equal
deleted
inserted
replaced
49 \item the main point: no cheating to start with |
49 \item the main point: no cheating to start with |
50 \end{itemize} |
50 \end{itemize} |
51 |
51 |
52 \end{frame} |
52 \end{frame} |
53 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
53 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
54 |
|
55 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
56 \begin{frame}[c] |
|
57 \frametitle{Case-In-Point: Android} |
|
58 |
|
59 \begin{itemize} |
|
60 \item a list of common Android vulnerabilities |
|
61 (5 BOAs out of 35 vulnerabilities) |
|
62 |
|
63 \begin{center} |
|
64 \url{http://androidvulnerabilities.org/} |
|
65 \end{center}\bigskip |
|
66 |
|
67 \item a paper that measures security of Android phones |
|
68 |
|
69 \begin{quote}\small\rm ``We find that on average 87.7\% of Android |
|
70 devices are exposed to at least one of 11 known critical |
|
71 vulnerabilities\ldots'' |
|
72 \end{quote} |
|
73 |
|
74 \begin{center}\small |
|
75 \url{https://www.cl.cam.ac.uk/~drt24/papers/spsm-scoring.pdf} |
|
76 \end{center} |
|
77 \end{itemize} |
|
78 |
|
79 \end{frame} |
|
80 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
81 |
54 |
82 |
55 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
83 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
56 \begin{frame}[c] |
84 \begin{frame}[c] |
57 |
85 |
58 \begin{bubble}[10cm]\small How do we implement BOAs? On a |
86 \begin{bubble}[10cm]\small How do we implement BOAs? On a |