Automated Black Box UI testing has a wealth of use cases in dynamic software analysis, in the exploration of malware, […]
Category: IT Security
Access Control for Distributed Data Analysis using Secure Multi-party Computation
Multi-party computation (MPC) is a cryptographic method for secure distributed execution of computations. In an MPC system, multiple participants collaboratively […]
Investigation of the Content Provider Interface on Android
Content providers are used on Android to expose data to other components and applications in a defined way. They act […]
Analysis of Android Code Transparency
In 2018, Google introduced a new file format for submitting applications to Google Play called Android Application Bundle (AAB). As […]
Comparison of the Fingerprintability of Android and iOS
Tracking users across different applications has enabled application providers to offer the vast majority of their applications for free, as […]
Privacy enhancements for flexible access control policies
Policies for access control systems enable the decoupling of the control of data and resource access from the business logic. […]
Secure development of AI services
AI-based services can reduce time and costs on the part of government agencies and private companies, while increasing user satisfaction. […]
Detecting Inconsistencies between Android App Descriptions and Permissions
Android users are offered a vast number of apps that provide a variety of functionalities and assistance in everyday life. […]
Runtime Integrity Checks in Android Applications
In order to hamper reverse engineering of applications and thwart repackaging attacks, some particularly security aware Android developers integrate runtime […]
Prevalence of HTTP in Android applications
In contrast to the web ecosystem, where after initial problems the encryption of HTTP connections through TLS has gained wide […]