Selected Topics in Mobile Security

582699
1-4
Hajautetut järjestelmät ja tietoliikenne
Syventävät opinnot
This course will consist of tutorial style lectures covering two topics: mobile platform security and usable security for mobile devices. Any interested student is welcome to attend the lectures. To get credit (1 CR) for the course, you will need to read one of the reference papers chosen from the list provided by the instructor (you need to agree the paper with the instructor) and write a report (2-4 pages) that summarizes what you learnt from a) the tutorial topics, and b) the reference paper, as agreed with the instructor.
Vuosi Lukukausi Päivämäärä Periodi Kieli Vastuuhenkilö
2012 syksy 10.10-11.10. 1-1 Englanti N. Asokan

Luennot

Aika Huone Luennoija Päivämäärä
Ke 9-12 D122 N. Asokan 10.10.2012-11.10.2012
To 9-12 B222 N. Asokan 10.10.2012-11.10.2012

Yleistä

This course will consist of tutorial style lectures covering two topics: mobile platform security and usable security for mobile devices.  Each lecture takes about 3 hours including time for questions, discussion and a break.  Each lecture has two parts.  The first part will last about 1.5 hours.  The second part will take about an hour. More details about the topics below. 

Prerequisites: To get the most from the tutorials, you need to have taken one undergraduate level course in security or cryptography (or have gained similar level of knowledge by other means) so that you are familiar with basic concepts in security and cryptography.

 

1. Mobile platform security architectures

Abstract:
In the past few years, there has been a dramatic increase in the popularity of the category of mobile phones commonly known as "smartphones". Consequently there is increased interest in the security and privacy research community in "smarpthone security". All dominant smartphone platforms, or more generally, mobile phone application platforms, incorporate platform security architectures that are widely deployed.

In the first part of this tutorial we will briefly explain the reasons why mobile platform security schemes have seen such widespread deployment and go on to discuss and compare some of them in more detail. Based on this analysis we will point out some open problems and possible future directions. In the second part of the tutorial we will present On-board Credentials (http://obc.nokiaresearch.com), a system that we developed over the last few years that makes it possible for developers to make use of existing hardware mobile security features to secure their applications and services.

 

2. Security for the end users: from personal devices to Internet of Things

Abstract:
As computing devices like mobile phones are now reaching billions of end users, it is becoming increasingly important that the security and configuration mechanisms used in these devices are easy to use while still providing sufficient security and without driving up cost.  In the first part of this lecture, we will do an in-depth case study of one such example: how researchers and practitioners came together to address the problem of initalizing and configuring secure communication between personal devices (sometimes known as "first connect"). In the second part, we will list a number of current problems that need solutions that are simultaneously usable and secure.  In particular, we will briefly explain how the scale of the "first connect" problem will increase when the promise of the "Internet of Things" becomes a reality where tens of billions of "things" are connected to the Internet and each user will need to configure and manage their own personal Internet of Things.

 

Lecturer: N. Asokan recently joined the department as a Professor in the NODES group.  Until recently, he was a Distinguished Researcher at Nokia Research Center where he led the Security and Networking Protocols research group. Asokan received his doctorate in Computer Science from the University of Waterloo.  More information at http://cs.helsinki.fi/~asokan

Guest lecturer: Kari Kostiainen is an expert in mobile devices, security and privacy. He has been working with Nokia Research Center in Helsinki and Silicon Valley almost a decade. Kari holds a doctorate in computer science from Aalto University.

 

 

Kurssin suorittaminen

To get credit (1 cr) for the course, you will need to attend all the tutorial sessions on both days as well as read one of the reference papers chosen from the list provided by the instructor (you need to agree the paper with the instructor) and write a report (2-4 pages) that summarizes what you learnt from
a) the tutorial topics, and
b) the reference paper, as agreed with the instructor

 

 

Kirjallisuus ja materiaali

 

Lecture slides:

Reference papers:

 

Paper Assigned to

Mobile Platform Security


Android Permissions Demystified

Asp, Majander
How to Ask For Permission Majander

Towards Taming Privilege-Escalation Attacks on Android

Lindert

On-board Credentials with Open Provisioning
Forsblom

Practical property-based attestation

 

Can hand-held computers still be better smartcards?

 

Authenticated encryption primitives for size-constrained trusted computing

 

Is this App safe?
Yang
 

Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones
Rantanen
 

Key attestation from trusted execution environments

 

How users understand permissions in current systems
Smirnova
 

Usable Security for Mobile Devices


Shake well before use: Authentication based on accelerometer data

Ye

Standards for security associations in personal networks: a comparative analysis (or ask for a copy from instructor)
Svenn
 

Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels

Sun

Secure In-band Wireless Pairing
Puuska
 

Use of Ratings from Personalized Communities for Trustworthy Application Installation
Liu
 

Data security and privacy in wireless body area networks

Lindqvist, Lado-Villar

Scalable and Secure Sharing of Personal Health Records in Cloud
Computing using Attribute-based Encryption

 

Intuitive security policy configuration in mobile devices using
context profiling (ask for paper from instructor)

 

CRePE: Context-Related Policy Enforcement for Android

 

Mobility helps security in ad hoc networks

Peltonen

Seeing-Is-Believing: Using camera phones for human-verifiable authentication

 

Secure device pairing based on a visial channel: design and usability study
Leino