Skip to main content

First ever J2ME Vulnerability & Exploit

posted onSeptember 9, 2004
by hitbsecnews

Adam Gowdiak has announced his paper for HITBSecConf2004 entitled "Java 2 Micro Edition (J2ME) Security Vulnerabilities". His presentation will begin with a general introduction to mobile Java, KVM, CLDC and MIDP concepts. This will be followed by a detailed description of KVM security architecture, its operation and differences from standard Java Virtual Machine. In the second part of the talk several vulnerability exploitation techniques specific to mobile Java code will be presented. Along with that, some useful reverse engineering techniques of KVM operation, ROM'ized java bytecode and native methods implementation will be also given.

To the best of our knowledge, this will be the first time that a live working example of exploiting the J2ME platform will be shown including a demonstration of reverse engineering techniques which will be used against the so called "closed" Nokia DCT4 cell phone. It's going to rock and you don't want to miss this!

Source

Tags

HITB News

You May Also Like

Recent News

Tuesday, November 19th

Friday, November 8th

Friday, November 1st

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th