Can You Trust Me Now? An Exploration into the Mobile Threat Landscape

by Josh Thomas, Shawn Moyer Sept. 15, 2017 via submitted by belen_caty

This talk focuses on the entirety of the mobile ecosystem, from the hardware components to the operating systems to the networks they connect to. We will explore the core components across mobile vendors and operating systems, focusing on bugs, logic, and root problems that potentially effect all mobile devices. We will discuss the limitations of mobile trusted computing and what can be done to protect both your data and the devices your data reside on. From the specific perspectives of trusted computing and hardware integrity, there are a handful of smartphone hardware platforms on the market. OEMs are constrained to release devices based on selecting and trusting one of these platforms. If a skilled attacker can break trust at the hardware level, the entire device becomes compromised at a very basic (and largely undetectable) level. This talk is about how to break that trust.

Steven Ulm 1 month ago

Yes, now I can trust you on this matter... but remember: it depends how skilled truly the attacker is :)