Mobile Hacking Conference Talk
Djini in a Bottle:
Faster Exploits, Same Chaos
By Ken Gannon
Thank you!
Bio
Ken Gannon
Ken Gannon (伊藤 剣), also known as “Yogehi,” is a mobile security researcher specializing in Android internals, exploit development, and real-world vulnerability discovery.
He has demonstrated high-impact mobile exploit chains at competitions such as Pwn2Own Mobile, earning recognition for practical attacks against flagship devices.
Ken focuses on application security abuse, deep-link flaws, and automation of offensive testing, and contributes to tools that help scale mobile security research. When not reversing APKs, he is usually sharing findings with the community or proving that most “impossible” bugs just need more stubbornness.
Ken is also the trainer inside our Advanced Android Hacking course, where he shows you what it takes to Pwn2Own and breaks down the record breaking 11-link exploit chain.
He has demonstrated high-impact mobile exploit chains at competitions such as Pwn2Own Mobile, earning recognition for practical attacks against flagship devices.
Ken focuses on application security abuse, deep-link flaws, and automation of offensive testing, and contributes to tools that help scale mobile security research. When not reversing APKs, he is usually sharing findings with the community or proving that most “impossible” bugs just need more stubbornness.
Ken is also the trainer inside our Advanced Android Hacking course, where he shows you what it takes to Pwn2Own and breaks down the record breaking 11-link exploit chain.
Write your awesome label here.
