July 27, 2023, 4:52 p.m. | dshetty@securityinnovation.com (Dinesh Shetty)

Application and Cybersecurity Blog blog.securityinnovation.com


Unveiling the World of Mobile Exploitation: ARM Architecture and Beyond


Dinesh Shetty, Director, Security Engineering, Security Innovation


Mobile applications are the obvious target for cyber attacks, but a secure application won't faze a committed cyber adversary. They can exploit any mobile interface—an app, calls to the OS, and background operations. From there, they can easily go after anything they want.

adversary android app application applications architecture arm attacks beyond black hat black hat 2023 cyber cyber attacks director engineering exploit exploitation innovation interface ios mobile mobile applications mobile security operations security security engineering security innovation target understanding world

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)