For our January event, we have not one, but two amazing presenters who offered to take us deep into the world of Android security.
A Deep Dive into Mobile Malware
If you're curious about mobile malware, what it does, and how it does it, we'll tear down a few sample applications and look at their inner workings. Along the way, you'll see how professional malware hunters examine apps and find out how they misbehave.
The presenter is Emil Ong, a software engineer at Lookout Mobile Security. He spends his days building tools to find and investigate malware.
Side channel attacks: Timing Attacks, Simple Power Analysis, Differential Power Analysis
While writing malware does not take rocket science, attacking physical devices by measuring power consumption or electromagnetic radiation (say from 10-20 feet away) may seem to be out of reach to most mortals. Or is it? Luke Teyssier offered to tell us more. Time-permitting, Luke may event expand his talk to discuss topics like: reasoning about cryptographic security, key strength vs # of bits, reasonable looking ways to misuse and compromise the security of otherwise good crypto, and more.
About Luke Teyssier
Luke has been working with, designing, and programming computers and embedded systems of various sizes and shapes since 1983, when he began digging into the internals of his Z80 based personal computer. He has extensive experience with digital hardware and software including x86, ARM, MIPS, PowerPC, 68000, and others. He has contributed significantly to a number of firsts such as the first VOIP speaker phone, the first wireless web browser tablet, the first Java graphical browser desktop phone, and a $500M signal processing system. He has built a variety of FPGA designs including cryptographic hardware, high-speed protocol analyzers and RF module control systems. Recently, he spent 6 years researching and teaching Differential Power Analysis, a cryptographic side-channel analysis technology.