Juice jacking refers to a family of attacks on mobile devices in which a manipulated charging cable is used to […]
Category: IT Security
Man-In-The-Middle Attacks against Wi-Fi
Wireless network communication via Wi-Fi has today become a taken-for-granted part of everyday life. Especially on mobile devices such as […]
Web APIs for Identity Management
Browsers and the web community are continuously introducing new web browser interfaces for various use cases. Of particular interest here […]
Certificate Transparency for Relying Party Certificates
eIDAS 2’s European Digital Identity framework shifts control to the user via a secure wallet app. Relying Parties (RPs) willing […]
Analysis of Possible Applications of AI in Code Refactoring
This report examines the performance of four modern AI-based coding agents in modernising existing applications. The aim is to upgrade […]
Wallet Binary Transparency
Binary transparency is a security practice that ensures software binaries are verifiable and have not been tampered with. It aims […]
Implementation and Evaluation of the Digital Credentials API
The Digital Credentials API is currently being developed as part of the Web Incubator Community Group (WICG). The programing interface […]
Split-View Attack Protection for Transparency Systems
Transparency Systems, such as Certificate Transparency or Key Transparency, are designed to provide accountability and verifiability of data. However, they […]
Security Analysis of Native Cryptography in Android Apps
Although Android apps are primarily developed in Java and compatible languages for portability reasons, there is the possibility of implementing […]
Authenticity & Verifiability in Federated Learning: Overview & Methods
With the help of machine learning (ML) – or often referred to as AI – and a large amount of […]