Inhalt
| Inhalt |
Security in Mobile Systems moves from the hardware layer in two branches up the network layers and from OS to applications and data security in mobile systems.
Hinweis: Erster Termin am 20.03. |
| Literatur |
Announced in the lecture |
| Lernziele |
Upon successful completion of this module, students will be able to:
- assess the fundamental trade-offs between energy efficiency, computational performance, and cryptographic strength in resource-constrained environments.
- architect end-to-end security solutions that replace traditional perimeter-based trust with a "Zero Trust" framework accounting for typical the mobile adversary capabilities.
- evaluate the security implications of physical-layer phenomena, including signal propagation and distance bounding, as primary defenses against relay and proximity attacks.
- analyze the security of wide-area network protocols compared to wireless local and personal area networks.
- model sensor-based side-channels to mitigate unintended data leakage from mobile hardware.
- examine hardware roots of trust and Trusted Execution Environments (TEEs) as the basis for establishing isolation in modern mobile systems-on-chip.
- deconstruct modern mobile operating system architectures to understand the formal implementation of mandatory access control and application sandboxing at the kernel level.
- systematically identify common software vulnerabilities by applying both static and dynamic analysis methodologies to compiled mobile application binaries.
- systematically identify common software vulnerabilities by applying both static and dynamic analysis methodologies to compiled mobile application binaries.
|
| Voraussetzungen |
Formal requirements: None
Recommended knowledge from or equivalent to the lectures:
- Datensicherheit
- Systemsicherheit
- Netzwerke
- Internet
|
| Leistungsnachweis |
Portfolio:
- Reading Club:
- Reading seminal and relevant papers every week
- Preparation of discussions about the papers by all students in turn
- Oral exam
|
| Lerninhalte |
- Introduction and Threat Modeling
- Physical Layer Security
- Personal (PAN) and Local Area Networks (WLAN)
- Wide Area (WAN) and IoT Infrastructure
- Geopositioning and Sensor Attacks
- Hardware Security and TEE
- Mobile Operating System Security
- Application and Data Security
|