Você está na página 1de 2
suowoe ‘Andro ntornals ane Security by Prabhaker Matt Teo 4 CEG 4900/6900: Android Internals and Security WH GHT STATE ‘ TVERSITY — Prabhaker Mateti Catalog Description: Study the internals of the Android mobile OS. Study the Messaging, Graphics, Audio, Video, nera, GPS, Networking, File System, Touch Sensors, and other subsystems. Study the combined impact of these on the architecture, design, and security of mobile computing, in the context of Android. Pre-requisite: CS 3100 Data Structures Recommended Pre-requisite: CEG 4350. Source Material 1, Home Page http://www es, wright edu/~pmateti/Courses/4900/Top: 2. Nikolay Elenkov, "An In-Depth Guide to Android's Security Architecture", ttps:// www.nostarch.com/ androidsecurity . October 2014, 432 pp. ISBN: 978-1-59327-581-5 3.Karim Yaghmour, Embedded Android, O'Reilly Media, Inc, 2013, 412 pp, safaribooksonline 9781449327958 4. Joseph Annuzzi, Jr, Lauren Darcey, Shane Conder, Introduction to Android Application Development: Android Essentials, Fourth Edition, Addison-Wesley Professional, 2013, 672pp safaribooksonline 9780133477306 5. Adapted Materials from Android development sites Learning Outcomes 1, Design of system and applications on Android, 2, Recognize the impact of integrating media services, location services, in the context of mobile messaging devices on privacy and security. Attendance Full attendance is expected. Course Content Lab work is a significant part of this course. The ordering of lectures, in contrast to the course content topics listed below, is largely due to this influence. 1. OS refresher; TCP/IP Refresher; Mobile Systems Characteristics; 2. 3 Design of Mobile OS, Android Internals, API . Application Software Design for Android, 4, Tour of: Android Open Source Project (AOSP), CyanogenMod; Building a ROM; Linaro Network Security; Linux Security; Android Security; Location Based Services; Pocket Spy . Android Permissions System . Mobile Malware . Privacy Violations Hot Topics in Security Mobile-, Cloud-, Ubiquitous-, Pervasive- Computing epsiloncs wright edu~pmateiCoursesi4900/Top!¢800-slabus em 12 suowoe ‘Andro ntornals ane Security by Prabhaker Matt Exams There are two exams contributing 30% and 30% to the final grade. The mid term is scheduled around the sixth week, and the final during the exam week as set by the Registrar. Programming Projects The programming projects contribute 40% to the final grade. I expect to give four projects. Projects must be submitted by midnight on the due date posted. The subject matter of these projects is included in the exam. All lab work can be conducted within various WSU computer labs. But, itis highly recommended that you setup your own desktop/laptop for this work. In this course, a project generally will begin with studying the source code tree given to you. It may require you to build an executable after suitable reconfiguration using tools such as make, and IDEs such as Intellij Idea. The code will be in Java for Android, The projects are to be performed by the student individually. This must be work done solely by ‘you, except for the parts I provided/agreed Homework Assignments There are no homework assignments to be turned in. CEG 6900 Students enrolled in CEG 6900 are required to do a term paper based on reading at least two conference/journal papers on Android Security published in the last two years, and not already discussed in the course. Copyright © 2015 + pmateti@wright.edu ples wright ecupmatesiCourses!4900"Top!¢S00-sflabus em 2p

Você também pode gostar