Computer Science


Seminars


Article Selection. Your seminar must be a coherent explanation of an advanced topic in Smart-Device Security, showing your careful reading and understanding of a research article. Read through the list of research articles to choose the one you would like to present orally in COMPSCI 702. Send an email to the course coordinator with your choice by Friday, March 5, 23:59hrs NZDT. The subject of your email should be COMPSCI702-2021 Seminar followed by your UPI and name.


If the article of your choice is not available, you will be informed and then you have to send your next choice. To ensure allocation of your selection in a timely manner, it is encouraged if you can send your top three choices in order of your preference (from higher to lower). You will be assigned the article based on a first come first served policy. Please note that an article can be chosen by at most 3 students.


Some Details. Each student should have a comprehensive understanding of the article, and should present the idea clearly to the class. The presentation should cover 2 parts: introduction and solution. The introduction should include some motivation, background knowledge, and the problem. The solution presented in the article should be explained based on your understanding. The core idea should be clear, and you are expected to explain some details of the proposed technique in a way that can be easily followed by your classmates.


The slides should neither be too wordy nor too simple. The points listed in the slides should be clear and explained with some details. It would be better if you can use some visuals. Giving some examples will make your point easier to follow. Moreover, during the presentation, your voice should be clear. Your pace should be neither too high nor too low. You should also try to engage your audience by maintaining eye contact with them. We suggest not to read from notes or slides, since it will make your presentation less engaging.


You will get 15 minutes for your seminar and 5 to 10 minutes for the Q&A and discussion. Both parts (including introduction and solution) will be evaluated separately. Each part is worth 5 marks. The marks are based on whether you make your presentation clear, the slides are good, the audience is engaged, and you give good answers in the Q&A session. Students are required to share the seminar slides right after their presentation so that others can benefit from them.


If the alert level (or any other condition) does not permit on campus activities, then seminar presentations can be conducted online. The seminar presentation can be delivered in a live-streaming session or pre-recorded. If you choose the latter option, you are expected to send me a pre-recorded video at least 24 hours before the scheduled time for your seminar. As we discussed, we can have a live-streaming seminar or play a pre-recorded video first and then we can have a live Q&A session. In either case, we expect your camera on so that we can give you some feedback on how you can improve your presentation in the future. Note that there is a strict time limit of 15 minutes for your seminar.


Research Articles
  • [Chen-USENIX20] Chen, Jiayi, Urs Hengartner, Hassan Khan, and Mohammad Mannan, Chaperone: Real-time Locking and Loss Prevention for Smartphones, In the 29th USENIX Security Symposium, pp. 325-342, 2020. [Download]
    Presenters: Mohammad Ladha
  • [Hernandez-USENIX20] Hernandez, Grant, Dave Jing Tian, Anurag Swarnim Yadav, Byron J. Williams, and Kevin RB Butler, BigMAC: Fine-Grained Policy Analysis of Android Firmware, In the 29th USENIX Security Symposium, pp. 271-287, 2020. [Download]
    Presenter: Jeremy Lang

  • [Hu-WWW20] Hu, Yangyu, Haoyu Wang, Ren He, Li Li, Gareth Tyson, Ignacio Castro, Yao Guo, Lei Wu, and Guoai Xu, Mobile App Squatting, In the ACM World Wide Web Conference, pp. 1727-1738, 2020. [Download]
    Presenter: Louis Wang
  • [Kim-NDSS21] Kim, Joongyum, Junghwan Park, and Sooel Son, The Abuser Inside Apps: Finding the Culprit Committing Mobile Ad Fraud, In Proceedings of Network and Distributed Systems Security Symposium, 2021. [Download]
    Presenters: Justin Kim and Tim Koo
  • [Lei-NDSS21] Lei, Zeyu, Yuhong Nan, Yanick Fratantonio, and Antonio Bianchi, On the Insecurity of SMS One-TimePassword Messages against Local Attackers in Modern Mobile Devices, In Proceedings of Network and Distributed Systems Security Symposium, 2021. [Download]
    Presenter: Zain Khan
  • [Li-WWW20] Li, Tong, Mingyang Zhang, Hancheng Cao, Yong Li, Sasu Tarkoma, and Pan Hui, "What Apps Did You Use?": Understanding the Long-term Evolution of Mobile App Usage, In the ACM World Wide Web Conference, pp. 66-76, 2020. [Download]
    Presenters: Yifeng Ma, Qiaochu Song, and Jitong Wang.
  • [Liu-USENIX20] Liu, Baozheng, Chao Zhang, Guang Gong, Yishun Zeng, Haifeng Ruan, and Jianwei Zhuge, FANS: Fuzzing Android Native System Services via Automated Interface Analysis, In the 29th USENIX Security Symposium, pp. 307-323, 2020. [Download]
  • [Lu-CCS20] Lu, Haoran, Luyi Xing, Yue Xiao, Yifan Zhang, Xiaojing Liao, XiaoFeng Wang, and Xueqiang Wang, Demystifying Resource Management Risks in Emerging Mobile App-in-App Ecosystems, In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 569-585, 2020. [Download]
    Presenter: Sean Zeng
  • [Mahmud-USENIX20] Mahmud, Samin Yaseer, Akhil Acharya, Benjamin Andow, William Enck, and Bradley Reaves, Cardpliance: PCI DSS Compliance of Android Applications, In the 29th USENIX Security Symposium, pp. 1517-1533, 2020. [Download]
    Presenter: Lucas Betts
  • [Mi-NDSS21] Mi, Xianghang, Siyuan Tang, Zhengyi Li, Xiaojing Liao, Feng Qian, and XiaoFeng Wang, Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks, In Proceedings of Network and Distributed Systems Security Symposium, 2021. [Download]
    Presenter: Dennis Xu
  • [Ruge-USENIX20] Ruge, Jan, Jiska Classen, Francesco Gringoli, and Matthias Hollick, Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets, In the 29th USENIX Security Symposium, pp. 19-36, 2020. [Download]
    Presenter: Reuben Speirs
  • [Shen-NDSS21] Shen, Yun, Pierre-Antoine Vervier, and Gianluca Stringhini, Understanding Worldwide Private Information Collection on Android, In Proceedings of Network and Distributed Systems Security Symposium, 2021. [Download]
    Presenters: Derrick Chen, Linda Liang, and William Que.
  • [Tang-USENIX20] Tang, Zhushou, Ke Tang, Minhui Xue, Yuan Tian, Sen Chen, Muhammad Ikram, Tielei Wang, and Haojin Zhu, iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications, In the 29th USENIX Security Symposium, pp. 2415-2432, 2020. [Download]
    Presenters: Yujun Zhang and Ken Fang
  • [Tuncay-USENIX20] Tuncay, G├╝liz Seray, Jingyu Qian, and Carl A. Gunter, See No Evil: Phishing for Permissions with False Transparency, In the 29th USENIX Security Symposium, pp. 415-432, 2020. [Download]
    Presenters: Juyou Qi and Samuel Boyes
  • [Weir-USENIX20] Weir, Charles, Ben Hermann, and Sascha Fahl, From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security, In the 29th USENIX Security Symposium, pp. 289-305, 2020. [Download]
    Presenters: Callum Bradding, Lamees Elhiny, and Aditya Krishnan.
Seminar Schedule
Date Time Presenter Article
May 5 11:00 Justin Kim [Kim-NDSS21] [Slides]
May 5 11:30 Tim Koo [Kim-NDSS21] [Slides]
May 6 11:00 Juyou Qi [Tuncay-USENIX20] [Slides]
May 11 11:00 Derrick Chen [Shen-NDSS21] [Slides]
May 11 11:20 Linda Liang [Shen-NDSS21] [Slides]
May 11 11:40 William Que [Shen-NDSS21] [Slides]
May 12 11:00 Yifeng Ma [Li-WWW20] [Slides]
May 12 11:20 Qiaochu Song [Li-WWW20] [Slides]
May 12 11:40 Jitong Wang [Li-WWW20] [Slides]
May 13 11:00 Callum Bradding [Weir-USENIX20] [Slides]
May 13 11:20 Aditya Krishnan [Weir-USENIX20]
May 13 11:40 Lamees Elhiny [Weir-USENIX20] [Slides]
May 18 11:00 Sean Zeng [Lu-CCS20] [Slides]
May 18 11:20 Samuel Boyes [Tuncay-USENIX20] [Slides]
May 18 11:40 Lucas Betts [Mahmud-USENIX20] [Slides]
May 19 11:00 Yujun Zhang [Tang-USENIX20] [Slides]
May 19 11:20 Ken Fang [Tang-USENIX20] [Slides]
May 19 11:40 Reuben Speirs [Ruge-USENIX20] [Slides]
May 20 11:00 Louis Wang [Hu-WWW20] [Slides]
May 20 11:20 Dennis Xu [Mi-NDSS21] [Slides]
May 20 11:40 Zain Khan [Lei-NDSS21] [Slides]
May 25 11:00 Mohammad Ladha [Chen-USENIX20] [Slides]
May 25 11:30 Jeremy Lang [Hernandez-USENIX20]
Top


Apply now!


Handbook

Postgraduate study options

Computer Science Blog



Please give us your feedback or ask us a question

This message is...


My feedback or question is...


My email address is...

(Only if you need a reply)

A to Z Directory | Site map | Accessibility | Copyright | Privacy | Disclaimer | Feedback on this page