Project Summary

The goal of this project is to fill the gap between the ubiquity of pervasive and mobile computing technology and the lack of presence of pervasive and mobile computing security in the course curricula of universities across the nation. By focusing on the project goal, this project has been implemented by addressing four frontiers in the research and educational arena.

Engaging students through hands-on lab development with integrated research thrusts in the relevant areas. There are several groups of laboratories developed and under development in pervasive and mobile computing security. These labs and visualization tools will contribute to the effective resources for security education and engage student in active learning.

Conducting undergraduate research through research project design. By actively pursuing involvement of undergraduate students to the cutting edge security research areas, we develop several modularized size of projects for undergraduate students. These modularized projects can be applied for the capstone project or summer research project. In addition, by participant of AAMU ( HBCU ), we expect more African American students to be involved in research.

Building faculty capacity through hands-on workshops. Project will be disseminated through faculties by using faculty workshop and cascade webinar. The research results, lab development and hands-on activities will be lectured and discussed with other faculty members from other institutions. The workshop focuses on how to use the teaching materials developed through this project.

Enhancing security education through curriculum development. Based on the typical topics in pervasive and mobile computing security, we will develop new course materials where the latest results from the research community are carefully integrated.

In addition to the above thrusts, this project strengthens IA education, builds the next workforce in cyber security, and build partnership in participating institutions, including the University of Michigan-Dearborn (UM-D) and the Alabama A&M University. This project is lead by Dr. Di Ma at UM-D.

Mobile Security Undergraduate Research Project

AdviseMe app was an undergraduate student project developed in Spring semester in 2016. This project aims at studying model based software development in mobile applications using new methods, techniques and tools. It makes student advicing significantly easier by visualizing the prerequisite course list for computer science classes as well as faculty information and availability. The audience of this project targets new and former students who are not familiar with computer science courses. In this mobile advicing application, student can enter their information and show them what class they need to take next, which will then be easier for student to communicate better with their advisors. This application also serves as pre-advising tool that will help students understand what they will expect from their advisors. The design model considers several typical features of mobile systems including reliability and security. The results is applicable to all computer science students, including instructors to see what classes are offered each semester. Computer science student will benefit from the access to plan their semester.


  1. AdviseME  

Graduate Student Research Project

The Graduate Student Research of mobile security and pervasive computing security provides an fruitful and nutritional environment for motivated students with the training and guidance to the cutting edge research area. This section strives to acknowledge the contributions of graduate students to the project and academic communities by providing graduate students the opportunity to showcase their research, projects, and original works during their graduate study. Current the graduate projects fall in two major research areas:

  • Static analysis of android malwares
  • Privacy preserving of mobile medical system


  1. Android Permission ID Analysis  
  2. Static Analysis for APK File  

Mobile Security Laboratory

As a new emerging research area in security engineering, mobile security and mobile computing knowledge faces a lot of unknown areas where the principles have not been studied and revealed. These undisclosed mysterious areas attract many researchers, educators and students to jump into the water and explore the wonder. In addition to cover the fundamental areas of mobile computing and security in this file, we also included the advanced topics of security, such as how to ensure the quality of mobile security under security.

  1. This lab manual was developed in a cumulative style, from the fundamental knowledge to high level specific domain, from system and environment configuration to the program and design.
  2. This lab manual was developed to include some blank areas of mobile computing and mobile security that was not covered by many other labs, such as validation of cryptographic algorithm, specification based testing, and tools.
  3. This lab manual was self-contained in the content, which means you can find the information you need for your class and students from the beginning.
  4. This lab manual was user friendly, a large amount of screen shots are captured and included with a detailed step wised instruction.
  5. The labs in this manual was well designed that can be used in different level of curriculum from CS I to CS III, or senior level courses.


  1. Creating Interface for Android Based Application  
  2. Implementing Movement Functionalities in Robot Control System  
  3. Permission ID App  
  4. Making a Phone Call on Android Device  
  5. Email on Android Device  
  6. SQLite of Android Device  


  1. MobileComputingAndSecurity_Lab_Desingn_v3-PartI.docx  
  2. Introduction to Mobile Application Testing  


This lab manual was supported by NSF SaTC program under award No. 1419295.

Most of the labs included in this manual had been implemented and adopted in classes at computer science curriculum in Alabama A&M University. Some of the labs were developed and or designed by my own idea for the research work of malware detection and analysis. After proper polish, update and design, these work turns out to be a sequential and consistent job of mobile security lab manual to meet the requirement of NSF SaTC Project titled as “Integrating Research to Undergraduate Study”. Many students in my classes had participant in the development, design and implementation of these project or relevant projects. I am amazing for their hard work and high motivation on the mobile computing and security.


  [1] Y. Fu and D. Ma. Mobile Computing and Security Laboratories and Curriculum Integration. The 123rd ASEE Annual Conference. June 26-29, 2016, New Orleans, LA, USA

  [2] Y. Fu and D. Ma. Applying Mobile and Pervasive Computing Security Projects in CS Courses. The International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS' 15), Las Vegas, NV, USA. July 27-30, 2015.

Third Faculty Workshop of Pervasive & Mobile Computing

July 24th, 2017 10:30 AM - 3:00 PM CST

  • Registraion
    • Deadline of application: July 17th, 2017
    • You may click here to register
  • Prepare for the workshop
    • You need a laptop and Internet connection.
    • Install of Android Studio to your laptop. Here is the step by step preparation of installation of Android Studio.
    • Download Flyer  
  • Benefits
    • You will be exposed as well developed curriculum design of pervasive computing course
    • You will experience a set of pervasive computing laboratories
    • You will experience a set of mobile computing laboratories
    • You will be exposed to the class studies
  • Topics
    1. Advancement of the previous course development and studies.
    2. Continuation on Laboratory development of pervasive computing and mobile security.
      1. New deveopment.
      2. Class studies and Observations for faculties and students.
      3. Capacity Building, Data Access, Availability and Quality (incl. WGCapD, WGISS, and WGCalVal).
    3. Graduate Thesis Presentation.
    4. Undergraduate student summer class projects and input.
    5. Discussion of workshop and sustainability.
  • Agenda
Registration, Virtual Participant Connection, and Welcome 10:20 – 10:30
Location: (Virtual Conference room)
Session 1: Opening Remark and Invited Talk

information – 15 minutes

Opening Remarks by the Dean (Dr. Chance Glenn)

- Tour de Table self-introductions

- Logistics information

- Workshop Expected outcomes and introduction of agenda

10:30 – 10:45

information – 30 minutes

Invited Speaker (Dr. Stephen Westfold)

- Kestrel Institute

- Title: Software Assurance and Resilience Through Software Synthesis


  1. Android platform modeling and Android app verification in the ACL2 theorem prover.
  2. Information Flow Analysis of Android Applications in DroidSafe.
10:45 – 11:30

Session 2: Research and Project Overview

information – 45 minutes

Pervasive Computing and Cyber Security at UMD (Dr. Di Ma)

- Research overview and project development

11:30 – 12:15

information – 45 minutes

Synthesis Session: Report from UMD (Continued) (Dr. Jinhua Guo)

- Tutorial of Vehicle network security

12:15 – 13:00
Break 13:00 – 13:10
Session 3: Curriculum Integration and Course / Laboratory Development

information – 30 minutes

Synthesis Session: Report from UMD (Continued) (Dr. Jinhua Guo)

- Vehicle security lab development

13:10 – 13:40

information – 35 minutes

Synthesis Session: Report from AAMU (Dr. Yujian Fu)

- Static analysis vs runtime analysis in cps

- Integrating mobile lab development with cyber enabled learning environment

13:40 – 14:15
Break 14:25 - 14:35
Session 4: Student Research Projects & Discussion

information / discussion – 20 minutes

Static analysis in mobile system (Wichien Choosilp)

- Model driven engineering for Smart Mobile health care system

H.O.P.E. (Virag Hollos)

14:35 – 14:55

information / discussion – 15 minutes


- How to improve

14:55 – 15:10
Adjourn 15:10

Download Agenda  


Software Assurance and Resilience Through Software Synthesis

By Stephen Westfold (Invited Speaker) Email:

TBehavioral analysis and software assurance of cyber physical systems involves compiling an Electronic System-Level (ESL) design into its Register-Transfer Level (RTL) implementation. This talks discuss the pipeline approach for the successful studies of apply the synthesis of the RTL with the intermediate representation (IR) generated by the tools after the high-level (compiler and scheduling) transformations applied.


  1. Software Assurance and Resilience Through Software Synthesis  
  2. Android platform modeling and Android app verification in the ACL2 theorem prover.  
  3. Information Flow Analysis of Android Applications in DroidSafe.  

Pervasive Computing and Cyber Security at UMD

By Di Ma (PI, UMD) Email:

Project overview of the performance and current results, focusing on lectures and course development at UMD.

Tutorial of Vehicle network security

By Jinhua Guo (CO-PI, UMD) Email:

Automotive Networks and controller area networks and other networks are introduced with the hijacking the car.


  1. In-Vehicle Network Security  
  2. Vehicle Security Lab Development  

Static Analysis and Runtime Analysis Used in Android Application Security

By Yujian Fu (PI, AAMU) Email:

Current static analysis approach were reviewed and runtime analysis method was presented on the android security.


  1. Static Analysis and Runtime Analysis Techniques used in Android application Security Analysis  

Student Presentations - Smart Health Care Advisor App

By Wichien Choosilp (Grad student, AAMU)

Smart Health Care Advisor is an Android application that will helps the user to monitor and modify personal health data and provides medical and/or general advice. The provided functions and monitored personal data can be blood pressure, calculating body mass index (bmi), calculating the heart risk based on the user input information. It can also notify the user to contact the home nurse or even emergency, if the blood pressure or the heart risk are too high or too low.


  1. Smart Health Care Advisor  

Student Presentations - Android Studio – H.O.P.E.

By Virag Hollos (Undergraduate student, AAMU)

An application using Android studio to display the health care info for life risky diseases such as cancer.


  1. Android Studio  


First Faculty Workshop of Pervasive & Mobile Computing

The first faculty development workshop was scheduled on Dec 12th, 2016.

Second Faculty Workshop of Pervasive & Mobile Computing

Feb 17th, 2017

  • Deadline of application: Feb 15th, 2017
  • Prepare for the workshop
    • You need a laptop and Internet connection.
    • Install of Android Studio to your laptop. Here is the step by step preparation of installation of Android Studio.
  • Perticipant Stipends: A stipend will be given to participant.
  • Topics
    • Web Security
    • Introduction to Android Programming
      • Permission ID Based Security
      • Kernel Security
    • Pervasive Computing Security
    • Others
  • Agenda
  • Topics Time Speaker Files
    Mobile Security TBA Yujian Fu, Di Ma
    Android Security TBA Yujian Fu, M.H Shuvo
    Web Security TBA Di Ma
    Pervasive Computing TBA Di Ma
    Cloud Computing TBA Di Ma
    Traffic Engineering TBA Yujian Fu
    Class Study TBA Yujian Fu
    Research Projects TBA Yujian Fu, M.H Shuvo
    Closing Remarks TBA Di Ma


Faculty: Dr. Yujian Fu, AAMU

Graduate Students:

    Wichien Choolsip, AAMU

    Adria Mason, AAMU