Learning objectives

Get to know the most important security risks (OWASP Mobile Top 10) of mobile apps with the aid of intentionally vulnerable mobile apps for iPhone and Android. After an introduction into the security architecture of Android and iOS, you will be guided through various application vulnerabilities and the corresponding countermeasures. After the course you will be in a position to apply what you have learned to your company's mobile application projects and will gain the competence for secure development and evaluation (self-assessment) of mobile apps

Demarcation: The seminar is differentiated from the subject of MDM (Mobile Device Management) and focuses on the (in-)secure development of apps.

Highlights

  • Introduction to the subject of  Secure Mobile Coding
    • OWASP Mobile Security Top 10
    • Introduction to the laboratory environment
  • Overview of security architecture
    • Android Security
    • iOS Security Framework
  • Secure transmission of app data
    • Network analysis, Man-in-the-Middle
    • SSL Trust with expanded validation
  • Secure storage of sensitive app data
    • Encryption of data
    • Pitfalls when saving data
    • Encryption management
  • Secure Programming
    • User input, indexing, field completion
    • Efficient data encryption
    • Backup & Restore
    • Logging & Auditing & Memory Management
  • Malware & Jailbreak, Rooting
    • Jailbreak & Jailbreak detection
    • Effective protection against malware
  • Advanced App Analysis
    • Reverse engineering
    • Static and dynamic analysis
    • Source code analysis
    • Code obfuscation

 

The exercises will be done on www.hacking-lab.com.

Target group

Developers of iPhone and Android applications and those who are responsible for security and want to learn the current mobile threats.

Prerequisite

  • Knowledge of programming not necessary
  • Good understanding of mobile devices advantageous
  • Ability to read and understand source code

CALENDAR

Beer-Talk in St. Gallen: Azure Security 101

Im Sommer 2018 kündigte Microsoft an, ihre Cloud-Lösungen aus Schweizer Rechenzentren anzubieten. Viele hiesige KMUs und Grossunternehmen haben sich... Read more

Swiss Cyber Hackathon 2019 / Zurich

Simulating Real World Cyber Scenarios – Educational Cyber Competition of Defending your Environment and Attacking your Opponents Read more

Internet Security Days 2019 - Game of IT-Security

Based on the theme "Online Security", a wide conference program and an exhibition awaits you on September 26/27, 2019. New in the programme are... Read more

ALL DATES

NEWS

So leicht wird dein Handy gehackt

Die Blick-Reporterin weiss dank Ivan Bütler, warum man auch bei einer SMS von Mami kritisch sein soll. Read more

Rückblick Digitaltag 2019

Ivan Bütler von Compass Security hat einen aufregenden Digitaltag hinter sich. Seine Live Hacks am Züricher Hauptbahnhof waren ein Publikumsmagnet. Read more

Wie steht es um die Sicherheit der Schweizer Stromversorgung?

Im Bericht der Eidgenössischen Elektrizitätskommision kommt die Schweizer Stromversorgung diesbezüglich nicht gut weg. Studerus AG hat dazu Cyrill... Read more

ARCHIVES

Compass Security Blog

enOcean Security

In this post, we are going to take a closer look at the enOcean technology, how security is implemented, and if the security measures and options available are sufficient. mehr

Privilege escalation in Windows Domains (3/3)

In this last article about privilege escalation in Windows domains, we demonstrate how to extract credentials from running systems to compromise high-privileged accounts. mehr

ZUM BLOG