Mobile Security

This module explores mobile security, focusing on the protection of mobile devices and the data they contain. It covers threats unique to mobile platforms, security practices for apps and data, and strategies for securing mobile communications and transactions.

Portal > Cybersecurity > Mobile Security

Curriculum Builder

Alrawi, Omar, Chaoshun Zuo, Ruian Duan, Ranjita Pai Kasturi, Zhiqiang Lin, and Brendan Saltaformaggio. “The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends,” 551–66, 2019.

https://www.usenix.org/conference/usenixsecurity19/presentation/alrawi

Pan, Xiaorui, Xueqiang Wang, Yue Duan, XiaoFeng Wang, and Heng Yin. “Dark Hazard: Learning-Based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps.” In Proceedings 2017 Network and Distributed System Security Symposium. San Diego, CA: Internet Society, 2017.

https://doi.org/10.14722/ndss.2017.23265

Liu, Bin, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun Zhang, Norman Sadeh, Alessandro Acquisti, and Yuvraj Agarwal. “Follow My Recommendations: A Personalized Assistant for Mobile App Permissions.” In Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 199–212. SOUPS ’16. Denver, CO: USENIX Association, 2016.

https://www.usenix.org/conference/soups2016/technical-sessions/presentation/liu

Lin, Jialiu, Bin Liu, Norman Sadeh, and Jason I. Hong. “Modeling Users’ Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings.” In Proceedings of the Tenth USENIX Conference on Usable Privacy and Security, 199–212. SOUPS ’14. USA: USENIX Association, 2014.

Mutchler, Patrick, Adam Doup, John Mitchell, Chris Kruegel, and Giovanni Vigna. “A Large-Scale Study of Mobile Web App Security,” 2015.

Doherty, Jim. Wireless and Mobile Device Security. 2nd ed. ISSA. Burlington, Massachusetts: Jones & Bartlett Learning, 2022.

Bommisetty, Satish, Heather Mahalik, Oleg Skulkin, Rohit Tamma, and Igor Mikhaylov. Practical Mobile Forensics: A Hands-on Guide to Mastering Mobile Forensics for the IOS, Android, and the Windows Phone Platforms. 3rd ed. Birmingham: Packt Publishing, 2018.

Dwivedi, Himanshu, Chris Clark, and David Thiel. Mobile Application Security. New York: McGraw-Hill, 2010.

Boudriga, Noureddine. Security of Mobile Communications. Auerbach Publications, 2009.

Thank you for signing up to our newsletter!

Thank you! RSVP received for Alrawi, Omar, Chaoshun Zuo, Ruian Duan, Ranjita Pai Kasturi, Zhiqiang Lin, and Brendan Saltaformaggio. “The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends,” 551–66, 2019.

Thank you for applying! We will be in touch.

Apply for: Alrawi, Omar, Chaoshun Zuo, Ruian Duan, Ranjita Pai Kasturi, Zhiqiang Lin, and Brendan Saltaformaggio. “The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends,” 551–66, 2019.

Alrawi, Omar, Chaoshun Zuo, Ruian Duan, Ranjita Pai Kasturi, Zhiqiang Lin, and Brendan Saltaformaggio. “The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends,” 551–66, 2019.

Loading...

Loading…