About the Seminar
Using methods of research-oriented learning, students will gain the ability to work on a pre-defined scientific topic based on state-of-the-art research publications. This includes a presentation of the contents as well as a discussion of critical aspects of one paper and students will be asked to provide summaries for each session. The seminar concludes with each student providing an outline for an open research question and study methodology that will be reviewed by other course participants.
The seminar combines current scientific work in the area of security and privacy of mobile devices with realistic problem statements. Examples of this are attacks and countermeasures as well as an overview of how the mobile device ecosystem (e.g. Android and iOS) work. The seminar will cover technical aspects as well as the perspective of human-computer-interaction with respect to mobile security and privacy.
How it works
The first two dates are mostly input by the lecturers. After that we will switch to a close reading of research papers. Everyone is asked to prepare and read the papers for each weak. Two students per topic will present their interpretation of the studies after which we discuss the research results.
Using methods of research-oriented learning, students will gain the ability to work on a pre-defined scientific topic based on state-of-the-art research publications. This includes a presentation of the contents as well as a discussion of critical aspects of one paper and students will be asked to provide summaries for each session. The seminar concludes with each student providing an outline for an open research question and study methodology that will be reviewed by other course participants.
The seminar combines current scientific work in the area of security and privacy of mobile devices with realistic problem statements. Examples of this are attacks and countermeasures as well as an overview of how the mobile device ecosystem (e.g. Android and iOS) work. The seminar will cover technical aspects as well as the perspective of human-computer-interaction with respect to mobile security and privacy.
How it works
The first two dates are mostly input by the lecturers. After that we will switch to a close reading of research papers. Everyone is asked to prepare and read the papers for each weak. Two students per topic will present their interpretation of the studies after which we discuss the research results.
- Kursleiter/in: Martin Degeling
- Kursleiter/in: Daniel Klischies
- Kursleiter/in: Dimitri Mankowski
- Kursleiter/in: Veelasha Moonsamy
Semester: ST 2025