Smart University Home Programs > Securing Mobile Technologies and Applications
Mobility and Wireless
2 Days
Sophia, Lund
Securing Mobile Technologies and Applications
Mobile communication is an exciting channel for providing trustworthy applications and personalised services to over 2 billion end-users, any time, any place, anywhere. Companies and individuals working in this field should be aware of the various methods and tools for developing applications, however to maintain trust and security they also need knowledge of the underlying mobile technologies and their security mechanisms. For example, there are numerous types of mobile phone platform, subscriber identity modules, modems and competing wireless standards. Furthermore, the underlying infrastructure may constrain security and performance and affect architectural choices such as off-line and on-line functionality. Ensuring that the applications are secure and help resist fraud is often poorly handled by developers and so the range of potential attacks should be appreciated as well as the implementation measures to defeat them.

Training's objectives
The objective is to initially familiarise the audience with mobile communication systems and the options for developing and testing real-world applications. This will then be expanded to consider the implementation of secure/trustworthy applications in the mobile context. The learning objectives will be illustrated and strengthened by means of example case studies, drawn from extensive industry experience.

Who should attend?
The module is suitable for attendees with some technical background and IT awareness, but will not rely on prior knowledge of mobile application development or security. Attendance of the earlier module “Exploiting Mobile Technologies and Applications” is recommended.
The content is aimed at engineers/developers and security experts, however it should also appeal to managers wishing to get an overview of the development activities.
Target sectors: Mobile network operators, third party application/service providers (e.g. banks, transport, content providers, advertisers, ISPs, government etc.), application/service developers, equipment manufacturers, consultancies, engineers, security experts.

Key topics
Mobile, communication, application, service, technology, development, security.



9.00 - 11.00 am
Introduction to common mobile communication systems, infrastructure and functionality.

11.15 - 12.45 am
Other common approaches to wireless communication
- Broadcast (Satellite-TV)

2.15 pm - 3.45 pm
Security Mechanisms in mobile communications
- Security Elements in NFC phones
- Mobile Security APIs

4.00 - 5.30 pm
Attacks and countermeasure techniques
- Classes of attack
- Practical examples
- Countermeasures


09.30 - 11.00 am
Secure Mobile Application Development/Test
- Tools/methods for mobile phone platforms
- Example application(s)

11.15 - 12.45 am
Secure Mobile Application Development/Test
- Tools/methods for SIM/SEs
- Example application(s)

2.15 - 3.45 pm
Practical application development/test example(s)
- Handset application (client/server)
- SIM application

4.00 - 5.30 pm
Exploring case studies
- Introducing case study requirements
- Team work to design solutions against requirements
- Team presentations of solutions
- Discussion/feedback


Module designed and coordinated by Keith Mayes, Director of the ISG-Smart Card Centre, UK
View the new program
From €400 (excl. vat)

  To register

Enter the password in the field below and click on the button to validate.


Password lost? more