The main aim of this project was to build a prototype system that adds transparency to the way different parties […]
Category: IT Security
Semantic Search of Related Patterns in Source Code
The analysis of source code for security-critical elements can be supported by tools that search for certain predefined patterns in […]
SSI Offline-Verifiable Attributes
In a world with an increasing number of online services, digital identities become more and more important. Even in eGovernment, […]
Privacy-Preserving Service Composition
Service compositions are implemented through the interplay between actors of different organizations. Many composition systems use a middleware, which coordinates […]
Analysis of Electroneum Cloud Mining
Electroneum is one of the first cryptocurrencies that allows users to mine coins with a mobile device. Electroneum’s Cloud Mining […]
iOS Interface for Network Traffic Logging
This project investigates three methods to record and analyze network traffic on an iOS device. In the first approach, methods […]
Similarity of Android Applications via Deep Learning
In view of the unbroken popularity of applications for the Android mobile platform, there are numerous apps in the “App […]
Gap Analysis of Data Transparency Logging Architectures
The General Data Protection Regulation (GDPR) specifies a series of transparency obligations for data controllers concerning the processing and sharing […]
Systematic Analysis of the Fingerprintability of Android
This report presents a framework that can automatically recognize fingerprintable information sources on Android devices. For this purpose it automatically […]
Analysis of the Bitcoin UTXO Set
This project describes and analyzes the set of unspent transaction outputs (UTXO set) in Bitcoin. The UTXO set contains all […]