Mobile devices such as smartphones and tablets have become very popular within the last decade. Unfortunately, this popularity has also made them a frequent target for adversaries such as malware authors. This seminar deals with various security-related topics around mobile devices including attacks and defenses against them. Moreover, students are supposed to learn basic concepts of mobile forensics, for instance, to retrieve forensic evidence from an infected device.
The seminar is organized like a real academic conference. You need to prepare a written paper (German or English) about the selected topic with 8-10 pages in ACM double-column style.
After submitting your paper at our conference system, you will write two short reviews about two of the papers submitted by your fellow students. In this way, you can give them feedback about how to improve their paper. Then, you will have time to improve your own final paper with reviews from the others.
Last but not least, you will give a 20-25 minutes talk about your paper and we will provide cookies to enjoy the talks at our small conference.
News and important information will be distributed via a mailing list. All participants should subscribe here to receive relevant updates.
Learn about the prevalence and evolution of mobile malware for Android/iOS and present findings and challenges in malware detection.
Present the security concepts of Android/iOS and compare their strengths and weaknesses.
There are multiple user authentication schemes for Android and iOS devices. Present the different approaches and their known security flaws.
Provide an introduction into known techniques for bypassing the security measures of Android/iOS and discuss possible countermeasures.
Present and compare the different encryption approaches for mobile devices, including known flaws and attacks.
Present the different fingerprinting approaches targeting mobile devices. Discuss the different countermeasures.
Mobile devices concentrate a growing amount of sensitive data. The leakage of this data is a serious concern. Present different attacks that target this private data. Which countermeasures are available?
Introduce the concept of trusted execution environments. Present the security approaches utilizing TEEs in the iOS/Android context and discuss their strengths and weaknesses.