In view of the unbroken popularity of applications for the Android mobile platform, there are numerous apps in the “App […]
Category: IT Security
Gap Analysis of Data Transparency Logging Architectures
The General Data Protection Regulation (GDPR) specifies a series of transparency obligations for data controllers concerning the processing and sharing […]
Systematic Analysis of the Fingerprintability of Android
This report presents a framework that can automatically recognize fingerprintable information sources on Android devices. For this purpose it automatically […]
Analysis of the Bitcoin UTXO Set
This project describes and analyzes the set of unspent transaction outputs (UTXO set) in Bitcoin. The UTXO set contains all […]
Technical Analysis of the General Transparency Paradigm
This project analyzed alternative ways to enable transparency for stakeholders in a trust service-based ecosystem, besides traditional third-party certification. One […]
Implementation of an editable proof-of-work based blockchain
In this project, we developed a demonstrator for an editable proof-of-work based blockchain in Java and Kotlin. The blockchain end […]
Isolation of Differences in Mobile Applications
Applications for mobile platforms, such as Android and iOS, are frequently updated and pushed to devices via the respective distribution […]
Policy Enforcement in Distributed Environments
In scenarios in which several participants with different properties operate on a common database, the need for (automated) policy enforcement […]
Browser Detection Methods
In order to be able to display personalized offers to website users, ad networks must recognize users beyond the context […]
Protection Concepts of Mobile Operating Systems against Malware
This project evaluates concepts that mobile operating systems use to protect their users against malware. First, different security approaches used […]