slides/slides04.tex
changeset 408 9332d1e54360
parent 407 272dd46ff9b2
child 409 0c04ec017892
equal deleted inserted replaced
407:272dd46ff9b2 408:9332d1e54360
    49 \item the main point: no cheating to start with 
    49 \item the main point: no cheating to start with 
    50 \end{itemize} 
    50 \end{itemize} 
    51 
    51 
    52 \end{frame}
    52 \end{frame}
    53 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
    53 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
    54 
       
    55 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
    56 \begin{frame}[c]
       
    57 \frametitle{Case-In-Point: Android}
       
    58 
       
    59 \begin{itemize}
       
    60 \item a list of common Android vulnerabilities
       
    61 (5 BOAs out of 35 vulnerabilities)
       
    62 
       
    63 \begin{center}
       
    64 \url{http://androidvulnerabilities.org/}
       
    65 \end{center}\bigskip
       
    66 
       
    67 \item a paper that measures security of Android phones
       
    68 
       
    69 \begin{quote}\small\rm ``We find that on average 87.7\% of Android
       
    70 devices are exposed to at least one of 11 known critical
       
    71 vulnerabilities\ldots''
       
    72 \end{quote} 
       
    73  
       
    74 \begin{center}\small
       
    75 \url{https://www.cl.cam.ac.uk/~drt24/papers/spsm-scoring.pdf}
       
    76 \end{center}
       
    77 \end{itemize} 
       
    78 
       
    79 \end{frame}
       
    80 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
    81 
    54 
    82 
    55 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
    83 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
    56 \begin{frame}[c]
    84 \begin{frame}[c]
    57 
    85 
    58 \begin{bubble}[10cm]\small How do we implement BOAs? On a
    86 \begin{bubble}[10cm]\small How do we implement BOAs? On a