Please note that we will go to room 0.06 or 0.07, depending on preferences, for today's seminar.
Please note that the room for the seminar kick-off today has changed to room 3.08 in CISPA.
Selected Topics in Mobile Security
(Summer Term 2018)
CISPA / Saarland University
In this seminar, the participants will learn at the example of selected topics from the area of mobile security how to find, summarise, present, and discuss relevant scientific papers. The focus of the selected papers lies on Android, given its high popularity among researchers. The topics include usability aspects of Android's permission system and security-relevant APIs, security extensions at different levels of Android's software stack, app analysis, and newly identified attack vectors.
|Location||E9 1 Room 0.06|
|Time||Wednesday 12:00 - 14:00|
|Meeting||Proseminar (Weekly Meeting)|
|Number of Students||max. 12|
|Contact||Sven Bugiel (email)|
|Kickoff||18/04/2018 12:00 , E9 1 room 3.08|
Course structure and grading
The course is structured as a standard seminar. Every week, one to two students will present assigned papers on a single topic, which we will then discuss. Prior to this, all students are expected to read the papers carefully and prepare a list of discussion questions. Additionally, every student will write a short report on their assigned papers, in which the presentation should be elaborated in more details and potentially including results of the discussion. Grading will be based on the presentations, report, and general in-class participation
Registration and pre-requisites
There are no formal pre-requisites beyond a basic knowledge of how computer systems work internally. Having worked with a smartphone as user or app developer, or participation in the Advanced Lecture Mobile Security are beneficial.
Registration for the course is mandatory and done via the CISPA meta-registration for ProSeminars
Presentation schedule and topics
|16 May, 2018||Franz Schramm||Clone detection|
|30 May, 2018||Janis Schmitt||Meta-information App Analysis|
|13 Jun, 2018||Ferdinand Linnenberg||Secure Computing|
|27 Jun, 2018||Leonard Zitzmann||Permission evolution|