Workshop at Black Hat 2015
In this session we'll show you how many of their findings in IoT devices come from hackers having easy access to mobile app source code. If code was properly obfuscated, it would be much harder to decompile and reverse engineer it in the first place. We will demonstrate reverse engineering and uncovering security flaws in […]