Assunto: Re: Convite - Palestra de divulgação do Desafio de Ideias para Android - 17/08 - 14h00 - Auditorio do IM
Pessoal,
Relembrando a palestra da
Positivo.
Contamos com a presença de todos!!
Peço a gentileza de divulgar a sua lista de contatos, para possíveis interessados.
Peço desculpas por eventuais duplicatas.
=========
Ocorrerá na UFBA, no dia 17/08/2012 (sexta), as 14h00, no auditório do IM, uma palestra de apresentação do Desafio Positivo !
As 20 melhores ideias serão premiadas e a melhor ideia será implementada pela Positivo e o proponente será parceiro do projeto com 50% do lucro sobre as vendas!!
Nessa palestra você poderá tirar dúvidas e entender melhor o desafio!!
No evento haverá uma palestra internacional da Dra. Adrienne Porter Felt, pesquisadora da Google, doutora pela Universidade da California, Berkeley.
Palestrante InternacionalAdrienne
Porter Felt is a security and privacy researcher, currently focusing on
smartphone and web technologies. Her recent work has centered on
Android security. Starting in September 2012, she will be a research
scientist at Google. She received a Ph.D. in Computer Science from the
University of California, Berkeley, in 2012. Her awards include the
Facebook Fellowship, Google Anita Borg Scholarship, and National Science
Foundation Graduate Research Fellowship.
Android application development represents an immense opportunity for individual
developers: some startup Android applications have reached tens of millions of
users. However, a security mistake in an application can lead to privacy
breaches for users and embarrassment for companies. This talk will present the
basics of secure Android application development. I'll cover how to use the
message passing system in a secure fashion, how to protect your application's
data, and how to request the right permissions for your application.
I will then discuss some of my research on the effectiveness of Android's
permission system. Permissions are intended to provide "defense in depth" by
restricting the scope of vulnerabilities. However, permissions will only
mitigate vulnerabilities if developers request minimal sets of permissions. I
built a static analysis tool, Stowaway, that detects extra permissions in
Android applications. Using Stowaway, I found that about one-third of
applications request extra permissions; after investigating, I found evidence
that developers are trying to request minimal sets of permissions but sometimes
make mistakes. I will discuss the common developer errors that we observed, as
well as the lessons learned for designers of future permission systems.