[an error occurred while processing this directive] Software Engineering at Oxford | Mobile Systems Security ( MSS ) [an error occurred while processing this directive]
MSS

Mobile Systems Security

Mobile phones have had a very significant impact on individuals and businesses over the past ten years and their influence continues to grow. Their technologies are also being incorporated into a variety of other mobile systems. Very significant amounts of personal data, financial data, and corporate data are being carried around on devices which are increasingly prone to data loss through both theft and software-based attack. Even in businesses the security of mobile devices is often still ignored. For both the development of new functionality and the emergence of new security threats, these mobile platforms are the centre of attention, moving focus away from PC and laptop devices. Ensuring and maintaining mobile security is of paramount importance to all of us. This course analyses the whole subject of mobile security, across the complex industry of multiple players, threats and technologies.

Frequency

This course normally runs once a year.

Course dates

2nd June 2025Oxford University Department of Computer Science - Held in the Department01 place remaining.
1st June 2026Oxford University Department of Computer Science - Held in the Department09 places remaining.

Objectives

The successful participant will:

Contents

The mobile industry
Introduction and history of mobile security, the mobile industry players and stakeholders
The mobile threat landscape
End-to-end mobile security
Wireless bearer security and how the mobile network interacts with the device, hardware security, applications, signing and App Store security.
Secure software development on mobile
Native application and mobile web application security, mobile application development and developer ecosystems, authentication, encryption, hardware security and trust
Mobile Malware
Methods and techniques used by malware developers, static and dynamic analysis, best practices for countering malware throughout the mobile value chain, industry information sharing
Mobile Security Design and Management Considerations
Privacy, child protection and workplace policies, mobile handset forensics, incident handling, cyber security
The Future
M2M, smart cities, small cells, Cloud, NFC, financial services and other emerging technologies

Requirements

Participants should have a basic understanding computer security to the level provided by the Security Principles course. General familiarity with software development techniques, and personal experience of mobile devices will also be assumed.


[an error occurred while processing this directive]