A large amount of sensitive data is typically stored on smartphones. In combination with wearables and other smart diagnostic devices, […]
Category: IT Security
Identity Recovery in Case of Device Loss
The increasing prevalence of digital identities and cryptographic key materials on various devices poses a high security risk. If a […]
Reducing the Fingerprintability of Android Smartphones
This report introduces a method which makes it possible to reduce the fingerprintability of Android smartphones. This involves changing information […]
Detection of emulators in malware analysis on Android
To prevent malware from spreading, applications are examined before they are published in app stores. Dynamic analysis, in which the […]
State of the Art Black Box UI Testing of Android Applications
Automated Black Box UI testing has a wealth of use cases in dynamic software analysis, in the exploration of malware, […]
Access Control for Distributed Data Analysis using Secure Multi-party Computation
Multi-party computation (MPC) is a cryptographic method for secure distributed execution of computations. In an MPC system, multiple participants collaboratively […]
Investigation of the Content Provider Interface on Android
Content providers are used on Android to expose data to other components and applications in a defined way. They act […]
Analysis of Android Code Transparency
In 2018, Google introduced a new file format for submitting applications to Google Play called Android Application Bundle (AAB). As […]
Comparison of the Fingerprintability of Android and iOS
Tracking users across different applications has enabled application providers to offer the vast majority of their applications for free, as […]
Privacy enhancements for flexible access control policies
Policies for access control systems enable the decoupling of the control of data and resource access from the business logic. […]