This class schedule is preliminary, and will be altered as the semester progresses. While I will try to announce changes as they happen, it is the responsibility of the students to frequently check this web-page for any changes to the schedule, readings or assignments.
Note: The slides will be available after each lecture via a slides link below the lecture topic.
Date | Topics | Readings | Notes |
---|---|---|---|
01/25/2024 | Course Introduction Slides |
1. Ken Thompson, Reflections on Trusting Trust. Turing Award Lecture, 1983. (link) 2. Building your first Android app (link) |
1. Homework 1 assigned; due January 30th at 11:59pm 2. Project Proposal (Milestone 1) assigned; due February 8th at 11:59pm |
01/30/2024 | Android and Security Fundamentals Slides |
Security Engineering, Chapter 1 (link) | Homework 1 due |
02/01/2024 | CLASS CANCELLED, CONFERENCE TRAVEL | February 2nd Last Day to ADD/DROP | |
02/06/2024 | Crypto Basics 1 Slides |
1. Security Engineering, Chapter 5.1-5.5 (link) | |
02/08/2024 | Crypto Basics 2 Slides |
Security Engineering, Chapter 5.6 (link) | 1. Project Proposal due 2. Homework 2 assigned; due February 22nd at 11:59pm |
02/13/2024 | Crypto Basics 3 Slides |
1. Security Engineering, Chapter 5.7 (link) 2. R. Rivest, A. Shamir, and L. Adlemani, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 1978. (link) 3. Creating your own Certificate Authority (link) |
Project Application (Milestone 2) assigned, due March 7th at 11:59pm |
02/15/2024 | SSL/TLS, Cryptography in Mobile Apps Slides |
1. SSL and TLS: A Beginners Guide (link) 2. Anderson, R. 1993. Why cryptosystems fail. In Proceedings of the 1st ACM Conference on Computer and Communications Security (Fairfax, Virginia, United States, November 03 - 05, 1993). CCS ‘93. (link) |
|
02/20/2024 | Access Control Basics Slides |
1. Operating System Security, Chapters 1, 2, and 5 (link) 2. [Part 1 Only] J. Saltzer and M. Schroeder, The Protection of Information in Computer Systems. Proceedings of the IEEE 63(9) (1975) pp. 1278-1308. (link) |
|
02/22/2024 | Managing Privilege in Mobile Apps Slides |
1. Homework 2 due | |
02/27/2024 | Secure Inter-application Communication Slides |
[Sections 1 – 3 only] Adwait Nadkarni, B. Andow, W. Enck, and S. Jha, “Practical DIFC Enforcement on Android,” in Proceedings of the 25th USENIX Security Symposium (USENIX), Austin, TX, USA, 2016, pp. 1119–1136. (link) | |
02/29/2024 | Storage in Mobile Apps Slides |
[Read Previously] 1. Operating System Security, Chapters 1, 2, and 5 (focus on security models) (link) 2. J. Saltzer and M. Schroeder, The Protection of Information in Computer Systems. Proceedings of the IEEE 63(9) (1975) pp. 1278-1308. (link) |
Homework 3 assigned, due March 19th at 11:59pm |
03/05/2024 | Application Security Analysis Goals Slides |
Reaves, B., Bowers, J., Gorski III, S.A., Anise, O., Bobhate, R., Cho, R., Das, H., Hussain, S., Karachiwala, H., Scaife, N. and Wright, B., 2016. * droid: Assessment and Evaluation of Android Application Analysis Tools. ACM Computing Surveys (CSUR), 49(3), p.55. (link) | |
03/07/2024 | Evaluating Security Analysis and Research Methods 1 Slides |
S. Axelsson, The Base-Rate Fallacy and Its Implications for the Difficulty of Intrusion Detection. In Proceedings of the ACM Conference on Computer and Communication Security. November, 1999. (link) | 1. Project Application due 2. Analysis Plan (Milestone 3) assigned; due April 11th at 11:59pm. EXTENDED to April 16th 3. Project Report (Milestone 4) assigned, due on May 2nd at 11:59pm |
03/12/2024 | SPRING BREAK | ||
03/14/2024 | SPRING BREAK | ||
03/19/2024 | Guest Lecture: Crypto-API misuse in the wild (Amit Seal Ami, Prianka Mandal) | Homework 3 due | |
03/21/2024 | NO CLASS, CONFERENCE TRAVEL | March 25th Last Day to Withdraw | |
03/26/2024 | Intro to Static Analysis Slides |
1. Fahl, Sascha, Marian Harbach, Thomas Muders, Lars Baumgärtner, Bernd Freisleben, and Matthew Smith. “Why Eve and Mallory love Android: An analysis of Android SSL (in) security.” In Proceedings of the 2012 ACM conference on Computer and communications security, pp. 50-61. ACM, 2012. (link) 2. [Optional] Egele, Manuel, David Brumley, Yanick Fratantonio, and Christopher Kruegel. “An empirical study of cryptographic misuse in android applications.” In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 73-84. ACM, 2013. (link) |
|
03/28/2024 | Mobile vulnerabilities in IoT, and Liability, in collab with Dr. Iria Guiffrida | Homework 4 assigned, due April 16th at 11:59pm | |
04/02/2024 | Permission Analysis Slides |
1. Enck, William, Machigar Ongtang, and Patrick McDaniel. “On lightweight mobile phone application certification.” In Proceedings of the 16th ACM conference on Computer and communications security, pp. 235-245. ACM, 2009. (link) 2. Felt, Adrienne Porter, Erika Chin, Steve Hanna, Dawn Song, and David Wagner. “Android permissions demystified.” In Proceedings of the 18th ACM conference on Computer and communications security, pp. 627-638. ACM, 2011. (link) |
|
04/04/2024 | Detecting Privacy Leaks Slides |
1. Enck, William, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. “TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones.” ACM Transactions on Computer Systems (TOCS) 32, no. 2 (2014) (link) 2. Arzt, Steven, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, and Patrick McDaniel. “Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps.” Acm Sigplan Notices 49, no. 6 (2014): 259-269.(link) |
|
04/09/2024 | Sound vs Sound(y) analysis Slides |
1. Bonett, R., Kafle, K., Moran, K., Nadkarni, A., & Poshyvanyk, D. (2018). Discovering flaws in security-focused static analysis tools for android using systematic mutation. Proceedings of the USENIX Security Symposium (link) 2. Livshits, Benjamin, Manu Sridharan, Yannis Smaragdakis, Ondřej Lhoták, J. Nelson Amaral, Bor-Yuh Evan Chang, Samuel Z. Guyer, Uday P. Khedker, Anders Møller, and Dimitrios Vardoulakis. “In defense of soundiness: a manifesto.” Communications of the ACM 58, no. 2 (2015): 44-46. (link) |
|
04/11/2024 | Inter-app communication analysis Slides |
1. Chin, Erika, Adrienne Porter Felt, Kate Greenwood, and David Wagner. “Analyzing inter-application communication in Android.” In Proceedings of the 9th international conference on Mobile systems, applications, and services, pp. 239-252. ACM, 2011.(link) 2. Grace, Michael C., Yajin Zhou, Zhi Wang, and Xuxian Jiang. “Systematic Detection of Capability Leaks in Stock Android Smartphones.” In NDSS, vol. 14, p. 19. 2012. (link) 3. [Optional] Felt, Adrienne Porter, Helen J. Wang, Alexander Moshchuk, Steve Hanna, and Erika Chin. “Permission Re-Delegation: Attacks and Defenses.” Proceedings of the USENIX Security Symposium, vol. 30, p. 88. 2011. (link) |
|
04/16/2024 | Malware Basics Slides |
1. Zhou, Yajin, and Xuxian Jiang. “Dissecting android malware: Characterization and evolution.” In Security and Privacy (SP), 2012 IEEE Symposium on, pp. 95-109. IEEE, 2012. (link) 2. Arp, Daniel, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck, and C. E. R. T. Siemens. “DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket.” In NDSS, vol. 14, pp. 23-26. 2014. (link) |
1. Analysis Plan due 2. Homework 4 due |
04/18/2024 | Understanding Mutants for Security: Tutorial (w/ Amit Seal Ami) | Ami, Amit S., Cooper, N., Kafle, K., Moran, K., Poshyvanyk, D., & Nadkarni, A. Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques. Proceedings of the IEEE Symposium on Security and Privacy, 2022. (link) | |
04/23/2024 | Intro to Dynamic Analysis Slides |
[Read Previously] Enck, William, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. “TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones.” ACM Transactions on Computer Systems (TOCS) 32, no. 2 (2014) (link) | |
04/25/2024 | Malware Slides |
Extra Credit assignment Homework 5 assigned, due May 3rd at 11:59pm | |
04/30/2024 | Project Presentations | - | Homework 5, EXTRA CREDIT, due |
05/02/2024 | Finals Review | Zoom | Project Report due |
05/14/2024 | Final Exam, In class | 2 PM - 5 PM |