Although the schedule in the CMS had been updated, I didn't explicitly mention this: This week we will continue with IRM and App Virtualization as the topic (the one from last week); the topic Type Enforcement will not be discussed in this year's iteration of the... Read more
Although the schedule in the CMS had been updated, I didn't explicitly mention this: This week we will continue with IRM and App Virtualization as the topic (the one from last week); the topic Type Enforcement will not be discussed in this year's iteration of the seminar.
Thus, please read the papers on IRM and App Virtualization and prepare questions accordingly. Next week we will continue with Android Malware.
Please note that the seminar on 21.06. has been canceled. The seminar resumes as regular on 28.06.
Please note that the time for the seminar had to change! The new time will be: Friday, 14-16!
The kick-off will take place Wed Apr 17, 16:00-18:00!
Selected Topics in Mobile Security
(Summer Term 2019)
CISPA / Saarland University
In this seminar, we will discuss current results and new problems in the mobile security domain based on relevant scientific papers. The focus of the selected papers lies on Android, given its high popularity among researchers. The topics include usability aspects of Android's permission system and security-relevant APIs, security extensions at different levels of Android's software stack, app analysis, and newly identified attack vectors.
|Location||E9 1 Room 0.07|
|Time||Friday 14:00 - 16:00|
|Meeting||Seminar (Weekly Meeting, depending on number of participants)|
|Number of Students||max. 12|
|Contact||Sven Bugiel (email)|
|Kickoff||17/04/2019 16:00-18:00 , E9 1 room 0.07|
Course structure and grading
The course is structured as a standard seminar. Every week, one student will present an assigned paper about a single topic, which we will then discuss. Prior to this, all students are expected to read the papers carefully and prepare a list of discussion questions. Additionally, every student will write a short report on their assigned papers, in which the presentation should be elaborated in more details and potentially including results of the discussion. Grading will be based on the presentations, report, and general in-class participation.
Registration and pre-requisites
There are no formal pre-requisites beyond a basic knowledge of how computer systems work internally. Having worked with a smartphone as user or app developer, or participation in the Advanced Lecture Mobile Security are beneficial.
Presentation schedule and topics
|03.05. ✓||Permission evolution||
|10.05. ✓||Permission revolution||Mauthe, Noah|
|17.05. ✓||Usability for Developers||Schank, Marvin|
|24.05. ✓||Risks of WebViews||Dobinson, Rhett|
|31.05. ✓||Third Party Libraries||Bäumler, Max|
|07.06. ✓||Smart Home IoT||
|14.06. ✓||UI-based Attacks||
IRM and App Virtualization
|05.07. ✓||Android Malware||Walla, Sebastian|
|12.07. ✓||Secure Computing||Jha, Atul Anand|