Overview
Dive into a comprehensive analysis of Mobile Application Management (MAM) solutions in this 54-minute Black Hat conference talk by Ron Gutierrez and Stephen Komal. Explore the latest trends in BYOD (Bring Your Own Device) solutions, focusing on application wrapping techniques that enforce policies and enhance security at the application layer. Gain insights into the complex landscape of BYOD application wrapping products, their security claims, and their effectiveness against real-world mobile threats. Learn about the reverse engineering process for iOS and Android application wrapping solutions, examining their authentication methods, cryptographic implementations, interprocess communication (IPC), and client-side security controls. Discover security vulnerabilities uncovered in major vendor products and understand their potential impact on sensitive information. Equip yourself with valuable knowledge to make informed decisions about mobile application security in organizational settings.
Syllabus
Unwrapping the Truth: Analysis of Mobile Application Wrapping Solutions
Taught by
Black Hat