Mobile devices such as smartphones and tablets have become very popular within the last decade. Unfortunately, this popularity has also made them a frequent target for adversaries such as malware authors. This seminar deals with various security-related topics around mobile devices including attacks and defenses against them. Moreover, students are supposed to learn basic concepts of mobile forensics, for instance, to retrieve forensic evidence from an infected device.
10.04. 15:00 - 17:00 h
Primer on academic writing, assignment of topics
24.04. - 30.04.
Arrange appointment with assistant
Submit final paper proposal
Submit review of two fellow students
Submit camera-ready version of your paper
05.07. 10:00 - 18:00 h
Presentation with cookies
The seminar is organized like a real academic conference. You need to prepare a written paper (German or English) about the selected topic with 8-10 pages in ACM double-column style.
After submitting your paper at our conference system, you will write two short reviews about two of the papers submitted by your fellow students. In this way, you can give them feedback about how to improve their paper. Then, you will have time to improve your own final paper with reviews from the others.
Last but not least, you will give a 20-25 minutes talk about your paper and we will provide cookies to enjoy the talks at our small conference.
News and important information will be distributed via a mailing list. All participants should subscribe here to receive relevant updates.
▸ Mobile Malware
Learn about the prevalence and evolution of mobile malware for Android/iOS and present findings and challenges in malware detection.
▸ Security Concepts of Mobile Devices
Present the security concepts of Android/iOS and compare their strengths and weaknesses.
▸ Security of Authentication Approaches
There are multiple user authentication schemes for Android and iOS devices. Present the different approaches and their known security flaws.
▸ Root Exploits & Jailbreaks
Provide an introduction into known techniques for bypassing the security measures of Android/iOS and discuss possible countermeasures.
▸ Mobile Disk Encryption
Present and compare the different encryption approaches for mobile devices, including known flaws and attacks.
▸ Mobile Device Fingerprinting
Present the different fingerprinting approaches targeting mobile devices. Discuss the different countermeasures.
▸ Privacy Leakage from Mobile Devices
Mobile devices concentrate a growing amount of sensitive data. The leakage of this data is a serious concern. Present different attacks that target this private data. Which countermeasures are available?
▸ Trusted Execution Environments (TEE)
Introduce the concept of trusted execution environments. Present the security approaches utilizing TEEs in the iOS/Android context and discuss their strengths and weaknesses.