now, diagnostic ports are also used for various
applications other than maintenance.
8
Message injection to (CAN) buses
For example, owners intentionally connect the OBD-II dongle to vehicles. They need to pay
attention before connecting a dongle to their vehicle because the security level of the
vehicle decreases if the device is vulnerable or malicious.
We recommend the use of devices from reliable manufactures and developers.
FFRI,Inc.
For example, owners intentionally connect the OBD-II dongle to vehicles. They need to pay
attention before connecting a dongle to their vehicle because the security level of the
vehicle decreases if the device is vulnerable or malicious.
We recommend the use of devices from reliable manufactures and developers.
Current State of Automotive Security
9
バス上に追加されたデバイスからのメッセージ(インジェクション)
I disassembled an OBD-II dongle sold at popular online shops and auctions.
I found that it was a FAKE because it was using a microcontroller
different from the item description…
Also, the Bluetooth PIN cannot be changed…
The threat classification can change from “Physical” to “Adjacent”
if a vulnerable or malicious dongle is connected.
ELM327
PIC18 
FFRI,Inc.
Current State of Automotive Security
• There are two entry points for researching and investigating attacks
on automobiles.
10
Message injection to (CAN) buses
Exploiting vulnerabilities in systems (or devices) connected to the
Internet
Here is the main subject!
FFRI,Inc.
Current State of Automotive Security
• The most famous case of a threat to a connected car…
11
Source: https://www.wired.com/wp-content/uploads/2015/07/150701_car_hackers_43-vscocam-photo-1.jpg
FFRI,Inc.
Current State of Automotive Security
• A recent case…
12
Source: http://keenlab.tencent.com/en/2016/09/19/Keen-Security-Lab-of-Tencent-Car-Hacking-Research-Remote-Attack-to-Tesla-Cars/
FFRI,Inc.
Current State of Automotive Security
13
2015
2016
Aug
Oct
Feb
Jun
Source: Samy Kamkar,
https://www.youtube.com/watch?v=3olXUbS-prU
Drive It Like You Hacked It: New Attacks And
Tools to Wirelessly Steal Cars, DEFCON 23
Source: Jianhao Liu, Jason Yan,
https://www.syscan360.org/en/archives/,
Car Hacking: Witness Theory to Scary and
Recover From Scare, SyScan360 2015
Source: Pen Test Partners LLP,
https://www.youtube.com/watch?v=NSioTiaX_-Q
Source: Troy Hunt,
https://www.youtube.com/watch?v=Nt33m7G_42Q
FFRI,Inc.
Motivation
• Vulnerabilities in systems where an "automobile is part of the IoT"
have been reported, one after another, from 2015 and beyond.
• These threats are not as serious as the “Jeep Hack” vulnerability, but…
・ Personal Information is stolen by attackers.
・ Vehicle position and travel history are stolen by attackers.
・ Doors are unlocked by attackers, allowing vandalism of cars.
These are threats to the (information) assets of the vehicle owner.
14
FFRI,Inc.
Vehicle
Motivation
15
Mobile
Apps
Web
Browser
ECU
Remote Service
Web
Server
DB
Machine Boundary
Internet Boundary
Internet Boundary
BlackBox
BlackBox
The system on the other side of the Internet boundary is basically a black box because each
OEM uses its own unique system.
Furthermore, we should not attempt penetration testing via a web browser because it could
be deemed a cyber-attack if attempted without permission.
FFRI,Inc.
Web
Browser
Vehicle
Motivation
16
Mobile
Apps
ECU
Remote Service
Web
Server
DB
Machine Boundary
Internet Boundary
Internet Boundary
Blackbox
BlackBox
This approach is possible but highly challenging.
I would need vehicles and subscriptions to remote control services in order to
analyze the communication between the vehicle and system.
(Also, we need to purchase the remote control service in most cases.)
FFRI,Inc.
Web
Browser
Vehicle
Motivation
17
Mobile
Apps
ECU
Remote Service
Web
Server
DB
Machine Boundary
Internet Boundary
Internet Boundary
BlackBox
BlackBox
Apps can be easily obtained.
(This is also true from the standpoint of the attacker.)
Among the entities that make up the service, this is likely to be the cause of a
vulnerability.
FFRI,Inc.
Investigation Target and Goal
18
Phase 0: Collect apps that integrate with the services provided by
each OEM.
Phase 1: Create a report on each app using AndroBugs.
FFRI,Inc.
• A system that helps find actual security
vulnerabilities in Android Apps.
• Open source and written in Python.
• A static analysis tool that consumes Android APK (no source code).
• Scan for “known common coding vulnerabilities”
• Designed for massive analysis and to efficiently finding bugs.
• You can easily extend new features or vulnerability vectors.
What is AndroBugs?
• AndroBugs is a vulnerability scanner for Android apps that was
presented at Black Hat EUROPE 2015 by Mr. Yu-Cheng Lin.
19
Source: https://www.blackhat.com/docs/eu-15/materials/eu-15-Lin-Androbugs-Framework-An-Android-Application-Security-Vulnerability-Scanner.pdf
FFRI,Inc.
Investigation Target and Goal
20
Phase 2: Analyze the analysis reports for each app.
Understand the security level of apps provided by OEMs and
consider necessary corrective measures.
Phase 0: Collect apps that integrate with the services provided by
each OEM.
Phase 1: Create a report for each app using AndroBugs.
FFRI,Inc.
Typical Risks in Mobile Apps
21
M1 – Improper
Platform Usage
M2 – Insecure Data
Storage
M3 – Insecure
Communication
M4 – Insecure
Authentication
M5 – Insufficient
Cryptography
M6 – Insecure
Authorization
M7 – Client Code
Quality
M8 – Code
Tampering
M9 – Reverse
Engineering
M10 – Extraneous
Functionality
Source: https://www.owasp.org/index.php/Mobile_Top_10_2016-Top_10
OWASP
Mobile Top 10 Risks
(2016 RC)
FFRI,Inc.
Vulnerabilities in Investigation Targets
22
M1 – Improper
Platform Usage
M2 – Insecure Data
Storage
M3 – Insecure
Communication
M4 – Insecure
Authentication
M5 – Insufficient
Cryptography
M6 – Insecure
Authorization
M7 – Client Code
Quality
M8 – Code
Tampering
M9 – Reverse
Engineering
M10 – Extraneous
Functionality
Source: https://www.owasp.org/index.php/Mobile_Top_10_2016-Top_10
OWASP
Mobile Top 10 Risks
(2016 RC)
FFRI,Inc.
Overview: M1 – Improper Platform Usage
23
M1 – Improper
Platform Usage
M2 – Insecure Data
Storage
M3 – Insecure
Communication
Platform security controls are improperly used,
such as the scope of public activities or fragment
activity handling.
Example:
The app will crash with a security exception if
fragment injection occurs because the activity class
that inherits from PreferenceActivity does not
override isValidFragment().
FFRI,Inc.
Platform security controls are improperly used, such
as the scope of public activities or fragment activity
handling.
Example:
The app will crash with a security exception if
fragment injection occurs because the activity class
that inherits from PreferenceActivity does not
override isValidFragment().
Overview: M1 – Improper Platform Usage
24
M1 – Improper
Platform Usage
M2 – Insecure Data
Storage
M3 – Insecure
Communication
Among the three vulnerability risks, this was
detected second-most by AndroBugs.
However, the results of our investigation did not
find any vulnerabilities.
FFRI,Inc.
Overview: M2 – Insecure Data Storage
25
M1 – Improper
Platform Usage
M2 – Insecure Data
Storage
M3 – Insecure
Communication
Sensitive data is handled insecurely by saving it to
external storage, outputting it to logs, etc.
Examples:
Outputting transmission data that contains
sensitive information to the debug log.
Using MODE_WORLD_READABLE/WRITABLE to
enable access from other apps when getting the
instance of SharedPreference.
FFRI,Inc.
Sensitive data is handled insecurely by saving it to
external storage, outputting it to logs, etc.
Examples:
Outputting transmission data that contains sensitive
information to the debug log.
Using MODE_WORLD_READABLE/WRITABLE to
enable access from other apps when getting the
instance of SharedPreference.
Overview: M2 – Insecure Data Storage
26
M1 – Improper
Platform Usage
M2 – Insecure Data
Storage
M3 – Insecure
Communication
Among the three vulnerability risks, this was the
least detected by AndroBugs.
And the results of our investigation did not find any
vulnerabilities.
FFRI,Inc.
Overview: M3 – Insecure Communication
27
M1 – Improper
Platform Usage
M2 – Insecure Data
Storage
M3 – Insecure
Communication
Man-in-the-middle (MITM) attacks are allowed
because SSL communication is implemented
incorrectly.
Many cases have been reported where verification
of the server certificate is skipped.
Examples:
Skip hostname verification.
Implement a custom (empty) trustmanager in order
to skip certificate validation.
FFRI,Inc.
Man-in-the-middle (MITM) attacks are allowed
because SSL communication is implemented
incorrectly.
Many cases have been reported where verification of
the server certificate is skipped.
Examples:
Skip hostname verification.
Implement a custom (empty) TrustManager in order
to skip certificate validation.
Overview: M3 – Insecure Communication
28
M1 – Improper
Platform Usage
M2 – Insecure Data
Storage
M3 – Insecure
Communication
Among the three of vulnerabilities risk, this
was the most detected by AndroBugs.
In addition, we confirmed actually vulnerable
apps.
FFRI,Inc.
Vulnerabilities Found?
YES!
But I cannot disclose the app name… 
29
It is an extremely common vulnerability
in the implementation of
SSL/TLS communication.
FFRI,Inc.
Example of Vulnerabilities Found
Case 1: HTTP communication that contains user information
• One activity loads an HTTP URL into WebView.
• The URL posts user information to the server in clear text.
• The other URLs on the same host use HTTPS.
So, this might be based on some policy, but…
30
FFRI,Inc.
31
Others are using HTTPS.
(All the same host)
But this is using HTTP…
Example of Vulnerabilities Found
Case 1: HTTP communication that contains user information
FFRI,Inc.
Example of Vulnerabilities Found
Case 2: Server certificate validation flaw
32
Sources: https://www.ipa.go.jp/about/press/20140919_1.html
http://www.kb.cert.org/vuls/id/582497
FFRI,Inc.
33
What kind of vulnerability is a server certificate
validation flaw?
And what kind of risk does it pose?
Example of Vulnerabilities Found
Case 2: Server certificate validation flaw
FFRI,Inc.
34
脆
弱
Install the vulnerable app
from Google Play or the App Store Legitimate server
Replace
certificate
The app will encrypt
communication with a fake
certificate if certificate is not
validated.
Decrypt
and
eavesdrop, manipulate Encrypted again using
valid certificate.
Malicious
Wi-Fi
router
The communication may contain
sensitive information because it is
assumed to be encrypted.
It could be sent to a fake URL in
order to steal further information.
Example of Vulnerabilities Found
Case 2: Server certificate validation flaw
FFRI,Inc.
• Hostname verification is skipped because
ALLOW_ALL_HOSTNAME_VERIFIER is used.
• Certificate verification is skipped because a custom (empty)
TrustManager is used.
• WebView displays the page even if it is malicious because of
SslErrorHandler.proceed() in certificate verification.
35
Example of Vulnerabilities Found
Case 2: Server certificate validation flaw
FFRI,Inc.
36
Example of Vulnerabilities Found
Case 2: Server certificate validation flaw
FFRI,Inc.
37
• This vulnerability poses the risk that the user ID and password are
intercepted when the user logs into the service using the app.
Example of Vulnerabilities Found
Case 2: Server certificate validation flaw
FFRI,Inc.
Summary of risks of the app in which vulnerabilities were
found
38
Theft of personal
information
(name, address, etc.)
Theft of vehicle
information
(GPS, etc.)
If the communication is intercepted when the user registersPossibility of
eavesdropping
(login or registration)
Account
hijacking
(spoofing)
Send any
message
(e.g., replay attack)
Uninvestigated
message
specification
Vehicle theft
Possibility of further
attacks and damage
(e.g., vandalism)
Vehicle control
hijacking
(unlock doors, etc.)
FFRI,Inc.
Corrective Measures and Considerations for
Vulnerable Apps
• Why did these vulnerabilities occur?
39
Debugging code in the release build
Sample code copy & pasted (some might say “appropriated”) from the
Internet
Bad specifications
(Lack of understanding of secure design and coding)
FFRI,Inc.
• There are various vulnerabilities and enabling factors in Android. We
will introduce implementation rules for HTTP/HTTPS communication
to prevent the vulnerability found in the app we investigated.
40
(出展)Androidアプリのセキュア設計・セキュアコーディングガイド 2016年9月1日版
http://www.jssec.org/dl/android_securecoding.pdf
Use HTTPS communication when sending sensitive information
Verify the safety of the received data if it uses HTTP communication
Implement appropriate exception handling for SSLException
(e.g., user notification)
Do not implement a custom TrustManager
Do not implement a custom HostnameVerifier
Corrective Measures and Considerations for
Vulnerable Apps
FFRI,Inc.
Use HTTPS communication when sending sensitive information
Verify the safety of the received data if it uses HTTP communication
Implement the appropriate exception handling to SSLExceptiopn
(For example, such as user notification)
Do not implement custom TrustManager
Do not implement custom HostnameVerifier
• There are various vulnerabilities and enabling factors in Android. We
will introduce implementation rules for HTTP/HTTPS communication
to prevent the vulnerability found in the app we investigated.
41
(出展)Androidアプリのセキュア設計・セキュアコーディングガイド 2016年9月1日版
http://www.jssec.org/dl/android_securecoding.pdf
What is sensitive information?
We need to understand the system and user
information that must be protected in advance.
Corrective Measures and Considerations for
Vulnerable Apps
FFRI,Inc.
Use the HTTPS communication if it contains sensitive information
Verify the safety of the received data if it uses HTTP communication
Implement the appropriate exception handling to SSLExceptiopn
(For example, such as user notification)
Do not implement custom TrustManager
Do not implement custom HostnameVerifier
• There are various vulnerabilities and enabling factors in Android. We
will introduce implementation rules for HTTP/HTTPS communication
to prevent the vulnerability found in the app we investigated.
42
(出展)Androidアプリのセキュア設計・セキュアコーディングガイド 2016年9月1日版
http://www.jssec.org/dl/android_securecoding.pdf
Vulnerable processing of incoming data may be
targeted by attackers.
We need to perform fuzz testing.
Corrective Measures and Considerations for
Vulnerable Apps
FFRI,Inc.
Use the HTTPS communication if it contains sensitive information
Verify the safety of the received data if it uses HTTP communication
Implement the appropriate exception handling for SSLException
(e.g., user notification)
Do not implement custom TrustManager
Do not implement custom HostnameVerifier
• There are various vulnerabilities and enabling factors in Android. We
will introduce implementation rules for HTTP/HTTPS communication
to prevent the vulnerability found in the app we investigated.
43
(出展)Androidアプリのセキュア設計・セキュアコーディングガイド 2016年9月1日版
http://www.jssec.org/dl/android_securecoding.pdf
Caused by
certificate error
Necessary to consider the
behavior for each feature
specification
Exception occurs if there is a certificate error
→ There may be an MITM attack in progress
Corrective Measures and Considerations for
Vulnerable Apps
FFRI,Inc.
Use HTTPS communication when sending sensitive information
Verify the safety of the received data if it uses HTTP communication
Implement the appropriate exception handling to SSLException
(e.g., user notification)
Do not implement a custom TrustManager
Do not implement a custom HostnameVerifier
• There are various vulnerabilities and enabling factors in Android. We
will introduce implementation rules for HTTP/HTTPS communication
to prevent the vulnerability found in the app we investigated.
44
(出展)Androidアプリのセキュア設計・セキュアコーディングガイド 2016年9月1日版
http://www.jssec.org/dl/android_securecoding.pdf
Use the private CA root certificate to validate the server
certificate if you are using a private certificate.
Do not do this to skip certificate validation even if you are
debugging.
Corrective Measures and Considerations for
Vulnerable Apps
FFRI,Inc.
45
・If you are going to develop an Android app…
・If you want to know other rules for Android apps…
・If you have not read these yet…
Android アプリのセキュア設計・セキュアコーディングガイド
(http://www.jssec.org/dl/android_securecoding.pdf)
Check it out and give it a try! (Sorry, this is Japanese only.)
FFRI,Inc.
Summary: Scan Reports
• Not all positive scan results are true vulnerabilities because
AndroBugs reports common vulnerabilities mechanically.
• AndroBugs detects many SSL security alerts because most risk
factors arise from apps using HTTP communication.
• We created a web-based custom scan report for each app by using
the reports output by AndroBugs.
46
FFRI,Inc.
Summary: Scan Reports
47
Scan report sample
We investigated
critical vulnerability risks
FFRI,Inc.
Summary: Scan Reports
48
App
Author
Remote Control
Feature
No. of
Critical
Vulnerabiltiy Risks
M1 – Improper
Platform Usage
M2 – Insecure
Data Storage
M3 – Insecure
Communication
A Yes 11 5 1 5
B No 5 3 1 1
C No 5 2 1 2
D No 5 2 1 2
E Yes 4 0 0 4
F Yes 4 1 1 2
G Yes 3 0 0 3
H Yes 2 1 0 1
I Partial 1 0 0 1
J Yes 1 0 0 1
K Partial 0 0 0 0
FFRI,Inc.
Summary: Possibility of Exploits in the Future
49
App Author Note
A
We confirmed there are exploitable vulnerabilities. There is a risk of MITM attacks.
Classes that inherit from PreferenceActivity do not implement isValidFragment().
The app might crash due to fragment injection if the class becomes a public activity.
B We could not find any exploitable vulnerabilities in this app.
C We could not find any exploitable vulnerabilities in this app.
D We could not find any exploitable vulnerabilities in this app.
Analysis will take a long time because the app was obfuscated.
E
We could not find any exploitable vulnerabilities in this app.
This app crashes as part of an activity because it does not support the new permission model starting from
Android M.
F We could not find any exploitable vulnerabilities in this app.
Analysis will take a long time because the app was obfuscated.
G We could not find any exploitable vulnerabilities in this app.
H We could not find any exploitable vulnerabilities in this app.
I We could not find any exploitable vulnerabilities in this app.
J We could not find any exploitable vulnerabilities in this app.
K We could not find any exploitable vulnerabilities in this app.
FFRI,Inc.
Conclusions
• Client-side vulnerabilities were confirmed in remote control services for
which other vulnerabilities have been reported recently.
• However, most of the apps did not have the above implementation errors.
• Most apps have been easy to analyze because they are not
obfuscated.
50
The results of this report apply to only Android apps.
Even if the client app is secure, if the server or vehicle is vulnerable, then
attackers will target those vulnerable points.
Services like remote control have the potential of being scaled to monitoring of
many vehicles at the same time for autonomous cars.
Therefore, we need to consider the security of the system as a whole, not only
the individual apps and vehicles.
FFRI,Inc.
Future Work
• Continue the analysis…
– We have not yet finished analyzing all of the vulnerability risks
detected by AndroBugs.
• This investigation did not cover all of the available apps.
– We also want to investigate other apps that were outside of the
scope of this investigation.
• Our investigation scope at this time was only Android apps.
– We also want to investigate server/vehicle-side applications if we
have a chance.
51
FFRI,Inc.
Thank you!
52

More Related Content

What's hot

What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?IBM Security
 
NDIA 2021 - solar winds overview and takeaways
NDIA 2021 - solar winds overview and takeawaysNDIA 2021 - solar winds overview and takeaways
NDIA 2021 - solar winds overview and takeawaysBryson Bort
 
Secure Android Apps- nVisium Security
Secure Android Apps- nVisium SecuritySecure Android Apps- nVisium Security
Secure Android Apps- nVisium SecurityJack Mannino
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent ThreatAmmar WK
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET Journal
 
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.ITCamp
 
Deepfake anyone, the ai synthetic media industry enters a dangerous phase
Deepfake anyone, the ai synthetic media industry enters a dangerous phaseDeepfake anyone, the ai synthetic media industry enters a dangerous phase
Deepfake anyone, the ai synthetic media industry enters a dangerous phaseaditi agarwal
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security TestingMarco Morana
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsEric Vétillard
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Advanced monitoring
 
Implementing a comprehensive application security progaram - Tawfiq
Implementing a comprehensive application security progaram - Tawfiq Implementing a comprehensive application security progaram - Tawfiq
Implementing a comprehensive application security progaram - Tawfiq OWASP-Qatar Chapter
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsBen Rothke
 
We explain the security flaw that's freaking out the internet
We explain the security flaw that's freaking out the internetWe explain the security flaw that's freaking out the internet
We explain the security flaw that's freaking out the internetaditi agarwal
 
Tony Hodgson (Brainwaive LLC): Enterprise AR Cyber Security – Breaking Down B...
Tony Hodgson (Brainwaive LLC): Enterprise AR Cyber Security – Breaking Down B...Tony Hodgson (Brainwaive LLC): Enterprise AR Cyber Security – Breaking Down B...
Tony Hodgson (Brainwaive LLC): Enterprise AR Cyber Security – Breaking Down B...AugmentedWorldExpo
 
G01.2012 magic quadrant for endpoint protection
G01.2012 magic quadrant for endpoint protectionG01.2012 magic quadrant for endpoint protection
G01.2012 magic quadrant for endpoint protectionSatya Harish
 
Isaca conference threat_modeling_marco_morana_short.pdf
Isaca conference threat_modeling_marco_morana_short.pdfIsaca conference threat_modeling_marco_morana_short.pdf
Isaca conference threat_modeling_marco_morana_short.pdfMarco Morana
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Mykhailo Antonishyn
 
iViZ Security : On Demand Penetration Testing
iViZ Security : On Demand Penetration TestingiViZ Security : On Demand Penetration Testing
iViZ Security : On Demand Penetration TestingiViZ Techno Solutions
 
Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1Marco Morana
 

What's hot (20)

What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?
 
NDIA 2021 - solar winds overview and takeaways
NDIA 2021 - solar winds overview and takeawaysNDIA 2021 - solar winds overview and takeaways
NDIA 2021 - solar winds overview and takeaways
 
Secure Android Apps- nVisium Security
Secure Android Apps- nVisium SecuritySecure Android Apps- nVisium Security
Secure Android Apps- nVisium Security
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent Threat
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
 
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
 
Deepfake anyone, the ai synthetic media industry enters a dangerous phase
Deepfake anyone, the ai synthetic media industry enters a dangerous phaseDeepfake anyone, the ai synthetic media industry enters a dangerous phase
Deepfake anyone, the ai synthetic media industry enters a dangerous phase
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
 
Implementing a comprehensive application security progaram - Tawfiq
Implementing a comprehensive application security progaram - Tawfiq Implementing a comprehensive application security progaram - Tawfiq
Implementing a comprehensive application security progaram - Tawfiq
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
 
We explain the security flaw that's freaking out the internet
We explain the security flaw that's freaking out the internetWe explain the security flaw that's freaking out the internet
We explain the security flaw that's freaking out the internet
 
Tony Hodgson (Brainwaive LLC): Enterprise AR Cyber Security – Breaking Down B...
Tony Hodgson (Brainwaive LLC): Enterprise AR Cyber Security – Breaking Down B...Tony Hodgson (Brainwaive LLC): Enterprise AR Cyber Security – Breaking Down B...
Tony Hodgson (Brainwaive LLC): Enterprise AR Cyber Security – Breaking Down B...
 
Three trends in cybersecurity
Three trends in cybersecurityThree trends in cybersecurity
Three trends in cybersecurity
 
G01.2012 magic quadrant for endpoint protection
G01.2012 magic quadrant for endpoint protectionG01.2012 magic quadrant for endpoint protection
G01.2012 magic quadrant for endpoint protection
 
Isaca conference threat_modeling_marco_morana_short.pdf
Isaca conference threat_modeling_marco_morana_short.pdfIsaca conference threat_modeling_marco_morana_short.pdf
Isaca conference threat_modeling_marco_morana_short.pdf
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.
 
iViZ Security : On Demand Penetration Testing
iViZ Security : On Demand Penetration TestingiViZ Security : On Demand Penetration Testing
iViZ Security : On Demand Penetration Testing
 
Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1
 

Viewers also liked

[CB16] Who put the backdoor in my modem? by Ewerson Guimaraes
[CB16] Who put the backdoor in my modem? by Ewerson Guimaraes[CB16] Who put the backdoor in my modem? by Ewerson Guimaraes
[CB16] Who put the backdoor in my modem? by Ewerson GuimaraesCODE BLUE
 
[CB16] (P)FACE :アップルのコアへ、そしてルート権限へのエクスプロイト by Moony Li & Jack Tang
[CB16] (P)FACE :アップルのコアへ、そしてルート権限へのエクスプロイト by Moony Li & Jack Tang[CB16] (P)FACE :アップルのコアへ、そしてルート権限へのエクスプロイト by Moony Li & Jack Tang
[CB16] (P)FACE :アップルのコアへ、そしてルート権限へのエクスプロイト by Moony Li & Jack TangCODE BLUE
 
[CB16] WireGuard: Next Generation Abuse-Resistant Kernel Network Tunnel by Ja...
[CB16] WireGuard: Next Generation Abuse-Resistant Kernel Network Tunnel by Ja...[CB16] WireGuard: Next Generation Abuse-Resistant Kernel Network Tunnel by Ja...
[CB16] WireGuard: Next Generation Abuse-Resistant Kernel Network Tunnel by Ja...CODE BLUE
 
[CB16] 難解なウェブアプリケーションの脆弱性 by Andrés Riancho
[CB16] 難解なウェブアプリケーションの脆弱性 by Andrés Riancho[CB16] 難解なウェブアプリケーションの脆弱性 by Andrés Riancho
[CB16] 難解なウェブアプリケーションの脆弱性 by Andrés RianchoCODE BLUE
 
[CB16] 私のモデムに誰がバックドアを仕掛けたのか? by Ewerson Guimaraes
[CB16] 私のモデムに誰がバックドアを仕掛けたのか? by Ewerson Guimaraes[CB16] 私のモデムに誰がバックドアを仕掛けたのか? by Ewerson Guimaraes
[CB16] 私のモデムに誰がバックドアを仕掛けたのか? by Ewerson GuimaraesCODE BLUE
 
[CB16] Keynote: How much security is too much? by Karsten Nohl
[CB16] Keynote: How much security is too much? by Karsten Nohl[CB16] Keynote: How much security is too much? by Karsten Nohl
[CB16] Keynote: How much security is too much? by Karsten NohlCODE BLUE
 
[CB16] 基調講演: セキュリティはどれくらいが適量? – How much security is too much? – by Karsten Nohl
[CB16] 基調講演: セキュリティはどれくらいが適量? – How much security is too much? – by Karsten Nohl[CB16] 基調講演: セキュリティはどれくらいが適量? – How much security is too much? – by Karsten Nohl
[CB16] 基調講演: セキュリティはどれくらいが適量? – How much security is too much? – by Karsten NohlCODE BLUE
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...CODE BLUE
 

Viewers also liked (8)

[CB16] Who put the backdoor in my modem? by Ewerson Guimaraes
[CB16] Who put the backdoor in my modem? by Ewerson Guimaraes[CB16] Who put the backdoor in my modem? by Ewerson Guimaraes
[CB16] Who put the backdoor in my modem? by Ewerson Guimaraes
 
[CB16] (P)FACE :アップルのコアへ、そしてルート権限へのエクスプロイト by Moony Li & Jack Tang
[CB16] (P)FACE :アップルのコアへ、そしてルート権限へのエクスプロイト by Moony Li & Jack Tang[CB16] (P)FACE :アップルのコアへ、そしてルート権限へのエクスプロイト by Moony Li & Jack Tang
[CB16] (P)FACE :アップルのコアへ、そしてルート権限へのエクスプロイト by Moony Li & Jack Tang
 
[CB16] WireGuard: Next Generation Abuse-Resistant Kernel Network Tunnel by Ja...
[CB16] WireGuard: Next Generation Abuse-Resistant Kernel Network Tunnel by Ja...[CB16] WireGuard: Next Generation Abuse-Resistant Kernel Network Tunnel by Ja...
[CB16] WireGuard: Next Generation Abuse-Resistant Kernel Network Tunnel by Ja...
 
[CB16] 難解なウェブアプリケーションの脆弱性 by Andrés Riancho
[CB16] 難解なウェブアプリケーションの脆弱性 by Andrés Riancho[CB16] 難解なウェブアプリケーションの脆弱性 by Andrés Riancho
[CB16] 難解なウェブアプリケーションの脆弱性 by Andrés Riancho
 
[CB16] 私のモデムに誰がバックドアを仕掛けたのか? by Ewerson Guimaraes
[CB16] 私のモデムに誰がバックドアを仕掛けたのか? by Ewerson Guimaraes[CB16] 私のモデムに誰がバックドアを仕掛けたのか? by Ewerson Guimaraes
[CB16] 私のモデムに誰がバックドアを仕掛けたのか? by Ewerson Guimaraes
 
[CB16] Keynote: How much security is too much? by Karsten Nohl
[CB16] Keynote: How much security is too much? by Karsten Nohl[CB16] Keynote: How much security is too much? by Karsten Nohl
[CB16] Keynote: How much security is too much? by Karsten Nohl
 
[CB16] 基調講演: セキュリティはどれくらいが適量? – How much security is too much? – by Karsten Nohl
[CB16] 基調講演: セキュリティはどれくらいが適量? – How much security is too much? – by Karsten Nohl[CB16] 基調講演: セキュリティはどれくらいが適量? – How much security is too much? – by Karsten Nohl
[CB16] 基調講演: セキュリティはどれくらいが適量? – How much security is too much? – by Karsten Nohl
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
 

Similar to [CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri

Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)FFRI, Inc.
 
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security:  IBM HorizonWatch 2016 Trend BriefInternet of Things Security:  IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend BriefBill Chamberlin
 
Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...
Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...
Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...Black Duck by Synopsys
 
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)FFRI, Inc.
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Black Duck by Synopsys
 
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...FFRI, Inc.
 
Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsAlan Kan
 
apidays LIVE New York 2021 - Playing with FHIR without getting burned by Dav...
apidays LIVE New York 2021 - Playing with FHIR without getting burned by  Dav...apidays LIVE New York 2021 - Playing with FHIR without getting burned by  Dav...
apidays LIVE New York 2021 - Playing with FHIR without getting burned by Dav...apidays
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecuritySubho Halder
 
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...apidays
 
Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2FitCEO, Inc. (FCI)
 
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Black Duck by Synopsys
 
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET Journal
 
Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyserTim Youm
 
20181116.smart can cable_v2
20181116.smart can cable_v220181116.smart can cable_v2
20181116.smart can cable_v2Mocke Tech
 
Current state of automotive network security
Current state of automotive network securityCurrent state of automotive network security
Current state of automotive network securityFFRI, Inc.
 
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)FFRI, Inc.
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35Felipe Prado
 
TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網Amazon Web Services
 

Similar to [CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri (20)

Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
 
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security:  IBM HorizonWatch 2016 Trend BriefInternet of Things Security:  IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
 
Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...
Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...
Open Source Insight: Auto Security & Hackers, Killer Robots, & Containers Gon...
 
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
 
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
 
Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging Threats
 
apidays LIVE New York 2021 - Playing with FHIR without getting burned by Dav...
apidays LIVE New York 2021 - Playing with FHIR without getting burned by  Dav...apidays LIVE New York 2021 - Playing with FHIR without getting burned by  Dav...
apidays LIVE New York 2021 - Playing with FHIR without getting burned by Dav...
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
 
Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2
 
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
 
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...
 
Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyser
 
20181116.smart can cable_v2
20181116.smart can cable_v220181116.smart can cable_v2
20181116.smart can cable_v2
 
Current state of automotive network security
Current state of automotive network securityCurrent state of automotive network security
Current state of automotive network security
 
Irjet v7 i3811
Irjet v7 i3811Irjet v7 i3811
Irjet v7 i3811
 
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
 
TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網
 

More from CODE BLUE

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...CODE BLUE
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten NohlCODE BLUE
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo PupilloCODE BLUE
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫CODE BLUE
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...CODE BLUE
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka CODE BLUE
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...CODE BLUE
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...CODE BLUE
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...CODE BLUE
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...CODE BLUE
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也CODE BLUE
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...CODE BLUE
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...CODE BLUE
 

More from CODE BLUE (20)

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
 

Recently uploaded

Top Rated Call Girls South Mumbai : 9920725232 We offer Beautiful and sexy Ca...
Top Rated Call Girls South Mumbai : 9920725232 We offer Beautiful and sexy Ca...Top Rated Call Girls South Mumbai : 9920725232 We offer Beautiful and sexy Ca...
Top Rated Call Girls South Mumbai : 9920725232 We offer Beautiful and sexy Ca...amitlee9823
 
BOOK FARIDABAD CALL GIRL(VIP Sunny Leone) @8168257667 BOOK 24/7
BOOK FARIDABAD CALL GIRL(VIP Sunny Leone) @8168257667 BOOK  24/7BOOK FARIDABAD CALL GIRL(VIP Sunny Leone) @8168257667 BOOK  24/7
BOOK FARIDABAD CALL GIRL(VIP Sunny Leone) @8168257667 BOOK 24/7Hyderabad Escorts Agency
 
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verifiedConnaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
➥🔝 7737669865 🔝▻ pathankot Call-girls in Women Seeking Men 🔝pathankot🔝 Esc...
➥🔝 7737669865 🔝▻ pathankot Call-girls in Women Seeking Men  🔝pathankot🔝   Esc...➥🔝 7737669865 🔝▻ pathankot Call-girls in Women Seeking Men  🔝pathankot🔝   Esc...
➥🔝 7737669865 🔝▻ pathankot Call-girls in Women Seeking Men 🔝pathankot🔝 Esc...nirzagarg
 
8377087607, Door Step Call Girls In Majnu Ka Tilla (Delhi) 24/7 Available
8377087607, Door Step Call Girls In Majnu Ka Tilla (Delhi) 24/7 Available8377087607, Door Step Call Girls In Majnu Ka Tilla (Delhi) 24/7 Available
8377087607, Door Step Call Girls In Majnu Ka Tilla (Delhi) 24/7 Availabledollysharma2066
 
Call Girls Hongasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Hongasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Hongasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Hongasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 
Escorts Service Rajajinagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Rajajinagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Rajajinagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Rajajinagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 
Sanjay Nagar Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalor...
Sanjay Nagar Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalor...Sanjay Nagar Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalor...
Sanjay Nagar Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalor...amitlee9823
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN ABUDHABI,DUBAI MA...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN ABUDHABI,DUBAI MA...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN ABUDHABI,DUBAI MA...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN ABUDHABI,DUBAI MA...Health
 
+97470301568>>buy vape oil,thc oil weed,hash and cannabis oil in qatar doha}}
+97470301568>>buy vape oil,thc oil weed,hash and cannabis oil in qatar doha}}+97470301568>>buy vape oil,thc oil weed,hash and cannabis oil in qatar doha}}
+97470301568>>buy vape oil,thc oil weed,hash and cannabis oil in qatar doha}}Health
 
Lecture-20 Kleene’s Theorem-1.pptx best for understanding the automata
Lecture-20 Kleene’s Theorem-1.pptx best for understanding the automataLecture-20 Kleene’s Theorem-1.pptx best for understanding the automata
Lecture-20 Kleene’s Theorem-1.pptx best for understanding the automataHUSNAINAHMAD39
 
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...Delhi Call girls
 
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...Delhi Call girls
 
What Does The Engine Malfunction Reduced Power Message Mean For Your BMW X5
What Does The Engine Malfunction Reduced Power Message Mean For Your BMW X5What Does The Engine Malfunction Reduced Power Message Mean For Your BMW X5
What Does The Engine Malfunction Reduced Power Message Mean For Your BMW X5Bavarian Workshop
 
➥🔝 7737669865 🔝▻ Asansol Call-girls in Women Seeking Men 🔝Asansol🔝 Escorts...
➥🔝 7737669865 🔝▻ Asansol Call-girls in Women Seeking Men  🔝Asansol🔝   Escorts...➥🔝 7737669865 🔝▻ Asansol Call-girls in Women Seeking Men  🔝Asansol🔝   Escorts...
➥🔝 7737669865 🔝▻ Asansol Call-girls in Women Seeking Men 🔝Asansol🔝 Escorts...amitlee9823
 
Why Does My Porsche Cayenne's Exhaust Sound So Loud
Why Does My Porsche Cayenne's Exhaust Sound So LoudWhy Does My Porsche Cayenne's Exhaust Sound So Loud
Why Does My Porsche Cayenne's Exhaust Sound So LoudRoyalty Auto Service
 
Call Girls Kadugodi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Kadugodi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Kadugodi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Kadugodi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Madiwala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
Madiwala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...Madiwala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
Madiwala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...amitlee9823
 

Recently uploaded (20)

Top Rated Call Girls South Mumbai : 9920725232 We offer Beautiful and sexy Ca...
Top Rated Call Girls South Mumbai : 9920725232 We offer Beautiful and sexy Ca...Top Rated Call Girls South Mumbai : 9920725232 We offer Beautiful and sexy Ca...
Top Rated Call Girls South Mumbai : 9920725232 We offer Beautiful and sexy Ca...
 
BOOK FARIDABAD CALL GIRL(VIP Sunny Leone) @8168257667 BOOK 24/7
BOOK FARIDABAD CALL GIRL(VIP Sunny Leone) @8168257667 BOOK  24/7BOOK FARIDABAD CALL GIRL(VIP Sunny Leone) @8168257667 BOOK  24/7
BOOK FARIDABAD CALL GIRL(VIP Sunny Leone) @8168257667 BOOK 24/7
 
Stay Cool and Compliant: Know Your Window Tint Laws Before You Tint
Stay Cool and Compliant: Know Your Window Tint Laws Before You TintStay Cool and Compliant: Know Your Window Tint Laws Before You Tint
Stay Cool and Compliant: Know Your Window Tint Laws Before You Tint
 
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verifiedConnaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
 
(INDIRA) Call Girl Surat Call Now 8250077686 Surat Escorts 24x7
(INDIRA) Call Girl Surat Call Now 8250077686 Surat Escorts 24x7(INDIRA) Call Girl Surat Call Now 8250077686 Surat Escorts 24x7
(INDIRA) Call Girl Surat Call Now 8250077686 Surat Escorts 24x7
 
➥🔝 7737669865 🔝▻ pathankot Call-girls in Women Seeking Men 🔝pathankot🔝 Esc...
➥🔝 7737669865 🔝▻ pathankot Call-girls in Women Seeking Men  🔝pathankot🔝   Esc...➥🔝 7737669865 🔝▻ pathankot Call-girls in Women Seeking Men  🔝pathankot🔝   Esc...
➥🔝 7737669865 🔝▻ pathankot Call-girls in Women Seeking Men 🔝pathankot🔝 Esc...
 
8377087607, Door Step Call Girls In Majnu Ka Tilla (Delhi) 24/7 Available
8377087607, Door Step Call Girls In Majnu Ka Tilla (Delhi) 24/7 Available8377087607, Door Step Call Girls In Majnu Ka Tilla (Delhi) 24/7 Available
8377087607, Door Step Call Girls In Majnu Ka Tilla (Delhi) 24/7 Available
 
Call Girls Hongasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Hongasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Hongasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Hongasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Escorts Service Rajajinagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Rajajinagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Rajajinagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Rajajinagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
Sanjay Nagar Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalor...
Sanjay Nagar Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalor...Sanjay Nagar Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalor...
Sanjay Nagar Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalor...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN ABUDHABI,DUBAI MA...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN ABUDHABI,DUBAI MA...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN ABUDHABI,DUBAI MA...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN ABUDHABI,DUBAI MA...
 
+97470301568>>buy vape oil,thc oil weed,hash and cannabis oil in qatar doha}}
+97470301568>>buy vape oil,thc oil weed,hash and cannabis oil in qatar doha}}+97470301568>>buy vape oil,thc oil weed,hash and cannabis oil in qatar doha}}
+97470301568>>buy vape oil,thc oil weed,hash and cannabis oil in qatar doha}}
 
Lecture-20 Kleene’s Theorem-1.pptx best for understanding the automata
Lecture-20 Kleene’s Theorem-1.pptx best for understanding the automataLecture-20 Kleene’s Theorem-1.pptx best for understanding the automata
Lecture-20 Kleene’s Theorem-1.pptx best for understanding the automata
 
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
 
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
 
What Does The Engine Malfunction Reduced Power Message Mean For Your BMW X5
What Does The Engine Malfunction Reduced Power Message Mean For Your BMW X5What Does The Engine Malfunction Reduced Power Message Mean For Your BMW X5
What Does The Engine Malfunction Reduced Power Message Mean For Your BMW X5
 
➥🔝 7737669865 🔝▻ Asansol Call-girls in Women Seeking Men 🔝Asansol🔝 Escorts...
➥🔝 7737669865 🔝▻ Asansol Call-girls in Women Seeking Men  🔝Asansol🔝   Escorts...➥🔝 7737669865 🔝▻ Asansol Call-girls in Women Seeking Men  🔝Asansol🔝   Escorts...
➥🔝 7737669865 🔝▻ Asansol Call-girls in Women Seeking Men 🔝Asansol🔝 Escorts...
 
Why Does My Porsche Cayenne's Exhaust Sound So Loud
Why Does My Porsche Cayenne's Exhaust Sound So LoudWhy Does My Porsche Cayenne's Exhaust Sound So Loud
Why Does My Porsche Cayenne's Exhaust Sound So Loud
 
Call Girls Kadugodi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Kadugodi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Kadugodi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Kadugodi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Madiwala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
Madiwala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...Madiwala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
Madiwala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
 

[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri

  • 1. FFRI,Inc. 1 Security in the IoT World: Analyzing the Security of Mobile Apps for Automobiles Naohide Waguri FFRI, Inc. waguri@ffri.jp October 21, 2016 CODE BLUE 2016
  • 2. FFRI,Inc. Who am I? • I previously worked as a network engineer. (Software QA, Software Developer) • My current job is investigating and researching automotive security. • I talked about Windows 10 IoT Core at CODE BLUE 2015. • I build CAN transceivers and diagnostic tools as a hobby. (to repair my cars… ) 2
  • 3. FFRI,Inc. Internet of Things (IoT) • Several years have passed since use of this term started. • A wide variety of devices are now connected to the Internet. • The growth rate is particularly high in sectors related to human life, such as the automotive, industrial, and medical sectors. 3 総務省 平成27年度版 情報通信白書より抜粋 (出展) IHS Technology
  • 4. FFRI,Inc. Current State of Automotive Security • There are two entry points for researching and investigating attacks on automobiles. 4 Message injection to (CAN) buses Exploiting vulnerabilities in systems (or devices) connected to the Internet
  • 5. FFRI,Inc. Current State of Automotive Security • There are two entry points for researching and investigating attacks on automobiles. 5 Message injection to (CAN) buses Exploiting vulnerabilities in systems (or devices) connected to the Internet We will talk about this entry point. But…
  • 6. FFRI,Inc. Current State of Automotive Security • There are two entry points for researching and investigating attacks on automobiles. 6 Message injection to (CAN) buses Exploiting vulnerabilities in systems (or devices) connected to the Internet We will talk about this entry point. But… First of all
  • 7. FFRI,Inc. Current State of Automotive Security • There are two entry points for researching and investigating attacks on automobiles. 7 Message injection to (CAN) buses Abusing vulnerabilities in the systems (or devices) that connected to the Internet We will talk about this entry point… But, We will talk A LITTLE about this entry point.
  • 8. FFRI,Inc. Current State of Automotive Security • In most cases, the target of this entry point is a diagnostic port. • Now, diagnostic ports are also used for various applications other than maintenance. 8 Message injection to (CAN) buses For example, owners intentionally connect the OBD-II dongle to vehicles. They need to pay attention before connecting a dongle to their vehicle because the security level of the vehicle decreases if the device is vulnerable or malicious. We recommend the use of devices from reliable manufactures and developers.
  • 9. FFRI,Inc. For example, owners intentionally connect the OBD-II dongle to vehicles. They need to pay attention before connecting a dongle to their vehicle because the security level of the vehicle decreases if the device is vulnerable or malicious. We recommend the use of devices from reliable manufactures and developers. Current State of Automotive Security 9 バス上に追加されたデバイスからのメッセージ(インジェクション) I disassembled an OBD-II dongle sold at popular online shops and auctions. I found that it was a FAKE because it was using a microcontroller different from the item description… Also, the Bluetooth PIN cannot be changed… The threat classification can change from “Physical” to “Adjacent” if a vulnerable or malicious dongle is connected. ELM327 PIC18 
  • 10. FFRI,Inc. Current State of Automotive Security • There are two entry points for researching and investigating attacks on automobiles. 10 Message injection to (CAN) buses Exploiting vulnerabilities in systems (or devices) connected to the Internet Here is the main subject!
  • 11. FFRI,Inc. Current State of Automotive Security • The most famous case of a threat to a connected car… 11 Source: https://www.wired.com/wp-content/uploads/2015/07/150701_car_hackers_43-vscocam-photo-1.jpg
  • 12. FFRI,Inc. Current State of Automotive Security • A recent case… 12 Source: http://keenlab.tencent.com/en/2016/09/19/Keen-Security-Lab-of-Tencent-Car-Hacking-Research-Remote-Attack-to-Tesla-Cars/
  • 13. FFRI,Inc. Current State of Automotive Security 13 2015 2016 Aug Oct Feb Jun Source: Samy Kamkar, https://www.youtube.com/watch?v=3olXUbS-prU Drive It Like You Hacked It: New Attacks And Tools to Wirelessly Steal Cars, DEFCON 23 Source: Jianhao Liu, Jason Yan, https://www.syscan360.org/en/archives/, Car Hacking: Witness Theory to Scary and Recover From Scare, SyScan360 2015 Source: Pen Test Partners LLP, https://www.youtube.com/watch?v=NSioTiaX_-Q Source: Troy Hunt, https://www.youtube.com/watch?v=Nt33m7G_42Q
  • 14. FFRI,Inc. Motivation • Vulnerabilities in systems where an "automobile is part of the IoT" have been reported, one after another, from 2015 and beyond. • These threats are not as serious as the “Jeep Hack” vulnerability, but… ・ Personal Information is stolen by attackers. ・ Vehicle position and travel history are stolen by attackers. ・ Doors are unlocked by attackers, allowing vandalism of cars. These are threats to the (information) assets of the vehicle owner. 14
  • 15. FFRI,Inc. Vehicle Motivation 15 Mobile Apps Web Browser ECU Remote Service Web Server DB Machine Boundary Internet Boundary Internet Boundary BlackBox BlackBox The system on the other side of the Internet boundary is basically a black box because each OEM uses its own unique system. Furthermore, we should not attempt penetration testing via a web browser because it could be deemed a cyber-attack if attempted without permission.
  • 16. FFRI,Inc. Web Browser Vehicle Motivation 16 Mobile Apps ECU Remote Service Web Server DB Machine Boundary Internet Boundary Internet Boundary Blackbox BlackBox This approach is possible but highly challenging. I would need vehicles and subscriptions to remote control services in order to analyze the communication between the vehicle and system. (Also, we need to purchase the remote control service in most cases.)
  • 17. FFRI,Inc. Web Browser Vehicle Motivation 17 Mobile Apps ECU Remote Service Web Server DB Machine Boundary Internet Boundary Internet Boundary BlackBox BlackBox Apps can be easily obtained. (This is also true from the standpoint of the attacker.) Among the entities that make up the service, this is likely to be the cause of a vulnerability.
  • 18. FFRI,Inc. Investigation Target and Goal 18 Phase 0: Collect apps that integrate with the services provided by each OEM. Phase 1: Create a report on each app using AndroBugs.
  • 19. FFRI,Inc. • A system that helps find actual security vulnerabilities in Android Apps. • Open source and written in Python. • A static analysis tool that consumes Android APK (no source code). • Scan for “known common coding vulnerabilities” • Designed for massive analysis and to efficiently finding bugs. • You can easily extend new features or vulnerability vectors. What is AndroBugs? • AndroBugs is a vulnerability scanner for Android apps that was presented at Black Hat EUROPE 2015 by Mr. Yu-Cheng Lin. 19 Source: https://www.blackhat.com/docs/eu-15/materials/eu-15-Lin-Androbugs-Framework-An-Android-Application-Security-Vulnerability-Scanner.pdf
  • 20. FFRI,Inc. Investigation Target and Goal 20 Phase 2: Analyze the analysis reports for each app. Understand the security level of apps provided by OEMs and consider necessary corrective measures. Phase 0: Collect apps that integrate with the services provided by each OEM. Phase 1: Create a report for each app using AndroBugs.
  • 21. FFRI,Inc. Typical Risks in Mobile Apps 21 M1 – Improper Platform Usage M2 – Insecure Data Storage M3 – Insecure Communication M4 – Insecure Authentication M5 – Insufficient Cryptography M6 – Insecure Authorization M7 – Client Code Quality M8 – Code Tampering M9 – Reverse Engineering M10 – Extraneous Functionality Source: https://www.owasp.org/index.php/Mobile_Top_10_2016-Top_10 OWASP Mobile Top 10 Risks (2016 RC)
  • 22. FFRI,Inc. Vulnerabilities in Investigation Targets 22 M1 – Improper Platform Usage M2 – Insecure Data Storage M3 – Insecure Communication M4 – Insecure Authentication M5 – Insufficient Cryptography M6 – Insecure Authorization M7 – Client Code Quality M8 – Code Tampering M9 – Reverse Engineering M10 – Extraneous Functionality Source: https://www.owasp.org/index.php/Mobile_Top_10_2016-Top_10 OWASP Mobile Top 10 Risks (2016 RC)
  • 23. FFRI,Inc. Overview: M1 – Improper Platform Usage 23 M1 – Improper Platform Usage M2 – Insecure Data Storage M3 – Insecure Communication Platform security controls are improperly used, such as the scope of public activities or fragment activity handling. Example: The app will crash with a security exception if fragment injection occurs because the activity class that inherits from PreferenceActivity does not override isValidFragment().
  • 24. FFRI,Inc. Platform security controls are improperly used, such as the scope of public activities or fragment activity handling. Example: The app will crash with a security exception if fragment injection occurs because the activity class that inherits from PreferenceActivity does not override isValidFragment(). Overview: M1 – Improper Platform Usage 24 M1 – Improper Platform Usage M2 – Insecure Data Storage M3 – Insecure Communication Among the three vulnerability risks, this was detected second-most by AndroBugs. However, the results of our investigation did not find any vulnerabilities.
  • 25. FFRI,Inc. Overview: M2 – Insecure Data Storage 25 M1 – Improper Platform Usage M2 – Insecure Data Storage M3 – Insecure Communication Sensitive data is handled insecurely by saving it to external storage, outputting it to logs, etc. Examples: Outputting transmission data that contains sensitive information to the debug log. Using MODE_WORLD_READABLE/WRITABLE to enable access from other apps when getting the instance of SharedPreference.
  • 26. FFRI,Inc. Sensitive data is handled insecurely by saving it to external storage, outputting it to logs, etc. Examples: Outputting transmission data that contains sensitive information to the debug log. Using MODE_WORLD_READABLE/WRITABLE to enable access from other apps when getting the instance of SharedPreference. Overview: M2 – Insecure Data Storage 26 M1 – Improper Platform Usage M2 – Insecure Data Storage M3 – Insecure Communication Among the three vulnerability risks, this was the least detected by AndroBugs. And the results of our investigation did not find any vulnerabilities.
  • 27. FFRI,Inc. Overview: M3 – Insecure Communication 27 M1 – Improper Platform Usage M2 – Insecure Data Storage M3 – Insecure Communication Man-in-the-middle (MITM) attacks are allowed because SSL communication is implemented incorrectly. Many cases have been reported where verification of the server certificate is skipped. Examples: Skip hostname verification. Implement a custom (empty) trustmanager in order to skip certificate validation.
  • 28. FFRI,Inc. Man-in-the-middle (MITM) attacks are allowed because SSL communication is implemented incorrectly. Many cases have been reported where verification of the server certificate is skipped. Examples: Skip hostname verification. Implement a custom (empty) TrustManager in order to skip certificate validation. Overview: M3 – Insecure Communication 28 M1 – Improper Platform Usage M2 – Insecure Data Storage M3 – Insecure Communication Among the three of vulnerabilities risk, this was the most detected by AndroBugs. In addition, we confirmed actually vulnerable apps.
  • 29. FFRI,Inc. Vulnerabilities Found? YES! But I cannot disclose the app name…  29 It is an extremely common vulnerability in the implementation of SSL/TLS communication.
  • 30. FFRI,Inc. Example of Vulnerabilities Found Case 1: HTTP communication that contains user information • One activity loads an HTTP URL into WebView. • The URL posts user information to the server in clear text. • The other URLs on the same host use HTTPS. So, this might be based on some policy, but… 30
  • 31. FFRI,Inc. 31 Others are using HTTPS. (All the same host) But this is using HTTP… Example of Vulnerabilities Found Case 1: HTTP communication that contains user information
  • 32. FFRI,Inc. Example of Vulnerabilities Found Case 2: Server certificate validation flaw 32 Sources: https://www.ipa.go.jp/about/press/20140919_1.html http://www.kb.cert.org/vuls/id/582497
  • 33. FFRI,Inc. 33 What kind of vulnerability is a server certificate validation flaw? And what kind of risk does it pose? Example of Vulnerabilities Found Case 2: Server certificate validation flaw
  • 34. FFRI,Inc. 34 脆 弱 Install the vulnerable app from Google Play or the App Store Legitimate server Replace certificate The app will encrypt communication with a fake certificate if certificate is not validated. Decrypt and eavesdrop, manipulate Encrypted again using valid certificate. Malicious Wi-Fi router The communication may contain sensitive information because it is assumed to be encrypted. It could be sent to a fake URL in order to steal further information. Example of Vulnerabilities Found Case 2: Server certificate validation flaw
  • 35. FFRI,Inc. • Hostname verification is skipped because ALLOW_ALL_HOSTNAME_VERIFIER is used. • Certificate verification is skipped because a custom (empty) TrustManager is used. • WebView displays the page even if it is malicious because of SslErrorHandler.proceed() in certificate verification. 35 Example of Vulnerabilities Found Case 2: Server certificate validation flaw
  • 36. FFRI,Inc. 36 Example of Vulnerabilities Found Case 2: Server certificate validation flaw
  • 37. FFRI,Inc. 37 • This vulnerability poses the risk that the user ID and password are intercepted when the user logs into the service using the app. Example of Vulnerabilities Found Case 2: Server certificate validation flaw
  • 38. FFRI,Inc. Summary of risks of the app in which vulnerabilities were found 38 Theft of personal information (name, address, etc.) Theft of vehicle information (GPS, etc.) If the communication is intercepted when the user registersPossibility of eavesdropping (login or registration) Account hijacking (spoofing) Send any message (e.g., replay attack) Uninvestigated message specification Vehicle theft Possibility of further attacks and damage (e.g., vandalism) Vehicle control hijacking (unlock doors, etc.)
  • 39. FFRI,Inc. Corrective Measures and Considerations for Vulnerable Apps • Why did these vulnerabilities occur? 39 Debugging code in the release build Sample code copy & pasted (some might say “appropriated”) from the Internet Bad specifications (Lack of understanding of secure design and coding)
  • 40. FFRI,Inc. • There are various vulnerabilities and enabling factors in Android. We will introduce implementation rules for HTTP/HTTPS communication to prevent the vulnerability found in the app we investigated. 40 (出展)Androidアプリのセキュア設計・セキュアコーディングガイド 2016年9月1日版 http://www.jssec.org/dl/android_securecoding.pdf Use HTTPS communication when sending sensitive information Verify the safety of the received data if it uses HTTP communication Implement appropriate exception handling for SSLException (e.g., user notification) Do not implement a custom TrustManager Do not implement a custom HostnameVerifier Corrective Measures and Considerations for Vulnerable Apps
  • 41. FFRI,Inc. Use HTTPS communication when sending sensitive information Verify the safety of the received data if it uses HTTP communication Implement the appropriate exception handling to SSLExceptiopn (For example, such as user notification) Do not implement custom TrustManager Do not implement custom HostnameVerifier • There are various vulnerabilities and enabling factors in Android. We will introduce implementation rules for HTTP/HTTPS communication to prevent the vulnerability found in the app we investigated. 41 (出展)Androidアプリのセキュア設計・セキュアコーディングガイド 2016年9月1日版 http://www.jssec.org/dl/android_securecoding.pdf What is sensitive information? We need to understand the system and user information that must be protected in advance. Corrective Measures and Considerations for Vulnerable Apps
  • 42. FFRI,Inc. Use the HTTPS communication if it contains sensitive information Verify the safety of the received data if it uses HTTP communication Implement the appropriate exception handling to SSLExceptiopn (For example, such as user notification) Do not implement custom TrustManager Do not implement custom HostnameVerifier • There are various vulnerabilities and enabling factors in Android. We will introduce implementation rules for HTTP/HTTPS communication to prevent the vulnerability found in the app we investigated. 42 (出展)Androidアプリのセキュア設計・セキュアコーディングガイド 2016年9月1日版 http://www.jssec.org/dl/android_securecoding.pdf Vulnerable processing of incoming data may be targeted by attackers. We need to perform fuzz testing. Corrective Measures and Considerations for Vulnerable Apps
  • 43. FFRI,Inc. Use the HTTPS communication if it contains sensitive information Verify the safety of the received data if it uses HTTP communication Implement the appropriate exception handling for SSLException (e.g., user notification) Do not implement custom TrustManager Do not implement custom HostnameVerifier • There are various vulnerabilities and enabling factors in Android. We will introduce implementation rules for HTTP/HTTPS communication to prevent the vulnerability found in the app we investigated. 43 (出展)Androidアプリのセキュア設計・セキュアコーディングガイド 2016年9月1日版 http://www.jssec.org/dl/android_securecoding.pdf Caused by certificate error Necessary to consider the behavior for each feature specification Exception occurs if there is a certificate error → There may be an MITM attack in progress Corrective Measures and Considerations for Vulnerable Apps
  • 44. FFRI,Inc. Use HTTPS communication when sending sensitive information Verify the safety of the received data if it uses HTTP communication Implement the appropriate exception handling to SSLException (e.g., user notification) Do not implement a custom TrustManager Do not implement a custom HostnameVerifier • There are various vulnerabilities and enabling factors in Android. We will introduce implementation rules for HTTP/HTTPS communication to prevent the vulnerability found in the app we investigated. 44 (出展)Androidアプリのセキュア設計・セキュアコーディングガイド 2016年9月1日版 http://www.jssec.org/dl/android_securecoding.pdf Use the private CA root certificate to validate the server certificate if you are using a private certificate. Do not do this to skip certificate validation even if you are debugging. Corrective Measures and Considerations for Vulnerable Apps
  • 45. FFRI,Inc. 45 ・If you are going to develop an Android app… ・If you want to know other rules for Android apps… ・If you have not read these yet… Android アプリのセキュア設計・セキュアコーディングガイド (http://www.jssec.org/dl/android_securecoding.pdf) Check it out and give it a try! (Sorry, this is Japanese only.)
  • 46. FFRI,Inc. Summary: Scan Reports • Not all positive scan results are true vulnerabilities because AndroBugs reports common vulnerabilities mechanically. • AndroBugs detects many SSL security alerts because most risk factors arise from apps using HTTP communication. • We created a web-based custom scan report for each app by using the reports output by AndroBugs. 46
  • 47. FFRI,Inc. Summary: Scan Reports 47 Scan report sample We investigated critical vulnerability risks
  • 48. FFRI,Inc. Summary: Scan Reports 48 App Author Remote Control Feature No. of Critical Vulnerabiltiy Risks M1 – Improper Platform Usage M2 – Insecure Data Storage M3 – Insecure Communication A Yes 11 5 1 5 B No 5 3 1 1 C No 5 2 1 2 D No 5 2 1 2 E Yes 4 0 0 4 F Yes 4 1 1 2 G Yes 3 0 0 3 H Yes 2 1 0 1 I Partial 1 0 0 1 J Yes 1 0 0 1 K Partial 0 0 0 0
  • 49. FFRI,Inc. Summary: Possibility of Exploits in the Future 49 App Author Note A We confirmed there are exploitable vulnerabilities. There is a risk of MITM attacks. Classes that inherit from PreferenceActivity do not implement isValidFragment(). The app might crash due to fragment injection if the class becomes a public activity. B We could not find any exploitable vulnerabilities in this app. C We could not find any exploitable vulnerabilities in this app. D We could not find any exploitable vulnerabilities in this app. Analysis will take a long time because the app was obfuscated. E We could not find any exploitable vulnerabilities in this app. This app crashes as part of an activity because it does not support the new permission model starting from Android M. F We could not find any exploitable vulnerabilities in this app. Analysis will take a long time because the app was obfuscated. G We could not find any exploitable vulnerabilities in this app. H We could not find any exploitable vulnerabilities in this app. I We could not find any exploitable vulnerabilities in this app. J We could not find any exploitable vulnerabilities in this app. K We could not find any exploitable vulnerabilities in this app.
  • 50. FFRI,Inc. Conclusions • Client-side vulnerabilities were confirmed in remote control services for which other vulnerabilities have been reported recently. • However, most of the apps did not have the above implementation errors. • Most apps have been easy to analyze because they are not obfuscated. 50 The results of this report apply to only Android apps. Even if the client app is secure, if the server or vehicle is vulnerable, then attackers will target those vulnerable points. Services like remote control have the potential of being scaled to monitoring of many vehicles at the same time for autonomous cars. Therefore, we need to consider the security of the system as a whole, not only the individual apps and vehicles.
  • 51. FFRI,Inc. Future Work • Continue the analysis… – We have not yet finished analyzing all of the vulnerability risks detected by AndroBugs. • This investigation did not cover all of the available apps. – We also want to investigate other apps that were outside of the scope of this investigation. • Our investigation scope at this time was only Android apps. – We also want to investigate server/vehicle-side applications if we have a chance. 51

Editor's Notes

  1. 07/16/96