Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a Black Hat conference talk that uncovers alarming privacy breaches in Android devices. Delve into research revealing how certain Android models contain firmware that covertly collects and transmits users' sensitive personal data to servers in China without consent or disclosure. Learn about the ADUPS firmware, its track record, and the various types of data exfiltrated, including text messages, browsing history, and application logs. Understand the internal mechanisms used for data collection and transmission, and gain insights into the broader implications of these privacy violations in the mobile device ecosystem.
Syllabus
Introduction
The issue became public
Internal threats
ADUPS
ADUPS Website
ADUPS Track Record
Blue Device
PII Exfiltration
Internals
Text Message Exfiltration
Text Message Encryption
JSON Files
Browsing History
Application Code
Logger
Android Log
Bluetooth Snoop Log
Modem Log Generator
Summary
Questions
Taught by
Black Hat