AI, Data Science & Business Certificates from Google, IBM & Microsoft
Learn Excel & Financial Modeling the Way Finance Teams Actually Use Them
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore cutting-edge cybersecurity research in this 39-minute Black Hat conference talk that reveals critical vulnerabilities in mobile device USB security mechanisms. Discover how researchers from Graz University of Technology have developed novel attack techniques that bypass both lock screens and user confirmation prompts to gain unauthorized file access on modern iOS and Android devices. Learn about the shortcomings of current USB file access security measures and witness live demonstrations showing how malicious USB chargers can establish data connections while simultaneously injecting input events to bypass security prompts on Samsung devices. Examine sophisticated attacks against locked Android devices that exploit vulnerabilities in both AOSP and vendor-specific implementations, including a demonstration of achieving full read-write file access on locked Google Pixel devices running Android 14 or 15. Gain insights into the technical methodologies behind these USB-based attacks and understand the recommended mitigations to protect against these emerging threats to mobile device security.
Syllabus
Watch Your Phone: Novel USB-Based File Access Attacks Against Mobile Devices
Taught by
Black Hat