Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Topic
Mobile Security talks at BSides
94 talks tagged
Mobile Security
from 47 chapters of BSides events worldwide.
Related topics
Technical
Talk
Red
Advanced
Technical Deep-dives
Case Studies and Incidents Analysis
47:59
Prototyping and Reverse Engineering with Frida
Jahmel Harris
BSides Leeds
· 2018
Technical
Mobile Security
Reverse Engineering
Red
Demo
Talk
Open →
2018-02
9:40:42
BSIDESLV 2018 - Breaking Ground - Day Two
BSides Las Vegas
· 2018
Technical
Hardware Hacking
Mobile Security
Reverse Engineering
Vulnerability Research
Talk
Open →
2018-08
34:50
0xFEEDFACE: Mach-O File Format and Binary Obfuscation
Kamil Borzym
BSides Warsaw
· 2018
Technical
Mobile Security
Reverse Engineering
Talk
Open →
2018-10
26:43
Pwning Android Apps at Scale
Sparsh
Shashank
BSides Ahmedabad
Research
Technical
Mobile Security
Supply Chain Security
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
+2
Open →
2023-02
47:39
Mastering Android Security Research: A Guide for the Modern Security Researcher
Hahna Latonick
Jacob Swinsinski
BSides Tampa
· 2024
Technical
Mobile Security
Reverse Engineering
Vulnerability Research
Intermediary
Red
Talk
Open →
2024-05
48:57
Walkthrough of an N-day Android GPU driver vulnerability
Angus
BSides Canberra
· 2025
Technical
Hardware Hacking
Mobile Security
Vulnerability Research
Advanced
Red
Talk
Open →
2026-03
48:31
Bypassing Huawei's Fingerprint Authentication by Exploiting the TrustZone
Nick Stephens
BSides DC
· 2018
Technical
Hardware Hacking
Mobile Security
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
+2
Open →
2018-11
40:10
Semi-Offline Attack on Android Full-Disk Encryption
Oliver Kunz
BSides Lisbon
· 2016
Technical
Cryptography
Mobile Security
Advanced
Red
Talk
Open →
2016-11
43:46
Meticulously Modern Mobile Manipulations
Leon Jacobs
BSides Cape Town
· 2019
Technical
Malware Analysis
Mobile Security
Reverse Engineering
Red
Talk
Open →
2019-12
50:45
iOS Malware: Myth or Reality?
Julien Bachmann
BSides London
Technical
Malware Analysis
Mobile Security
Talk
Open →
2016-07
15:06
A Newbie's Talk On Mobile Dangers Through The Looking Glass
Sarah Kingham
BSides London
· 2019
Technical
Hardware Hacking
Mobile Security
Physical Security
Talk
Open →
2019-06
45:24
BSides Rochester 2016: Nitin Jami: Exploring SecAccessControl Obj in iOS 9 Keychain
Nitin Jami
BSidesROC
· 2016
Technical
Mobile Security
Reverse Engineering
Technical Deep-dives
Talk
Open →
2016-05
8:48:36
Build Hybrid Mobile Apps Like a Security Pro
Vanita
Vinnie
BSides Las Vegas
· 2023
Technical
Mobile Security
Web AppSec
Talk
Open →
2023-08
39:58
Dirty Stream Attack: Turning Android Share Targets into Attack Vectors
Dimitrios Valsamaras
BSides Lisbon
· 2023
Technical
Mobile Security
Vulnerability Research
Red
Talk
Open →
2024-02
51:56
Unbreaking the iPhone: Bootchain Reversal, SEP Sabotage, and the iOS Kernel Frontier
Jack Sessions
BSides Canberra
· 2025
Technical
DFIR
Mobile Security
Reverse Engineering
Advanced
Red
Technical Deep-dives
Demo
Open →
2025-11
36:19
Binary Exploitation: Android Edition
John D
BSides Cheltenham
· 2022
Technical
Mobile Security
Reverse Engineering
Vulnerability Research
Advanced
Red
Talk
Open →
2022-07
35:45
Breaking The Impossible: Bypassing Android's Secure Hardware Backed Attestation by Joseph Foote
Joseph Foote
BSides Basingstoke
· 2022
Research
Technical
Mobile Security
Reverse Engineering
Vulnerability Research
Advanced
Red
Talk
Open →
2022-07
31:30
Keep it Like a Secret: When Android Apps Contain Private Keys
Will Dormann
BSidesSF
· 2018
Research
Cryptography
Mobile Security
Supply Chain Security
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2018-04
41:28
How an Android Application Can Drain Your Wallet
Dimitrios Valsamaras
BSides Lisbon
· 2022
Technical
Malware Analysis
Mobile Security
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-12
20:58
Modifying WhatsApp Messages
Yuri Livshitz
BSides TLV
· 2021
Technical
DFIR
Mobile Security
Technical Deep-dives
Demo
Open →
2021-08
24:02
Having fun while analyzing mobile applications
Álvaro Felipe Melchor
BSides Lisbon
· 2017
Technical
Mobile Security
Reverse Engineering
Talk
Open →
2017-11
21:37
How We Got Into A Unicorn's Private Codebase
Ashikka Gupta
Arshit Jain
BSides Munich
Research
Technical
Mobile Security
Supply Chain Security
Vulnerability Research
Red
Case Studies and Incidents Analysis
Empirical Research
+1
Open →
2022-05
44:43
Hacking Mobile Apps With Frida
David Coursey
BSides Belfast
· 2018
Technical
Mobile Security
Reverse Engineering
Intro
Red
Talk
Open →
2018-10
41:27
Abusing Mobile Games
Ming Chow
BSides Boston
· 2014
Technical
Mobile Security
Reverse Engineering
Talk
Open →
2014-05
23:03
The Little Phone That Could Ch-ch-chroot
Mathew Evans
Jack Whitter-Jones
BSides London
· 2019
Technical
DFIR
Mobile Security
Threat Modeling
Advanced
Red
Talk
Open →
2019-06
27:36
Tell Me Who You Are and I Will Tell You Your Lock Pattern
Marte Løge
BSides Las Vegas
· 2015
Research
Mobile Security
Empirical Research
Talk
Open →
2016-12
1:00:45
Ingress Egress: Emerging Threats in Augmented Reality Gaming
Andrew Brandt
BSides Las Vegas
· 2016
Technical
Mobile Security
Privacy
Threat Intel
Case Studies and Incidents Analysis
Talk
Open →
2016-08
42:18
From Impersonation to Exploitation: A Look at Mobile Malware Campaigns
Brent Shaw
Dr Roboto
BSides Cape Town
· 2025
Research
Technical
Malware Analysis
Mobile Security
Social Engineering
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-12
41:58
SMS E2E Encryption and Tunneling
Michael Kangethe
BSides Nairobi
· 2022
Technical
Cryptography
Mobile Security
Privacy
Demo
Talk
Open →
2022-12
11:13
Android Malware Adventures
Mert Can Coşkuner
Kürşat Oğuzhan Akıncı
BSides Athens
· 2020
Research
Technical
Malware Analysis
Mobile Security
Threat Intel
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2020-06
14:44
Using Apklab.io Mobile Threat Intel Platform to Fight Banking Threats
Nikolaos Chrysaidos
BSides Athens
· 2018
Technical
Malware Analysis
Mobile Security
Threat Intel
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2018-08
41:41
Hack, Patch, Repeat: Insider Tales from Android's Bug Bounty
Maria Uretsky
Camillus Cai
BSidesSF
· 2025
Technical
Mobile Security
Vulnerability Research
Blue
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2025-06
53:47
Android Security and Countersurveillance With GrapheneOS
Andrew Lebedinsky
BSides Seattle
· 2026
Technical
Mobile Security
Privacy
Reverse Engineering
Intermediary
Talk
Open →
2026-03
35:01
Abusing Google Play Billing For Fun And Unlimited Credits!
Guillaume Lopes
BSides Budabest
· 2019
Technical
Mobile Security
Reverse Engineering
Vulnerability Research
Talk
Open →
2019-06
29:21
Leaking Kakao: How I Found A 1-Click Exploit In Korea's Biggest Chat App
Dawin Schmidt
BSides Munich
· 2025
Technical
Mobile Security
Vulnerability Research
Web AppSec
Red
Talk
Open →
2024-11
44:28
Terribly Layered Security
Connor du Plooy
Andre Lopes
BSides Joburg
· 2024
Technical
Cryptography
Mobile Security
Web AppSec
Demo
Talk
Open →
2024-07
22:41
Communities @ Risk
Katie Kleemola
BSides Toronto
· 2014
Research
Malware Analysis
Mobile Security
OSINT
Privacy
Talk
Open →
2014-12
51:15
Chalie — A Tale of Android 0day Hunting
BSides Nairobi
· 2022
Technical
Mobile Security
Reverse Engineering
Vulnerability Research
Advanced
Red
Demo
Talk
Open →
2022-12
19:22
Hacking Your Favorite Kiosk
Aristotelis Koureleas
George Tyritidis
BSides Athens
Technical
Hardware Security
Mobile Security
Physical Security
Red
Talk
Open →
2024-03
48:46
Navigating the LABYRINTH: An In-Depth Examination of Interactive Intrusions by a North Korean APT
Greg Longo
BSides Peru
· 2023
Technical
Malware Analysis
Mobile Security
Threat Intel
Talk
Open →
2023-08
1:03:50
Opening Keynote
Joel Reardon
BSides Calgary
· 2021
Research
Technical
Mobile Security
Privacy
Reverse Engineering
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2021-12
20:20
Click here for free TV! Chaining bugs to takeover Wind Vision account
Leonidas Tsaousis
BSides Athens
· 2021
Technical
Mobile Security
Vulnerability Research
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Demo
Talk
Open →
2021-07
52:46
A Tale of Three Brothers: Three Android Privacy Bugs
BSides Delaware
· 2018
Technical
Mobile Security
Privacy
Vulnerability Research
Intermediary
Red
Technical Deep-dives
Talk
Open →
2018-11
48:01
NEVER BEFORE HAD STIERLITZ BEEN SO CLOSE TO FAILURE
Sergei Shevchenko
BSides Sydney
· 2019
Technical
Malware Analysis
Mobile Security
Reverse Engineering
Advanced
Blue
Talk
Open →
2019-09
53:24
iOS Runtime Hacking Crash Course
Michael Gianarakis
BSides Las Vegas
· 2018
Technical
Mobile Security
Reverse Engineering
Red
Talk
Open →
2018-09
33:51
How To Rise To The Ransomware Challenge: NCSC For Startups
BSides Cheltenham
· 2022
Technical
Mobile Security
Social Engineering
Threat Intel
Intermediary
Blue
Panel
Open →
2022-07
44:44
Flubot: Android Banking Trojan Pandemic
Juho Jauhiainen
BSides Dublin
· 2022
Technical
Malware Analysis
Mobile Security
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-05
38:43
Emergency VPN: Analyzing Mobile Network Traffic To Detect Digital Threats
Jan Fajfer
BSides Liverpool
· 2019
Technical
DFIR
Mobile Security
Network Security
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2019-07
1:00:03
Red Teaming Reimagined: War Stories, AI, and Innovation at Scale
Evan Peña
BSides Prishtina
· 2026
Technical
AI Security
Mobile Security
Vulnerability Research
Web AppSec
Red
Keynote
Open →
2026-02
27:16
Insert Coin: Hacking Arcade Cashless Systems
Ignacio Navarro
BSides Las Vegas
Technical
Mobile Security
Reverse Engineering
Vulnerability Research
Red
Case Studies and Incidents Analysis
Talk
Open →
2024-09
43:17
EVSE Ecosystems & Connected Vehicle Privacy
Stuart Criddle
Huw Davies
BSides Cymru Wales
· 2023
Technical
Hardware Hacking
IoT
Mobile Security
Privacy
Intermediary
Talk
Open →
2023-04
41:53
Mobile App Vulnerabilities: The Bad, The Worse And The Ugly
Ray Kelly
BSides Belfast
· 2024
Technical
Mobile Security
Vulnerability Research
Web AppSec
Talk
Open →
2024-03
51:22
A not so quick Primer on iOS Encryption
David Schuetz
BSidesROC
· 2016
Technical
Cryptography
DFIR
Mobile Security
Talk
Open →
2016-05
16:19
SMS-based MFA isn't keeping you safe
John Abood
BSides Sydney
· 2022
Technical
Mobile Security
Social Engineering
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2023-08
48:00
Abusing Leaked Data and Vulnerable User Assets on Android
Julien Thomas
BSides Budabest
· 2019
Technical
Mobile Security
Privacy
Red
Talk
Open →
2019-06
24:44
0 to 100 with Mobile Application Pentesting
James Kennedy
BSides KC
· 2019
Technical
Mobile Security
Talk
Open →
2019-06
48:27
A Novel Runtime Technique For Identifying Malicious Applications
Chris Le Roy
BSides Lisbon
· 2018
Research
Malware Analysis
Mobile Security
Reverse Engineering
Advanced
Technical Deep-dives
Talk
Open →
2018-12
41:23
The Age of Zygote Injection
Tricta
BSides Las Vegas
· 2025
Technical
Mobile Security
Reverse Engineering
Advanced
Talk
Open →
2025-12
24:54
Privacy Concerns in the Connected Car Ecosystem
Ruchi Gautam
BSides Vancouver
· 2021
Technical
IoT
Mobile Security
Privacy
Talk
Open →
2021-06
15:27
From Ground Zero to Sky's Hero: Analyzing Drone Logs from Smart Devices
Evangelos Mantas
Nikos Mantas
BSides Athens
· 2020
Technical
DFIR
IoT
Mobile Security
Case Studies and Incidents Analysis
Technical Deep-dives
Workshop
Open →
2020-06
36:07
From pocket to Pwn: How we hacked a multinational corp for $200
Tim Shipp
BSides NYC
· 2025
Technical
Mobile Security
Physical Security
Wireless Security
Red
Case Studies and Incidents Analysis
Talk
Open →
2025-11
49:05
How To Investigate IOS Devices - Paul Rascagneres
Paul Rascagneres
BSides Belfast
· 2020
Technical
DFIR
Malware Analysis
Mobile Security
Talk
Open →
2020-01
38:03
"Anything man makes, man can break: Cybersecurity through the eyes of a Hacker" - Marc Rogers
Marc Rogers
BSides TLV
· 2019
War Stories
Hardware Hacking
Mobile Security
Reverse Engineering
Vulnerability Research
Red
Keynote
Open →
2019-11
45:21
Build Hybrid Mobile Applications Like a Security Pro
Vineeta Sangaraju
BSides Las Vegas
· 2023
Technical
Mobile Security
Supply Chain Security
Vulnerability Research
Blue
Talk
Open →
2023-10
21:54
Show me the traffic! Intercepting and testing encrypted mobile application traffic
Andi Anastasi
BSides Athens
· 2021
Technical
Mobile Security
Reverse Engineering
Red
Demo
Talk
Open →
2021-07
25:02
Shorts Begone: Modding YouTube on iOS without Jailbreaking
Navan Chowan
BSides Las Vegas
· 2025
Technical
Mobile Security
Reverse Engineering
Intermediary
Red
Demo
Talk
Open →
2025-12
30:22
Bypassing 2FA with Android RATs
Paul Burbage
BSides Asheville
· 2015
Technical
Malware Analysis
Mobile Security
Red
Technical Deep-dives
Talk
Open →
2018-06
26:40
Breaking the Mobile Log Analysis Barrier with AI
Numa Dhamani
BSides NYC
· 2025
Technical
AI Security
DFIR
Mobile Security
Intermediary
Talk
Open →
2025-12
30:43
God Mode Mobile Exploiting: Mobile Apps With Game Cheats
Bruno Sena
BSides Bournemouth
· 2025
Technical
Mobile Security
Reverse Engineering
Advanced
Red
Technical Deep-dives
Talk
Open →
2025-09
39:02
Weaponizing Your Fitness Tracker Against You: Health, Fitness, & Location Tracking in a Post-Roe World
Wendy Knox Everette
BSides Las Vegas
· 2022
Policy
Mobile Security
Privacy
Talk
Open →
2022-09
50:00
Getting Saucy with APFS! The State of Apple's New File System
Sarah Edwards
BSides Charm
· 2018
Technical
DFIR
Mobile Security
Blue
Talk
Open →
2021-05
36:27
Every Breath You Take: A CTI Review of Stalkerware
Xena Olsen
BSides Porto
· 2020
Research
Technical
Malware Analysis
Mobile Security
Threat Intel
Talk
Open →
2020-11
52:29
Escape the MCP: Identity Segmentation and Controlled Decoys on GothamNet
Edgar Freemantle
BSides Charlotte
· 2026
Technical
Mobile Security
Network Security
Privacy
Advanced
Blue
Talk
Open →
2026-04
29:00
Translating Mobile App Security Lessons To The Flutter Stack
Samuel Hopstock
BSides Munich
· 2025
Technical
Mobile Security
Reverse Engineering
Talk
Open →
2026-02
55:18
Mobile Hacking
Aaron Guzman
BSides Augusta
· 2016
Technical
Mobile Security
Reverse Engineering
Web AppSec
Red
Talk
Open →
2016-09
49:25
Your Phone Hates You
Mark Loveless
BSides Dallas/Fort Worth
· 2020
Technical
Hardware Security
Mobile Security
Privacy
Talk
Open →
2020-11
12:08
ParseDroid: Targeting The Android Development & Research Community
Alon Boxiner
Eran Vaknin
BSides Munich
· 2019
Technical
Mobile Security
Reverse Engineering
Supply Chain Security
Talk
Open →
2019-03
36:25
Breaking Business as Usual: Attacking Android Enterprise Solutions
Priyank Nigam
BSides Las Vegas
Technical
Mobile Security
Technical Deep-dives
Talk
Open →
2023-10
25:21
The Case Of Malicious Advertisement SDK Affecting Thousands Of Mobile Apps by Kirill Efimov
Kirill Efimov
BSides Dublin
· 2021
Research
Malware Analysis
Mobile Security
Supply Chain Security
Vulnerability Research
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-05
13:19
Blue Hawk: Bluetooth-Based Motion Detection and Proximity Authentication
Dor Amit
BSides TLV
· 2024
Technical
Mobile Security
Physical Security
Wireless Security
Talk
Open →
2024-08
24:33
Android Malware Adventures: Analyzing Samples and Breaking into C&Cs
Kürsat Oguzhan
Mert Can Coskuner
BSides Barcelona
· 2019
Technical
Malware Analysis
Mobile Security
Reverse Engineering
Talk
Open →
2022-01
50:43
Blink: The Network Perimeter is Gone
Rick Farina
BSidesSF
· 2015
Technical
IoT
Mobile Security
Network Security
Wireless Security
Intermediary
Red
Talk
Open →
2023-12
1:31:01
De-Google your Smartphone
Kim Kip Trujillo
BSides Barcelona
· 2021
Technical
Mobile Security
Privacy
Workshop
Open →
2022-01
33:31
The Digital Deception: Unveiling the Risks of 'Kid-Safe' Phones
Katie Colgan
BSides Belfast
· 2025
Policy
Technical
Mobile Security
Privacy
Social Engineering
Talk
Open →
2025-12
37:23
Who Scans the Scanner? Exploiting Trend Micro Mobile Security
Lucas Carmo
BSides Las Vegas
· 2025
Technical
Mobile Security
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2025-12
58:37
Stick a Pin in Certificate Pinning: How to Inspect Mobile Traffic and Stop Data Exfiltration
Gopal Jayaraman
BSidesSF
· 2015
Technical
Cryptography
Mobile Security
Network Security
Talk
Open →
2023-12
26:53
Femtech And Data Privacy: What's At Stake?
Arohi Naik
BSides Leeds
· 2026
Policy
Technical
Mobile Security
Privacy
Threat Modeling
Talk
Open →
2025-08
19:29
IoT Pressure Cooker: What Could Go Wrong
Ben Actis
BSides Charm
· 2017
Technical
IoT
Mobile Security
Reverse Engineering
Vulnerability Research
Red
Demo
Talk
Open →
2021-05
30:34
Beyond the Pink: Data Risks in Femtech You Can't Ignore
Arohi Naik
BSides Amsterdam
· 2025
Policy
Technical
Mobile Security
Privacy
Vulnerability Research
Talk
Open →
2026-01
31:49
From Z3R0 to H3R0: Vulnerability Discovery and Responsible Disclosure
BSides Newcastle
· 2020
Career
Technical
Mobile Security
Vulnerability Research
Talk
Open →
2020-11
33:00
Pack Your Android: Defeating Obfuscation and Packers in Malware
Swapnil Deshmukh
BSides Philly
Technical
Malware Analysis
Mobile Security
Reverse Engineering
Talk
Open →
2018-11
27:23
The Vulnerability in Your Pocket
Ben Aveling
BSides Galway
· 2026
Technical
Cellular Security
Mobile Security
Threat Intel
Talk
Open →
2025-03
51:39
Vaccinating Android
Milan Gabor
Danijel Grah
BSides Las Vegas
· 2014
Research
Technical
Mobile Security
Reverse Engineering
Vulnerability Research
Advanced
Red
Demo
+1
Open →
2016-12
47:49
Bring Your Own Risky Apps
Domingo Guerra
Michael Raggo
BSides Las Vegas
· 2014
Technical
Mobile Security
Privacy
Talk
Open →
2016-12