Back close

Course Detail

Course Name Mobile Security and Vulnerability Analysis
Course Code 21SN635
Program M. Tech. in Cyber Security Systems & Networks
Credits 3

Overview

History of smartphones, smartphone application, Android Hardware Architecture Layer, IPC Mechanism in Android, Android OS Internals – Android’s Init, Zygote, Binder Activity Manager, Package Manager, Google Security Services, SELinux, verified boot, Data Encryption, ARM Trustzone. Security of Mobile Networks: Security for Wi-Fi, Telecom, Personal Area Networks, Near Field Communications – Bluetooth, NFC. Android Application development, Development Tools, Application Runtime, Application Framework, Building an App, App Components, Android Debugger, Android Package (apk). App Components – Activity, Services, Broadcast Receivers, Content Providers, Intent, Intent Receivers, Android Manifest. Linux Networking Refresher– Ports, Sockets, Java Networking, Linux/Android IPTables, Android Virtual Devices – Emulator Networking, File Systems, Android Permissions, Login Credentials, Reverse engineering of APKs – apk structure and internals, Native Libraries, System Logs. Testing and Securing – Data Storage, Cryptography, Authentication, Network API, Platform API. iOS application and app store, decrypting iOS app, iOS app static analysis

TEXT BOOKS/REFERENCES

  1. NikolayElenkov, “An In-Depth Guide to Android’s Security Architecture”,October 2014, 432 pp. ISBN: 978-1-59327-581-5
  2. KarimYaghmour, “Embedded Android”, O’Reilly Media, Inc., 2013, 412 pp; WSU Safari Books Online 9781449327958
  3. Joseph Annuzzi, Jr., Lauren Darcey, Shane Conder, “Introduction to AndroidApplication Development: Android Essentials”, Fourth Edition, Addison-WesleyProfessional, 2013
  4. Adapted Materials from Android and iOS development sites.

Course Outcomes

  • CO1: Understand internals of Android Operating System, security model of Android and iOS (PSO1,PSO2)
  • CO2: Understand how to make use of relevant tools to inspect and understand working of Android and iOS application (PSO1,PSO2)
  • CO3: Learn how to identify vulnerable codebase and insecure configuration of application components (PSO2,PSO3)
  • CO4: Learn how to reverse engineer and perform advanced static analysis (PSO1,PSO4)

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now