Overview
Syllabus
Intro
Agenda
Process Challenges
Technical Challenges
Holistic Security & Privacy Process
Security Topics
Hardware & Firmware Security Paradigms
SW Security Paradigms: application SW
Communication Protocols
Ecosystem security challenges
Demo 1: Ecosystem overview
Device communication
The Problem - Prelude
Example - Wearable Ecosystem 1
Demo 2: Ecosystem overview
Target : Sign-up and Profile pages
Exploit Scenario: The attack
Victim - logs in
Attacker's c&c
Access to admin portal
Privacy & Data Access Laws
Quantifying Privacy Vulnerabilities
Summary
Taught by
OWASP Foundation