Seminar: Research Seminar on Mobile Security

58313305
3
Networking and Services
Advanced studies
Year Semester Date Period Language In charge
2013 autumn 03.09-08.10. 1-1 English N. Asokan

Lectures

Time Room Lecturer Date
Tue 10-12 C220 N. Asokan 03.09.2013-08.10.2013
Tue 10-12 C220 N. Asokan 15.10.2013-15.10.2013

General

More information about the seminar in the seminar wiki page.

This is a research seminar intended for students who are doing (or will soon begin doing) research in mobile security.  The course will be structured as a reading group.  We will cover mobile software platform security (e.g., access control architectures in Android), hardware-based trusted execution environments, and usability of security/privacy mechanisms on mobile devices.

At the end of the seminar, students will have developed a better understanding for recent research in the areas and an appreciation for open issues.

The first day will be an introductory lecture by the instructor.  On subsequent days, the instructor will assign 1-2 recent research papers per day.  All participants are required to read the assigned papers before class (plus any additional paper referenced in the assigned paper that are necessary to understand the assigned papers).  One participant (discussion leader) will be assigned to lead the discussion on every paper by briefly presenting a summary of the paper, identifying issues to discuss and leading the discussion.  Another participant (note taker) will be assigned to take notes during the discussion.  The discussion leader and note taker will consolidate the notes during the week and will present a summary of the discussion during the following week.

Students will be encouraged to submit a short research proposal by the end of the course.  A good research proposal can lead to a special assignment for extra credit.

Participation will be limited to a maximum of 10 people.  Preference will be given to students who 

  • have already taken undergraduate-level courses in security/cryptography, operating systems, computer architecture and usability/interaction-design, and
  • either intend to do their research in mobile security or have a significant mobile security angle in their research work.

Therefore, when you sign up for the course, take care to describe clearly

  • what level of course work you have already done in the above areas,
  • your current (or intended) research topic for your thesis/dissertation, and
  • why you want to take this course ("I need the credits" is not a good enough reason!)

Completing the course

To complete the course you would need to

  • participate in all of the sessions (unless you can convince the instructor that you have a valid reason for missing a session)
  • lead the discussion during one meeting by presenting the papers assigned for that day
  • take notes of the discussion during one meeting and presenting a summary during the following meeting
  • read the papers assigned for every week and participate actively in the discussion

Your grade will depend on:

  • how actively you participate in the discussion
  • how well you present your assigned paper for which you are the discussion leader and how well you ead the subsequent discussion
  • how well you summarize the discussion for the paper for which you are the note-taker
  • the quality of the short research proposal, should you choose to submit one at the end of the course.

There will be no exam.