Reddit AMA with the Authors of the Android Hacker’s Handbook
Pau Oliva, viaForensics Mobile Security Engineer and co-author of Android Hacker’s Handbook, will be participating in a Reddit AMA (Ask Me Anything) hosted by /r/netsec. The event will take place Thursday, June 12th, starting at 11:00am PDT. Android Hacker’s Handbook is the first comprehensive guide to discovering and preventing attacks on the Android OS. As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world’s foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them. Oliva’s co-authors include Joshua Drake (Director of Research Science at Accuvant LABS.),Zach Lanier (Senior Security Researcher at Duo Security), Colin Mulliner (postdoctoral researcher at Northeastern University), Stephen A. Ridley (Principal Researcher with Xipiter), and Georg Wicherski (Senior Security Researcher with CrowdStrike).
If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will definitely find this AMA valuable.
It’s going to be a busy few days for Pau as on Friday he will also be giving a presentation for the Spanish chapter of The Open Web Application Security Project (OWASP), worldwide not-for-profit charitable organization focused on improving the security of software. Their mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks. Pau’s presentation will show how to reverse engineer an Android app, and cover the most common vulnerabilities found in these applications. He’ll also be demonstrating some steps that can be applied to protect and develop secure applications.