Josh Thomas began his career 14 years ago in network administration andsoftware development. Prior to moving his focus primarily to security, Joshwrote Artificial Intelligence and cryptographic solutions for the Departmentof Defense. Josh has extensive hands on knowledge of mobile devices andcellular infrastructure. He is also dedicated to hardware reverse engineeringand embedded device exploitation. Josh most recently was a Senior ResearchScientist with Accuvant's Applied Research team, and has worked as a SeniorResearch Developer at The MITRE Corporation. At MITRE, Josh performed analysesof the Android, Apple, Symbian and BlackBerry security models as well as othernon-mobile embedded platforms and worked closely with the vendors and projectsponsors. Josh also developed an open-source mesh networking solution forSmart phone communications that bypasses the need for physical infrastructure,performed advanced spectrum analysis for cleared communications, and designeda secure satellite communications system required to handle the most sensitivecommunications possible while also being resilient against the highest levelsof waveform interference. Prior to his tenure at The MITRE Corporation, Joshdeveloped Artificial Intelligence and embedded cryptographic solutions forGeneral Dynamics and other organizations. Josh projects including the designand development of robust routing architecture for UAV/UGV autonomousvehicles, battlefield troop movement predictive scenario generation, andcreation of mathematical models the controlled de-orbit and reentry of the MirSpace Station.
Can You Trust Me Now? An Exploration into the Mobile Threat Landscape