Cloak & Dagger - From Two Permissions to Complete Control of the UI Feedback Loop

Cloak & Dagger - From Two Permissions to Complete Control of the UI Feedback Loop

Black Hat via YouTube Direct link

Why would a user grant these permissions?

3 of 19

3 of 19

Why would a user grant these permissions?

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Cloak & Dagger - From Two Permissions to Complete Control of the UI Feedback Loop

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 What is this work about?
  3. 3 Why would a user grant these permissions?
  4. 4 Security Mechanism #1
  5. 5 Security Mechanism #3
  6. 6 Attack: Context-aware Clickjacking
  7. 7 Obscured Flag Bypass
  8. 8 Attack: Context Hiding
  9. 9 Attack: Invisible Grid Attack
  10. 10 Design Shortcomings
  11. 11 Cloak & Dagger attacks
  12. 12 Traditional Phishing
  13. 13 Ransomware Example
  14. 14 How is the Android security team reacting?
  15. 15 Securing Android UI
  16. 16 What happened next...
  17. 17 Detect Cloak & Dagger
  18. 18 Let's go one step further...
  19. 19 Current state of Android security updates

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.