Webinar
Security of mobile apps (german)

10th of June 2021 // 9:00 — 13:00 Uhr

Targets, attacks and defence

Mobile appli­ca­tions on smart­phones are becoming more and more important in private and profes­sional everyday life due to advancing digital­i­sation. The smart­phone has recently become a universal tool for a wide range of activ­ities. Whether for enter­tainment, shopping, video confer­encing, online banking or cashless payment at the checkout, smart­phones can be used flexibly thanks to their mobile appli­ca­tions and numerous interfaces.

Due to the various uses of mobile appli­ca­tions, smart­phones store and process a large amount of sensitive data. This also increases the attrac­tiveness of the appli­ca­tions for attackers. Malware such as banking Trojans and ransomware are already being used specif­i­cally against mobile appli­ca­tions. This also increases the need for security of mobile appli­ca­tions in order to effec­tively protect the data of their users.

SRC Security Research & Consulting GmbH offers a half-day webinar on the topic of mobile appli­cation security. The aim of the webinar is to under­stand the approach of attackers when analysing mobile appli­ca­tions, to be able to recognise risks and to harden the appli­ca­tions accord­ingly already during development.

The webinar will be held in German. Partic­i­pation is free of charge.

Target audience

The webinar is aimed at software archi­tects and devel­opers. The aim of the webinar is to techni­cally under­stand the approach of attackers when analysing mobile appli­ca­tions, to be able to recognise risks and to harden the appli­ca­tions accord­ingly already during development.

Content

The webinar will cover the following topics:

  • Tradi­tional security mechanisms/modules
    • HSM
    • Trusted Execution Environment (TEE)
  • Compa­rable security mecha­nisms on mobile devices 
    • Avail­ability of HSMs/TEEs
    • Software-based alter­na­tives
      • White-box cryptog­raphy
      • Virtual TEEs
      • Remote attes­tation
    • Attackers approach to mobile appli­cation analysis 
      • Targets and assets
      • Static analyses
      • Dynamic analyses
    • Securing the devel­opment process 
      • Security checks during development
      • Security require­ments for mobile applications
    • Protection against reverse engineering 
      • Obfus­cation
      • Anti-debugging
      • Anti-emulation
      • Anti-root/anti-jailbreak
      • Anti-tampering
      • Anti-hooking
  • Feedback and next steps

+++ Please activate cookies and JavaScript in your browser settings to order. +++

Do you have more questions?

Of course, we are also happy to support you in the devel­opment of secure software indepen­dently of the webinar. Feel free to contact us for a specific project.