Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid postMessage Enabled Mobile Apps

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=xGS7ECEhvgI



Duration: 19:39
1 views
0


IEEE Security and Privacy 2018 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-12-16EverCrypt A Fast, Verified, Cross Platform Cryptographic Provider
2022-12-12Oblix An Efficient Oblivious Search Index
2022-12-12Sonar Detecting SS7 Redirection Attacks With Audio Based Distance Bounding
2022-12-12xJsnark A Framework for Efficient Verifiable Computation
2022-12-12OmniLedger A Secure, Scale Out, Decentralized Ledger via Sharding
2022-12-12Speechless Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors
2022-12-12On Enforcing the Digital Immunity of a Large Humanitarian Organization
2022-12-12Static Evaluation of Noninterference using Approximate Model Counting
2022-12-12On the Economics of Offline Password Cracking
2022-12-12Stealing Hyperparameters in Machine Learning
2022-12-12Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid postMessage Enabled Mobile Apps
2022-12-12Opening Remarks of the 39th IEEE Symposium on Security & Privacy
2022-12-12PIR with Compressed Queries and Amortized Query Processing
2022-12-12Surveylance Automatically Detecting Online Survey Scams
2022-12-12T Fuzz Fuzzing by Program Transformation Hui Peng
2022-12-12Precise and Scalable Detection of Double Fetch Bugs in OS Kernels
2022-12-12The Cards Aren't Alright Detecting Counterfeit Gift Cards Using Encoding Jitter
2022-12-12Privacy Risks with Facebook's PII based Targeting
2022-12-12The Rise of the Citizen Developer Assessing the Security Impact of Online App Generators
2022-12-12Protecting the Stack with Metadata Policies and Tagged Hardware
2022-12-12Racing in Hyperspace Closing Hyper Threading Side Channels on SGX



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering