
Caner Kaya
Product Owner - Android Security
Oslo, Norway
Actions
Caner Kaya is the Product Owner at Promon, shaping the future of a security product he previously spent over six years securing as a lead Security Software Engineer. With more than seven years dedicated to Android security, Caner possesses a rare expertise forged from years of both building and breaking mobile applications. As a passionate reverse engineer, he has a proven track record of uncovering critical vulnerabilities and dissecting sophisticated malware, making him a recognized authority in the mobile cybersecurity landscape.
His unique perspective, informed by deep hands-on security experience at companies like Telenor and TietoEVRY, now drives the product's strategic vision. Caner is committed to advancing mobile security by leading the creation of solutions built on a deep, offensive-security mindset.
Area of Expertise
Topics
Hacking the Hackers’ Code: Inside Android Malware
In this session, we dive deep into the world of Android malware, focusing on how threat actors exploit the platform's Accessibility Service to gain control over devices. Accessibility Service, designed to assist users with disabilities, has become a common target for malware developers due to its powerful capabilities.
Through live demonstrations and real-world case studies, we will reverse-engineer a malicious app to reveal the tactics hackers use to bypass security measures and manipulate this critical service. Attendees will gain insights into identifying, dissecting, and mitigating these threats, enhancing their ability to protect Android users from sophisticated attacks.
Join us as we "hack the hackers" and uncover the hidden workings behind some of the most dangerous malware targeting Android.
How to attack (and secure) an Android app: an introduction
Android applications can be attacked in a multitude of ways. This workshop will give an introduction to some of the most popular attacks. It will explain how the attacks work in theory, demonstrate how they can be done in practice, with which tools, and discuss possible ways an app developer can protect against them.
The following attacks will be discussed:
Accessibility Service Abuse: How many strains of malware exfiltrate data from apps
Reverse Engineering: Understanding how a compiled application works to retrieve potential secrets it contains.
Repackaging: Modifying an application on disk to change its behavior.
Hooking: Modifying an application in memory to change its behavior.
Debugging: Using a debugger to observe and manipulate the execution of an application.
This hands-on workshop will give developers clear insight into the tools, methodologies, and techniques attackers use to break into apps and what techniques developers can implement quickly to defend against those attacks.
Hacking the Hackers’ Code: Inside Android Malware
In this session, we dive deep into the world of Android malware, focusing on how threat actors exploit the platform's Accessibility Service to gain control over devices. Accessibility Service, designed to assist users with disabilities, has become a common target for malware developers due to its powerful capabilities.
Through live demonstrations and real-world case studies, we will reverse-engineer a malicious app to reveal the tactics hackers use to bypass security measures and manipulate this critical service. Attendees will gain insights into identifying, dissecting, and mitigating these threats, enhancing their ability to protect Android users from sophisticated attacks.
Join us as we "hack the hackers" and uncover the hidden workings behind some of the most dangerous malware targeting Android.
Appdevcon 2025 Sessionize Event
DevFest Stockholm 2025 Sessionize Event
droidcon Lisbon 2023 Sessionize Event
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top