~ talk title
What factors should you consider, other than “the attack” in the development of android-based malware?
~ talk sypnosis
Frequently, when developing malware or malicious software, we tend to concentrate solely on exploiting
vulnerabilities. However, what other factors should be taken into account in this process?
Drawing from my publication, "A-COPILOT: Android Covert
Operation for Private Information Lifting and OTP Theft", this discussion will explore the importance of considering factors such as stealthiness and obfuscation.
~ about speaker
Joseph is a Year 2 Information Security student at the Singapore Institute of Technology (SIT).
Within his time in SIT he has been presented various awards like the GovTech Top Student Award
and Rotary Club of Bugis Junction Commendation Award.
Outside of academics, he is part of the student management committee,breaching the gap between
lecturers and students, as well as kick-starting a mentorship program for senior-junior mentoring.
At N0H4TS, he is the partnerships lead, overseeing fundraising and partnership related
collaborations between N0H4TS and other public and private organisations.
< go back