Accepted papers GreHack 2012 proceedings

Comments

Transcription

Accepted papers GreHack 2012 proceedings

										                                    

Similar documents

Media:OWASP Mobile App Hacking (AppSecUSA 2014)

Media:OWASP Mobile App Hacking (AppSecUSA 2014) –  Attacks on system integrity […] modify the system in such a way that it can no longer be trusted. […] the attacker might be able to: •  Execute malicious code •  Impersonate a user or server •  ...

More information