Mobile Security

This module explores mobile security, focusing on the protection of mobile devices and the data they contain. It covers threats unique to mobile platforms, security practices for apps and data, and strategies for securing mobile communications and transactions.

Portal > Cybersecurity > Mobile Security

Curriculum Builder

Boudriga, Nourredine A. “Security of Mobile Communications,” Taylor & Francis Ltd, 2009.

Dviwedi, Himanshu, Clark, Chris, and David Thiel. “Mobile Application Security”, 1st Edition, McGraw-Hill, 2010.

Tamma, Rohit, Skulkin, Oleg, Mahalik, Heather, and Satish Bommisetty. “Practical Mobile Forensics,” Third Edition, Packt Publishing Ltd, 2018.

Doherty, Jim. “Wireless and Mobile Device Security,” 2nd ed, 2021

Mutchler, Patrick, Mitchell, John, Doupé, Adam, Vigna, Giovanni, and Chris Kruegel. “A Large-Scale Study of Mobile Web App Security,” Mobile Security Technologies Workshop, 2015.

Jialiu Lin, Bin Liu, Norman Sadeh, and Jason I. Hong. “Modeling users’ mobile app privacy preferences: restoring usability in a sea of permission settings.” In Proceedings of the Tenth USENIX Conference on Usable Privacy and Security (SOUPS ’14). USENIX Association, USA, 199–212, 2014.

Bin Liu et al. “Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions.” In Proceedings of the 12th Symposium on Usable Privacy and Security (SOUPS ’12), 2016.

Pan et al. “Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps.” 2017. 10.14722/ndss.2017.23265.

Alrawi et al. “The Betrayal At CloudCity: An Empirical Analysis Of Cloud-Based Mobile Backends.” In Proc. 28th USENIX Security Symposium (Security ’19), Santa Clara, CA, 2019. URL: https://www.usenix.org/sites/default/files/conference/protected-files/sec19_slides_alrawi.pdf