International workshop on Mobile Computing Security (MCS)

In conjunction with the 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2015)

Berlin, Germany on September 27-30, 2015

Technological advances in recent years have provided significant increases in the computing power and networking capabilities of mobile devices. For example, many smartphones and personal digital assistants (PDAs) currently employ powerful processors and have Internet broadband connectivity that rival that of desktop computers and laptops.  For these reasons, mobile devices are being used for many applications including social networking, and business applications like: online banking. Because these devices are ubiquitous, they are high-value targets for cyber criminals that seek financial gains.

Mobile devices are still suffering from many security challenges. The security policy offered by the mobile platforms is loose because it allows developers and users to install any application. As a result, we witnessed an increasing number of attacks and malware targeting mobile platforms like Android and iOS, and which caused serious issues for the user. For example, the malware can integrate compromised mobile devices into a botnet, it can also send SMS messages to premium numbers without the user’s knowledge, and hence the user’s bill is charged. In addition, the users are increasingly using their devices to handle their private information. However, the devices provide insufficient data security and data protection.

This workshop aims at gathering researchers and practitioners working on mobile computing security to share ideas and new research innovations in the field.

Topics of the workshop consist of all aspects related to mobile computing security. They include but are not limited to:

  • Smartphone security.
  • Vulnerability analysis for smartphones.
  • Data protection and privacy.
  • Security and privacy of operating systems, middleware, and applications.
  • Evaluation of mobile security solutions.
  • Mobile malware collection, statistics, and analysis.
  • Mobile malware detection.
  • Bots on mobile devices.
  • Mobile botnet detection.
  • Mobile botnet design and countermeasures.
  • Reverse engineering and automated analysis of mobile malware.
  • Traffic monitoring and detection algorithms for mobile platforms.
  • Cloud security and privacy solutions for mobile devices.
  • Mobile device forensics.
  • Mobile services and social networking security.
  • Security for smart payment applications.
  • Test beds and case studies for secure mobile platforms.
  • Formal models and architecture design for secure mobile platforms.
  • Virtualization solutions for mobile security.
  • Web browser security on mobile devices.