Explore the hidden vulnerabilities of SIM cards in this eye-opening Black Hat USA 2013 conference talk. Delve into the world of these ubiquitous computing platforms, with over 7 billion cards in active use, and challenge the long-held belief of their impenetrable security. Discover how SIM cards, beyond their primary function of subscriber identification, offer programmable Java runtimes that position them as potential trust anchors for smartphones, embedded devices, and cars. Uncover the implementation and configuration bugs that plague these seemingly unbreakable systems, shattering the myth of their invulnerability. Learn from security expert Karsten Nohl as he exposes the realities of SIM card security, providing crucial insights for professionals in the field of mobile and embedded device security.
Overview
Syllabus
Black Hat USA 2013 - Rooting SIM cards
Taught by
Black Hat