This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
OWASP AppSec DC 2012/Smart Bombs Mobile Vulnerability and Exploitation
From OWASP
Revision as of 20:57, 2 March 2012 by Mark.bristow (talk | contribs) (Created page with "<noinclude>{{:OWASP AppSec DC 2012 Header}}</noinclude> __NOTOC__ == The Presentation == rightKevin Johnson, John Sawyer and Tom Eston have sp...")
Registration Now OPEN! | Hotel | Schedule | Convention Center | AppSecDC.org
The Presentation
Kevin Johnson, John Sawyer and Tom Eston have spent quite a bit of time evaluating mobile applications in their respective jobs. In this presentation they will provide the audience an understanding of how to evaluate mobile applications, examples of how things have been done wrong and an understanding of how you can perform this testing within your organization.This talk will work with applications from the top three main platforms; iOS, Android and Blackberry. Kevin, Tom and John have used a variety of the top 25 applications for each of these platforms to provide real world examples of the problems applications face.
The Speakers
Kevin Johnson, John Sawyer and Tom Eston
Gold Sponsors |
||||
Silver Sponsors |
||||
Small Business |
||||
Exhibitors |