Teaching Android Mobile Security

Conference object English OPEN
Lalande, Jean-François; Viet Triem Tong, Valérie; Graux, Pierre; Hiet, Guillaume; Mazurczyk, Wojciech; Chaoui, Habiba; Berthomé, Pascal;
(2019)
  • Publisher: ACM Press
  • Related identifiers: doi: 10.1145/3287324.3287406
  • Subject: [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]

International audience; At present, computer science studies generally offer courses addressing mobile development and they use mobile technologies for illustrating theoretical concepts such as operating system, design patterns, and compilation because Android and iOS u... View more
  • References (26)
    26 references, page 1 of 3

    [1] Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L Mazurek, and Christian Stransky. 2016. You Get Where You're Looking for: The Impact of Information Sources on Code Security. In IEEE Symposium on Security and Privacy. IEEE Computer Society, 289-305. https://doi.org/10.1109/SP.2016.25

    [2] Jeremy Andrus and Jason Nieh. 2012. Teaching operating systems using android. In 43rd ACM technical symposium on Computer Science Education. ACM Press, Raleigh, North Carolina, USA, 613-618. https://doi.org/10.1145/2157136.2157312

    [3] Dimitris Apostolopoulos and Giannis Marinakis. 2013. Discovering authentication credentials in volatile memory of Android mobile devices. In 12th IFIP Conference on e-Business, e-Services, e-Society. Athens, Greece, 178-185. https://doi.org/10.1007/978-3-642-37437-1_15

    [4] Muhammad Rizwan Asghar and Andrew Luxton-Reilly. 2018. Teaching Cyber Security Using Competitive Software Obfuscation and Reverse Engineering Activities. In 49th ACM Technical Symposium on Computer Science Education - SIGCSE '18. ACM Press, Baltimore, MD, USA, 179-184. https://doi.org/10.1145/ 3159450.3159489

    [5] Jennifer Campbell and Anya Tafliovich. 2015. An Experience Report: Using Mobile Development To Teach Software Design. In 46th ACM Technical Symposium on Computer Science Education - SIGCSE '15. ACM Press, Kansas City, MO, USA, 506-511. https://doi.org/10.1145/2676723.2677307

    [6] Nikolay Elenkov. 2014. Android Security Internals: An In-Depth Guide to Android's Security Architecture. No Starch Press.

    [7] William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. 2010. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In 9th USENIX Symposium on Operating Systems Design and Implementation. USENIX Association, Vancouver, BC, Canada, 393-407.

    [8] Andrey Esakia, Shuo Niu, and D. Scott McCrickard. 2015. Augmenting Undergraduate Computer Science Education With Programmable Smartwatches. In 46th ACM Technical Symposium on Computer Science Education - SIGCSE '15. ACM Press, Kansas City, MO, USA, 66-71. https://doi.org/10.1145/2676723.2677285

    [9] Sheran Gunasekera. 2012. Android Apps Security. Apress.

    [10] Minzhe Guo, Prabir Bhattacharya, Ming Yang, Kai Qian, and Li Yang. 2013. Learning mobile security with android security labware. In 44th ACM technical symposium on Computer science education - SIGCSE '15. ACM Press, Kansas City, MO, USA, 675-680. https://doi.org/10.1145/2445196.2445394

  • Related Research Results (4)
  • Metrics
Share - Bookmark