Droidcon is India’s first national Android conference and is a part of the worldwide Droidcon series of events. This is a technical conference, for developers by developers.
Sessions are for 45 minutes each (30 speaking, 5 Q&A, 10 transition). We will have three parallel tracks over two days, with 8 sessions per track per day. Workshop sessions are 60 minutes each (50 speaking, 10 minutes for transition between rooms).
We recommend you illustrate your sessions with demos of your own code and applications. Please refrain from making a pitch without explaining how it works, as your primary audience will be developers.
Sessions will be ranked by community voting and selected by a program committee with representation from the local community and the international Droidcon events. Confirmed speakers get free tickets to the event. Anyone who proposes to speak but isn’t confirmed will still get early bird pricing. If you’ve proposed to speak, there’s no need to rush to buy a ticket. We’ll be in touch with you.
Participants may reserve their tickets from http://droidcon.doattend.com.
The event will have three parallel tracks. The list below will be consolidated down to three by the program committee.
Malware, Pen Testing and Exploits
The expected benefits for someone attending this:
- A deeper understanding of the internals and security model
- A survey of current threats with real-life examples
- Reverse engineering, decompiling, application spoofing
- Learning secure coding guidelines
- Studying prevention techniques
Attacks on Android phones are becoming common, especially due to the increasing media attention. We hope to detail the security model, provide a survey of the current threats as well as guidelines describing how best to verify whether an application is malicious or not.
An open mind.
I work as a Security Analyst in the research wing one of India’s largest IT companies. Over the last six months, we have performed extensive research on Android security, malware, application penetration testing, secure development, privilege escalation exploits, customized enterprise-enabled OS builds......