Temp-smitter - Covert Data Transmission over CPU Temperature, Android Hacking Series
Topic1: Android Hacking Series
Time: Jul ,18 2020 04:00 PM Mumbai, Kolkata, New Delhi

Topic2:Temp-smitter - Covert Data Transmission over CPU Temperature
Time: Jul ,18 2020 05:00 PM Mumbai, Kolkata, New Delhi

Topic1: Android Hacking Series

Description: This workshop will cover the penetration testing of Mobile applications. We will start from basic pentesting to advance level. In this session we will also cover how to set-up mobile pen testing lab and perform the pentest for mobile applications.
Pre-Requisites: Laptop, Genymotion, Dex2jar, APKTOOL, JGGui, SQLite Browser, Drozer, etc
E3 Topics: Local Storage, Input Validation, Access Control, Content Provider

Duration: 1 Hr

Short Intro of Speaker:

Rinku Kumar is an information security researcher. Having experience in multiple securities domain like Appsec, Network security, Compliance review etc. Have done certification like OSCE, OSCP, CEH, Securecode warrior in different languages.

Sateesh Verma is an Information Security researcher, having around 10 year of experience specially in Web application, Mobile , thick client, API pentesting.

Level: Novice, Advanced Beginner, Competent

Topic2:Temp-smitter - Covert Data Transmission over CPU Temperature

Description: With the improvements in technology, hackers are also getting equipped with better rigs day by day. For every new technology being developed to secure the cyber space, hackers are trying  to research various attack vectors to penetrate them, ultimately rendering them somewhat useless, if things go wrong (which go wrong every now and then). Apart from usual attack vectors in software, hackers have started exploiting hardware side of computing infrastructure; which has given birth to some famous attacks (e.g. Meltdown, Spectre, Fan-smitter). This paper presents yet another attack vector named Temp-smitter, which uses temperature pattern of CPU dice as transmission medium to leak data covertly. The paper talks about motivation behind the research, design and analysis of covert channel, challenges, and possible countermeasures against it.

Duration: 45 Min - 1 Hr

Short Intro of Speaker: Also Known as DemiGod of Malware.

Level: Proficient

Join Meeting
https://meet.google.com/rqi-ewsh-qgs

Vapra Shiksha

An initiative for Cybersecurity Talks
Request you all to follow us on the following platforms for regular updates.

https://t.me/VapraShiksha (Central Node for all Info)

https://vapra.shiksha 
http://facebook.com/VapraShiksha
http://twitter.com/VapraShiksha
https://www.linkedin.com/company/vaprashiksha
https://www.youtube.com/channel/UCSf6L2g-OL7jh0PMdUQjzbg

Email *
Name *
Mobile No: *
You Represent Organization/Institute/Community Name *
Occupation *
How did you hear about this event? *
Want to become member of Vapra Community? *
Comments and/or questions
A copy of your responses will be emailed to the address you provided.
Submit
Clear form
Never submit passwords through Google Forms.
reCAPTCHA
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy