Back close

Course Detail

Course Name Mobile Security
Course Code 24CY753
Program M. Tech. in Cyber Security
Credits 3
Campus Coimbatore

Syllabus

Syllabus

Security of Mobile Networks: Security for Wi-Fi, Telecom, Personal Area Networks, Near Field Communications – Bluetooth, NFC. Security of Mobile Applications: Payments, VoIP, Multimedia. Security of Mobile Platforms: Android, iOS, Windows Phone. Security of Mobile Services: WAP, Mobile HTML, SMS, Location – Android App development- Activities, Intents, Fragments, Data storage, Broadcast receivers and Content Providers, Services, Async Tasks, GPS and GoogleMaps, Sensors, Connecting WebAPIs, Emulator and ADB, APK Internals, Networking, Device Rooting, TCP/IP Attacks, TCP/IP Attacks Using Android, DAC and MAC Permissions, Android Internals, Framework, Init, Zygote, Binder, Service Manager, Activity Manager, TEE, Reverse Engineering- Apktool, Ghidra, Jadx, code review, Static and Dynamic analysis, runtime instrumentation and smali patching, Native Library Exploitation, OWASP, Security Assessment with Drozer and Burpsuite, Some of the attacks and Vulnerabilities in real world android apps (A case study) – XSS, Strandhogg, Code Injection -Overlay Attacks, Insecure Deep links, Malware Analysis, Bouncer, Privacy Violation, System Call Hardening, ASLR, ROP, Framework Exploits. iOS application and app store, decrypting iOS app, iOS app analysis. 

Objectives and Outcomes

Prerequisite

24CY605: Secure Coding, 24CY682: Cyber Security lab

 

Course Outcome
 

Course Outcome  

Bloom’s Taxonomy Level  

CO 1 

Android Application development and APK internals 

L6  

CO 2 

Understanding the internals of Mobile OS and study the 

architecture, design and security of mobile computing 

L3  

CO 3 

Exploring the Reverse Engineering tools and methodologies 

L4  

CO 4 

Familiarize the attacks and Vulnerabilities in apps 

L3  

CO 5 

Android Code Protection: Past, Present and Future Directions 

L4/L5  

 
CO-PO Mapping

CO-PO Mapping  

CO/PO  

PO 1 

PO 2 

PO 3 

PO 4 

PO 5 

PO 6 

PO 7 

PO 8 

PO 9 

PO 10 

PSO1 

PSO2 

PSO3 

CO 1 

– 

– 

CO 2 

– 

– 

CO 3 

– 

– 

CO 4 

– 

– 

CO 5 

– 

– 

Text Books / References

  1. Y. Karim, Embedded Android , Vol. 1, O’Reilly Media, 2013. 
  2. E. Nikolay, Android Security Internals: An In-Depth Guide to Android’s Security Architecture , No Starch Press, 2014. 
  3. Dominic Chell, Tyrone Erasmus, Shaun Colley, and Ollie Whitehouse, The Mobile Application Hackers Handbook , Wiley 2015. 

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now