Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Unwrapping the Truth - Analysis of Mobile Application Wrapping Solutions

Black Hat via YouTube

Overview

Dive into a comprehensive analysis of Mobile Application Management (MAM) solutions in this 54-minute Black Hat conference talk by Ron Gutierrez and Stephen Komal. Explore the latest trends in BYOD (Bring Your Own Device) solutions, focusing on application wrapping techniques that enforce policies and enhance security at the application layer. Gain insights into the complex landscape of BYOD application wrapping products, their security claims, and their effectiveness against real-world mobile threats. Learn about the reverse engineering process for iOS and Android application wrapping solutions, examining their authentication methods, cryptographic implementations, interprocess communication (IPC), and client-side security controls. Discover security vulnerabilities uncovered in major vendor products and understand their potential impact on sensitive information. Equip yourself with valuable knowledge to make informed decisions about mobile application security in organizational settings.

Syllabus

Unwrapping the Truth: Analysis of Mobile Application Wrapping Solutions

Taught by

Black Hat

Reviews

Start your review of Unwrapping the Truth - Analysis of Mobile Application Wrapping Solutions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.