Checking date: 28/04/2023

Course: 2023/2024

Mobile device security
Bachelor in Computer Science and Engineering (Plan: 489 - Estudio: 218)

Coordinating teacher: PERIS LOPEZ, PEDRO

Department assigned to the subject: Computer Science and Engineering Department

Type: Electives
ECTS Credits: 6.0 ECTS


Requirements (Subjects that are assumed to be known)
Cryptography and Computer Security (course 3 / semester 1). Computer Networks (course 3 / semester 1). Security Engineering applied to computer engineering / to information systems (course 3 / semester 2).
Skills and learning outcomes
Link to document

Description of contents: programme
1. Mobile computing security overview. 2. Mobile infrastructure vulnerabilities. a. Vulnerabilities b. Mitigation techniques 3. Mobile communication vulnerabilities. a. Vulnerabilities b. Mitigation techniques 4. Mobile device vulnerabilities. a. Vulnerabilities b. Mitigation techniques 5. Mobile platform vulnerabilities. a. Vulnerabilities b. Mitigation techniques 6. Mobile application vulnerabilities. a. Vulnerabilities b. Mitigation techniques
Learning activities and methodology
AF1. THEORETICAL-PRACTICAL CLASSES. 1.5 ECTS with full attendance. They will present the knowledge that students should acquire. They will receive the class notes and will have basic reference documents to facilitate the follow-up of the classes and the development of the subsequent work. Exercises and problems that students may have, will be solved and workshops and evaluation tests will be carried out to develope the necessary skills. AF2. TUTORIALS. 0.25 ECTS with full attendance. Individualized (individual tutorials) or group (collective tutorials) assistance to students will be provided by the teacher. AF3. INDIVIDUAL OR GROUP STUDENT WORK. 3.75 ECTS with 0% attendance AF8: WORKSHOPS AND LABORATORIES 0.25 ECTS with full attendance AF9: FINAL EXAM. 0.25 ECTS with full attendance. In which the knowledge, skills and abilities acquired throughout the course will be assessed globally. MD1: CLASS THEORY. Exhibitions in the teacher's class with support of computer and audiovisual media, in which the main concepts of the subject are developed and materials and bibliography are provided to complement the students' learning. MD2: PRACTICES. Resolution of practical cases, problems, etc. raised by the teacher individually or in groups. MD3: TUTORIALS. Individualized assistance (individual tutorials) or group (collective tutorials) to students by the teacher. MD6: LABORATORY PRACTICES. Applied / experimental teaching to workshops and laboratories under the supervision of a tutor.
Assessment System
  • % end-of-term-examination 30
  • % of continuous assessment (assigments, laboratory, practicals...) 70
Calendar of Continuous assessment
Basic Bibliography
  • Androulidakis, I. . Mobile Phone Security and Forensics: A Practical Approach. . Springer. 2022
  • Bergman, N., Stanfield, M., Rouse, J., Scambray, J., et al. . Hacking Exposed Mobile: Security Secrets & Solutions. . McGraw Hill Osbourne Media: New York, NY. 2013
  • Buttyan, L. and Hubaux, J.. Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing. . Cambridge University Press. 2007
Recursos electrónicosElectronic Resources *
Additional Bibliography
  • Jeff Six. Application Security for the Android Platform. O'Really Media, Inc. 2011
  • Johnny Cache, Joshua Wright, Vincent Liu.. Hacking wireless exposed: wireless security secrets and solutions.. McGraw-Hill. 2010
  • Pragati Ogal Rai. Android Application Security Essentials. Packt Publishing. 2013
(*) Access to some electronic resources may be restricted to members of the university community and require validation through Campus Global. If you try to connect from outside of the University you will need to set up a VPN

The course syllabus may change due academic events or other reasons.