Black Hat USA
August 2-7, 2014
Mandalay Bay, Las Vegas, NV
Black Hat Europe
October 14-17, 2014
Amsterdam Rai, The Netherlands
5/21/2014
01:00 PM
Black Hat Staff
Black Hat Staff
Event Updates
Connect Directly
RSS
E-Mail
50%
50%

Black Hat USA 2014: Focus on Mobile

So far all our intel updates focused on the many exciting training opportunities that'll be on offer at Black Hat USA 2014. But now that we've revealed the upcoming slate of Black Hat briefing sessions, we'd like to highlight the best of the best briefings, too. Today we'll start with a focus on mobile -- let's dive in.

It's not widely known, but mobile service providers have a hidden and pervasive level of control over their customers' devices; someone with knowledge of these mechanisms could leverage them for cellular exploitation on a global scale. At Cellular Exploitation on a Global Scale: The Rise and Fall of the Control Protocol Mathew Solnik and Marc Blanchou will reveal the extent of their reverse engineering of these back doors, subtle flaws in how they're implemented, and how they achieved over-the-air (OTA) code execution on major cellular platforms and networks. They'll also release open-source tools to help assess and protect from these threats.

Mobile Device Management (MDM) solutions are a mainstay in modern enterprise IT, giving security teams a way to control risks from mobile malware and the loss/theft of devices carrying corporate data. But who watches the watchmen? In Mobile Device Mismanagement Stephen Breen will assess the security qualities of these expensive, rarely studied systems, focusing on a number of vulnerabilities, common across different products, that have allowed Breen and associates to access sensitive information on MDM-secured devices. TrustZone is an industry-leading solution for security-critical tasks on ARM-based devices, claiming "100%" security in such tasks as managing secure boot, storing DRM keys, supporting mobile payments, and verifying the integrity of the live OS kernel. Come to Reflections on Trusting TrustZone for a deep dive into the inner workings of a major vendor's TrustZone kernel, where Dan Rosenberg will brief you on a new vulnerability and use it to permanently unlock a major vendor's Android phone bootloader.

Mobile Point-of-Sale (mPOS) systems allow small businesses and drug dealers to accept credit card payments using a smartphone. You won't be surprised to hear that mobile security experts Nils and Jon Butler have discovered a series of mPOS vulnerabilities that give them code execution through a variety of vectors. Come to their Briefing, Mission mPOSsible, to hear all about the weaknesses of current mPOS solutions and see live attack demos, including a malicious credit card that drops a remote root shell on the unsuspecting system.

Early-bird rates are available until June 2. Please visit Black Hat USA 2014's registration page to register.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Christian Bryant
50%
50%
Christian Bryant,
User Rank: Ninja
5/21/2014 | 9:03:17 PM
The Backfiring Management Infrastructure
How true: MDM, MAM, MIM - there are so many companies jumping on the mobile management train, releasing mobile apps for the on-the-go IT admin, and so forth, but at the same time opening up a potential digital disaster if just one hole is found in an MxM infrastructure.  It reminds me of when SAP first came on the scene, and all the clones that motivated, and the exploits that followed, opening up entire Enterprise infrastructures up like oysters.  Looking forward to more in-depth analysis on the MxM security problem.
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0607
Published: 2014-07-24
Unrestricted file upload vulnerability in Attachmate Verastream Process Designer (VPD) before R6 SP1 Hotfix 1 allows remote attackers to execute arbitrary code by uploading and launching an executable file.

CVE-2014-1419
Published: 2014-07-24
Race condition in the power policy functions in policy-funcs in acpi-support before 0.142 allows local users to gain privileges via unspecified vectors.

CVE-2014-2360
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules allow remote attackers to execute arbitrary code via packets that report a high battery voltage.

CVE-2014-2361
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode.

CVE-2014-2362
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules rely exclusively on a time value for entropy in key generation, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by predicting the time of project creation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.