Explore a comprehensive security analysis of Tizen OS in this 43-minute conference talk from nullcon Goa 2015. Delve into Tizen's architecture and security model, including application sandboxing and resource access control using Smack. Discover vulnerabilities identified during research, such as WebKit2 address spoofing, content injection, buffer overflows, and memory protection issues. Learn about pentesting Tizen applications, comparing security concerns with Android. Gain insights into responsibly disclosed vulnerabilities and their impact on Tizen's security landscape.
Overview
Syllabus
nullcon Goa 2015: Hacking Tizen The OS of Everything by Ajin Abraham
Taught by
nullcon