News
Points and grade online in CMSWritten on 10.10.19 by Sven Bugiel The points for the presentation, report, and discussion, as well as the overall grade, are in the CMS. Please check and let me know by tomorrow if you have questions or concerns. Otherwise, I will submit the current grades to the LSF by tomorrow evening. |
Feedback for draft report availableWritten on 04.09.19 by Sven Bugiel Sorry for the longer than expected delay, but the feedback for the draft reports is now available in your list of submissions. I hope your PDF reader can correctly display it. In case you have questions, contact me or make an appointment. Otherwise, looking forward to your final reports. |
Papers for this weekWritten on 24.06.19 by Sven Bugiel Although the schedule in the CMS had been updated, I didn't explicitly mention this: This week we will continue with IRM and App Virtualization as the topic (the one from last week); the topic Type Enforcement will not be discussed in this year's iteration of the seminar. Thus, please read the… Read more Although the schedule in the CMS had been updated, I didn't explicitly mention this: This week we will continue with IRM and App Virtualization as the topic (the one from last week); the topic Type Enforcement will not be discussed in this year's iteration of the seminar. Thus, please read the papers on IRM and App Virtualization and prepare questions accordingly. Next week we will continue with Android Malware. |
Seminar on 21.06. canceledWritten on 16.06.19 by Sven Bugiel Please note that the seminar on 21.06. has been canceled. The seminar resumes as regular on 28.06. |
Time changed!Written on 10.04.19 (last change on 10.04.19) by Sven Bugiel Please note that the time for the seminar had to change! The new time will be: Friday, 14-16! The kick-off will take place Wed Apr 17, 16:00-18:00! |
Selected Topics in Mobile Security
(Summer Term 2019)
CISPA / Saarland University
Overview
In this seminar, we will discuss current results and new problems in the mobile security domain based on relevant scientific papers. The focus of the selected papers lies on Android, given its high popularity among researchers. The topics include usability aspects of Android's permission system and security-relevant APIs, security extensions at different levels of Android's software stack, app analysis, and newly identified attack vectors.
Logistics
Location | E9 1 Room 0.07 |
Time | Friday 14:00 - 16:00 |
Meeting | Seminar (Weekly Meeting, depending on number of participants) |
Number of Students | max. 12 |
Instructor | Sven Bugiel |
Contact | Sven Bugiel (email) |
Language | English |
Kickoff | 17/04/2019 16:00-18:00 , E9 1 room 0.07 |
Course structure and grading
The course is structured as a standard seminar. Every week, one student will present an assigned paper about a single topic, which we will then discuss. Prior to this, all students are expected to read the papers carefully and prepare a list of discussion questions. Additionally, every student will write a short report on their assigned papers, in which the presentation should be elaborated in more details and potentially including results of the discussion. Grading will be based on the presentations, report, and general in-class participation.
Registration and pre-requisites
There are no formal pre-requisites beyond a basic knowledge of how computer systems work internally. Having worked with a smartphone as user or app developer, or participation in the Advanced Lecture Mobile Security are beneficial.
Registration is handled via the central registration system of the UdS.
Presentation schedule and topics
Date | Topic | Presenter |
03.05. ✓ | Permission evolution |
Castro, Gonzalo
|
10.05. ✓ | Permission revolution | Mauthe, Noah |
17.05. ✓ | Usability for Developers | Schank, Marvin |
24.05. ✓ | Risks of WebViews | Dobinson, Rhett |
31.05. ✓ | Third Party Libraries | Bäumler, Max |
07.06. ✓ | Smart Home IoT |
Klingner, Soeren
|
14.06. ✓ | UI-based Attacks |
Dawoud, Huda
|
28.06. ✓ |
IRM and App Virtualization |
Andrey Eganov |
05.07. ✓ | Android Malware | Walla, Sebastian |
12.07. ✓ | Secure Computing | Jha, Atul Anand |
19.07. | Clone Detection |
Becker, Christian
|