Android Security Symposium
File List
- 2020/Android Security Symposium 2020 Live (Monday).mp4 478.0 MB
- 2020/Android Security Symposium 2020 Live (Tuesday).mp4 368.5 MB
- 2020/Keynote The Evolution Of Secure Things (by Alex Gantman).mp4 96.3 MB
- 2020/Perils of Running Apps in Android Virtual Containers (by Gautam Arvind Pandian and Vikas Gupta).mp4 92.8 MB
- 2020/Semi-Interactive Simplification of Hardened Android Malware (by Abdullah Joseph).mp4 85.7 MB
- 2017/An introduction to Android application security testing (by Nikolay Elenkov).mp4 83.6 MB
- 2020/Android's Privacy Posture (by Dinesh Venkatesan and Aditi Bhatnagar).mp4 78.3 MB
- 2017/Honey, I shrunk the attack surface – Adventures in Android security hardening (by Nick Kralevich).mp4 77.7 MB
- 2017/State of security of Android banking apps in Poland (by Tomasz Zieliński).mp4 73.6 MB
- 2020/50 Ways to Leak Your Data (by Serge Egelman).mp4 67.4 MB
- 2020/Android Debug Bridge (by Gabriel Cirlig).mp4 66.9 MB
- 2020/Closing Keynote Icebergs in Android Security Privacy (by Sudhi Herle).mp4 64.8 MB
- 2017/Secure positioning From GPS to IoT (by Srdjan Capkun).mp4 61.8 MB
- 2015/Improving mobile security with forensics, app analysis and big data (by Andrew Hoog).mp4 60.1 MB
- 2017/Drammer Flip Feng Shui goes mobile (by Victor van der Veen).mp4 55.6 MB
- 2020/Memory Tagging for the Kernel Tag-Based KASAN (by Andrey Konovalov).mp4 52.3 MB
- 2015/An infestation of dragons Exploring vulnerabilities in ... (by Josh Thomas and Charles Holmes).mp4 50.9 MB
- 2015/The quest for usable security (by N. Asokan).mp4 50.2 MB
- 2017/Android compiler fingerprinting (by Tim Strazzere).mp4 49.4 MB
- 2015/Lessons from the trenches An inside look at Android security (by Nick Kralevich).mp4 48.7 MB
- 2015/Android security architecture (by Nikolay Elenkov).mp4 47.6 MB
- 2015/Exploit mitigation at the native level for RISC-based devices (by Matthias Neugschwandtner).mp4 47.5 MB
- 2017/Statistical deobfuscation of Android applications (by Petar Tsankov).mp4 43.5 MB
- 2015/Assessing Android applications using command-line fu (by Pau Oliva Fora).mp4 40.8 MB
- 2017/Using threshold crypto to protect single users with multiple devices (by Erinn Atwater).mp4 40.0 MB
- 2017/Privacy with Cryptomator End-to-end cloud ... (by Christian Schmickler and Markus Kreusch).mp4 39.8 MB
- 2017/Playing with your code a new approach to avoid potential hackers from ... (by Hugues Thiebeauld).mp4 38.2 MB
- 2017/Pinning Not as simple as it sounds (by John Kozyrakis) - partial.mp4 36.0 MB
- 2015/Mobile threats incident handling (by Yonas Leguesse).mp4 35.3 MB
- 2015/How Google killed two-factor authentication (by Victor van der Veen).mp4 35.1 MB
- 2015/Android and trusted execution environments (by Jan-Erik Ekberg).mp4 31.6 MB
- 2015/Secure elements for you and me A model for programmable secure ... (by Alexandra Dmitrienko).mp4 26.0 MB
- 2015/Secure copy protection for mobile apps (by Nils T. Kannengiesser) - YouTube.mp4 23.3 MB
- 2015/Continuous risk-aware multi-modal authentication (by Rainhard D. Findling and Muhammad Muaaz).mp4 19.5 MB
- 2015/Human factors in anonymous mobile communication (by Svenja Schröder).mp4 17.7 MB
- 2015/Improving mobile security with forensics, app analysis and big data (by Andrew Hoog).srt 155.9 KB
- 2015/Android security architecture (by Nikolay Elenkov).srt 124.6 KB
- 2020/Keynote The Evolution Of Secure Things (by Alex Gantman).eng.eng.srt 115.4 KB
- 2020/Perils of Running Apps in Android Virtual Containers (by Gautam Arvind Pandian and Vikas Gupta).eng.eng.srt 100.8 KB
- 2020/Semi-Interactive Simplification of Hardened Android Malware (by Abdullah Joseph).eng.eng.srt 97.0 KB
- 2020/Android's Privacy Posture (by Dinesh Venkatesan and Aditi Bhatnagar).eng.eng.srt 94.7 KB
- 2020/50 Ways to Leak Your Data (by Serge Egelman).eng.eng.srt 81.1 KB
- 2020/Memory Tagging for the Kernel Tag-Based KASAN (by Andrey Konovalov).eng.eng.srt 72.7 KB
- 2017/Playing with your code a new approach to avoid potential hackers from ... (by Hugues Thiebeauld).srt 59.1 KB
- 2020/Closing Keynote Icebergs in Android Security Privacy (by Sudhi Herle).eng.eng.srt 55.5 KB
- 2020/Android Debug Bridge (by Gabriel Cirlig).eng.eng.srt 55.1 KB
- 2015/Mobile threats incident handling (by Yonas Leguesse).srt 54.7 KB
- 2015/Lessons from the trenches An inside look at Android security (by Nick Kralevich).srt 53.1 KB
- 2015/How Google killed two-factor authentication (by Victor van der Veen).srt 48.3 KB
- 2015/An infestation of dragons Exploring vulnerabilities in ... (by Josh Thomas and Charles Holmes).srt 48.2 KB
- 2015/Exploit mitigation at the native level for RISC-based devices (by Matthias Neugschwandtner).srt 43.9 KB
- 2015/Secure copy protection for mobile apps (by Nils T. Kannengiesser) - YouTube.srt 28.0 KB
- 2015/Continuous risk-aware multi-modal authentication (by Rainhard D. Findling and Muhammad Muaaz).srt 25.7 KB
- 2015/Human factors in anonymous mobile communication (by Svenja Schröder).srt 23.2 KB
- Android Security Symposium logo5.png 6.3 KB
- Android Security Symposium thank you.txt 1.2 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.