Secure Mobile Apps

Learning objectives

Get to know the most important security risks (OWASP Mobile Top 10) of mobile apps with the aid of intentionally vulnerable mobile apps for iPhone and Android. After an introduction into the security architecture of Android and iOS, you will be guided through various application vulnerabilities and the corresponding countermeasures. After the course you will be in a position to apply what you have learned to your company's mobile application projects and will gain the competence for secure development and evaluation (self-assessment) of mobile apps

Demarcation: The seminar is differentiated from the subject of MDM (Mobile Device Management) and focuses on the (in-)secure development of apps.

Highlights

  • Introduction to the subject of  Secure Mobile Coding
    • OWASP Mobile Security Top 10
    • Introduction to the laboratory environment
  • Overview of security architecture
    • Android Security
    • iOS Security Framework
  • Secure transmission of app data
    • Network analysis, Man-in-the-Middle
    • SSL Trust with expanded validation
  • Secure storage of sensitive app data
    • Encryption of data
    • Pitfalls when saving data
    • Encryption management
  • Secure Programming
    • User input, indexing, field completion
    • Efficient data encryption
    • Backup & Restore
    • Logging & Auditing & Memory Management
  • Malware & Jailbreak, Rooting
    • Jailbreak & Jailbreak detection
    • Effective protection against malware
  • Advanced App Analysis
    • Reverse engineering
    • Static and dynamic analysis
    • Source code analysis
    • Code obfuscation

 

The exercises will be done on www.hacking-lab.com.

Target group

Developers of iPhone and Android applications and those who are responsible for security and want to learn the current mobile threats.

Prerequisite

  • Knowledge of programming not necessary
  • Good understanding of mobile devices advantageous
  • Ability to read and understand source code

CALENDAR

Cyber Risks - Früherkennung leicht gemacht

Das SwissBoardForum lädt ein zum Spezialevent «Cyber Risks». Ivan Bütler zeigt in seinem Live Hacking, welchen Risiken unsere Infrastruktur gegenüber... Read more

Beer-Talk in Zürich: Bluetooth Low Energy: Protocol, Security & Attacks

Immer mehr Geräte und Gadgets können über Bluetooth Low Energy (BLE) miteinander kommunizieren. Haben Sie sich schon gefragt, was dieses BLE überhaupt... Read more

Security Training: Secure Mobile Apps

In the 2-day course (in German) from Mai 12/13, 2020, you will learn about the most important security problems of mobile apps. Read more

ALL DATES

NEWS

Vulnerability in Abacus

Ville Koch identified a Cross-Site Scripting vulnerability in Abacus. Read more

Rein kommen wir meistens

In einem Interview in der Wirtschaftszeitung «Finanz und Wirtschaft» spricht Walter Sprenger über die Motivationsgründe und Methoden der Hacker. Read more

KMU im Visier von Cyberkriminellen

In der Sendung «Fokus KMU» erzählt ein Betroffener über die Auswirkungen der Cyber Attacke auf sein Unternehmen. Cyrill Brunschwiler von Compass... Read more

ARCHIVES

Compass Security Blog

New SMBGhost Vulnerability Affects Modern Windows Systems

A new vulnerability (CVE-2020-0796) affecting SMBv3 has been discovered. The community has started to name this vulnerability SMBGhost because everyone knows this vulnerability is present but no... mehr

Domain-Join Computers the Proper Way

When you add a new computer, it must first join the domain. If you use its future main user to do it, they'll become the owner and be able to hijack the computer to become a local administrator in... mehr

ZUM BLOG