Explore the security vulnerabilities in mobile and IoT applications using Google's gRPC protocol in this 33-minute Black Hat conference talk. Discover how the perceived reliability of this private protocol often leads developers to overlook crucial security verification mechanisms, resulting in numerous security flaws. Learn about the advantages of gRPC over traditional HTTPS, including improved speed, security, and usability. Gain insights from researchers Shijie Cao and Hao Zhao as they delve into the potential risks associated with gRPC implementation in applications supporting billions of daily network services. Access the full abstract and presentation materials to deepen your understanding of this critical cybersecurity topic.
Overview
Syllabus
Hunting Vulnerabilities of gRPC Protocol Armed Mobile/IoT Applications
Taught by
Black Hat