Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore cutting-edge cybersecurity research in this 39-minute Black Hat conference talk that reveals critical vulnerabilities in mobile device USB security mechanisms. Discover how researchers from Graz University of Technology have developed novel attack techniques that bypass both lock screens and user confirmation prompts to gain unauthorized file access on modern iOS and Android devices. Learn about the shortcomings of current USB file access security measures and witness live demonstrations showing how malicious USB chargers can establish data connections while simultaneously injecting input events to bypass security prompts on Samsung devices. Examine sophisticated attacks against locked Android devices that exploit vulnerabilities in both AOSP and vendor-specific implementations, including a demonstration of achieving full read-write file access on locked Google Pixel devices running Android 14 or 15. Gain insights into the technical methodologies behind these USB-based attacks and understand the recommended mitigations to protect against these emerging threats to mobile device security.
Syllabus
Watch Your Phone: Novel USB-Based File Access Attacks Against Mobile Devices
Taught by
Black Hat