Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Hunting Vulnerabilities of gRPC Protocol Armed Mobile - IoT Applications

Black Hat via YouTube

Overview

Explore the security vulnerabilities in mobile and IoT applications using Google's gRPC protocol in this 33-minute Black Hat conference talk. Discover how the perceived reliability of this private protocol often leads developers to overlook crucial security verification mechanisms, resulting in numerous security flaws. Learn about the advantages of gRPC over traditional HTTPS, including improved speed, security, and usability. Gain insights from researchers Shijie Cao and Hao Zhao as they delve into the potential risks associated with gRPC implementation in applications supporting billions of daily network services. Access the full abstract and presentation materials to deepen your understanding of this critical cybersecurity topic.

Syllabus

Hunting Vulnerabilities of gRPC Protocol Armed Mobile/IoT Applications

Taught by

Black Hat

Reviews

Start your review of Hunting Vulnerabilities of gRPC Protocol Armed Mobile - IoT Applications

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.