Recon2012 - PREVIEW
Recon 2012
Speakers | |
---|---|
Jared Carlson |
Schedule | |
---|---|
Day | Day 3 - 2012-06-16 |
Room | Grand Salon |
Start time | 16:00 |
Duration | 01:00 |
Info | |
ID | 243 |
GPUs for Mobile Malware, Mitigation and More
Thinking outside-the-CPU
This talk will discuss how to leverage processors outside of the CPU for both defensive and offensive techniques. In particular I'll discuss GPU capabilities for Mobile in iOS and Android. Source code will be distributed and we'll walk through a variety of techniques available right now and for the future.
This presentation revolves around thinking outside of the CPU for cyber techniques - both offensive and defensive.
In particular with mobile devices we're seeing very tight integration between CPUs and GPUs. We will discuss how to
use these chips right now, how they could be used in the future and what is likely to develop. We'll cover how and
why signature verifications on a mobile GPU might be beneficial, how to perform dynamic disassembly, perform
encryption as well as decryption and tracking memory.
While each of these algorithms is interesting, the central point is to understand the architecture and how it's evolving.
Many of the security implications of non-CPU development have not been realized for cyber tasking. We'll discuss some
interesting points of the architecture for Android and iOS, alternating between the attacker and defender mindsets.
This means we'll be comparing both hardware and software design choices, as well as outside influences.
You should walk away with a strong understanding of how to expand your attack or defensive surface on a mobile device
and most importantly, with a sense of what to listen for in upcoming mobile hardware and software developments by the
various vendors. If you want a little outside-the-CPU thinking and learn where mobile is being pushed, you'll enjoy this
presentation.