Smartphone OS Reports

The students are responsible for investigating a specific smartphone platform. The class will be split into four groups. Each group will be assigned one of the four popular smartphone platforms: Android, iOS, BlackBerry, and Windows Phone. There is a single report covering the application environment and security framework. A 30 minute presentation will accompany the report.

OS Report Grading

Oral PresentationFeb 9,1430%
Written ReportFeb 1570%

Oral Presentation (Feb 9 and 14)

The application environment and security framework will be presented together in one 30 minute oral presentation. The presentation should cover the salient points of the report, highlighting interesting aspects. The presentation should conclude with at least three positive and three negative critiques of the security framework.

Note that the oral presentation is before the final write-up. This is to allow instructor and classmate feedback before the final report.

Written Report (Prelim - Feb 8; Final - Feb 14)

The written report will have a preliminary and final report. The preliminary report is due at the beginning of the week of the oral presentations and should be nearly complete. The final report is due after feedback from the presentations can be incorporated. The written report grade will be primarily based off of the final report, but points will be deducted if the preliminary report is not nearly complete.

The written report will contain two primary sections. The first section will cover the application environment. The second section will cover the security framework. Expected topics for these sections are as follows.

Application Environment: This section will investigate the development and runtime environments available for applications. The written report should include (but not be limited to) the following information and available citations.

Security Framework: This section will investigate the security protections implemented within the platform. It is important to look at how the operating system protects itself from applications, how it protects sensitive resources (e.g, hardware), as well as how it provides protection between applications. Consider how concepts such as a "reference monitor" fit into the security architecture. The written report should include (but not be limited to) the following information and available citations.