Session

Hack-Proof AI: Securing Mobile Apps with Dynamic SSL Pinning

AI-powered features are revolutionizing mobile apps, but they also introduce serious security risks. Hardcoded API keys, insecure storage, and unprotected network traffic make AI APIs an easy target for attackers.

In this session, we’ll explore how hackers break into AI mobile apps using reverse engineering and man-in-the-middle attacks. More importantly, we’ll cover practical defenses: secure key handling, backend-mediated token exchange, and SSL pinning.

We’ll take it a step further with dynamic SSL pinning — a real-world technique that protects your app against MITM attacks without the limitations of static pinning. Live demos will show attacks in action and how dynamic pinning blocks them while allowing smooth certificate rotation.

Attendees will leave with a clear, actionable checklist for integrating AI APIs safely into Flutter and Android apps. This session is perfect for mobile developers, AI enthusiasts, and security-minded engineers who want to ship AI apps that are both powerful and secure.

>> Key Takeaways:

Understand how attackers exploit AI APIs in mobile apps.
Learn safe storage techniques using Keystore/Keychain + obfuscation.
Implement backend-mediated short-lived tokens for AI API calls.
Learn the difference between static and dynamic SSL pinning.
Apply a practical checklist for secure AI integration in mobile apps.

>> Target Audience:
Developers, Engineers & Security-conscious developers and architects
---

>> Session Type:
Technical talk + live demos

Nachiket Gohil

Lead App Dev | Community Speaker | Product Engineering | App Security

Mumbai, India

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top