Level: Low Tech

Abstract:

In this talk, I will share my experiences of testing and reverse-engineering some of the big names’ MDMs and anciliary security applications (without naming any of them), focusing on some of our most bizarre findings. Some notable examples will feature:

  • A malicious WiFi detection measure which will never detect a real attacker, but which happily harassed me about a local café’s WiFi
  • Application-name-centric malware detection
  • A marketing-first approach to security (“”we’ve documented, advertised and released a feature, now we just need to implement it…””)

The aim of this lighthearted talk is to highlight the overpromising and underdelivering which is prevalent in the mobile security market, and to point out that many of the problems these solutions promise to address have already been tackled by device manufacturers.

The talk will be aimed at a fairly general audience, hoping to sit well with both technical and managerial security folks. Rather than showing snippets of code, I will focus on high-level descriptions of security features that don’t actually do anything useful. I will not be able to name specific vendors, but most of them are guilty of at least one of the sins I hope to highlight :)

Bio:

Miłosz is a mobile security specialist at WithSecure, having previously spent entirely too much time working in academia. His current work revolves around Mobile Device Management solutions, Android device security audits, advisory consultancy, and complaining about password managers. Outside of technical work, his primary interests are in education and the culture of education.

Comments are closed.