This report takes a closer look at the security of the isolation between different user accounts on Android. In particular, […]
Category: IT Security
Whitepaper APIs in E-Government (DE)
Application Programming Interfaces, or APIs for short, enable the provision of web services and data via machine-readable interfaces while restricting […]
Challenges of Encyption: Recovery and Computation
Encryption represents a fundamental tool to protect the confidentiality of sensitive data, such as identity attributes, medical data, and digital […]
Automatic Detection and Mitigation of Crypto API Misuse in Android Applications
Almost a decade after its first scientific discussion, crypto API misuse remains one of the most common security flaws in […]
Behavioral Authentication in Digitales-Amt-App
Biometric authentication has become one of the most widely used authentication methods, especially on smartphones and in the Digitales-Amt app. […]
Decentral Methods for Simultaneous Editing of Shared Data Structures
Systems such as Google Docs or web-based versions of Microsoft Office have been instrumental in driving collaborative document editing. Distributed […]
Resource efficient DTLS Handshakes for IoT Sensors
Every year, more and more smart sensors measure and influence many parts of our daily lives. Such sensors usually work […]
Fundamental challenges with public blockchains
In this study, we present selected properties of public blockchains on the example of Bitcoin. Depending on the use case, […]
Enhancing the Internet-of-Things (IoT) by utilizing Self-Sovereign-Identity (SSI)
Self-Sovereign Identity (SSI) represents a recent identity model that enhances the user-centric identity model. SSI utilizes distributed ledger technoloy to […]
Android Application Patching Through Runtime Manipulation
Application patching is a promising concept for modifying the execution flow of a compiled Android application for the purpose of […]