This project analyzed alternative ways to enable transparency for stakeholders in a trust service-based ecosystem, besides traditional third-party certification. One […]
Category: IT Security
Implementation of an editable proof-of-work based blockchain
In this project, we developed a demonstrator for an editable proof-of-work based blockchain in Java and Kotlin. The blockchain end […]
Isolation of Differences in Mobile Applications
Applications for mobile platforms, such as Android and iOS, are frequently updated and pushed to devices via the respective distribution […]
Policy Enforcement in Distributed Environments
In scenarios in which several participants with different properties operate on a common database, the need for (automated) policy enforcement […]
Browser Detection Methods
In order to be able to display personalized offers to website users, ad networks must recognize users beyond the context […]
Protection Concepts of Mobile Operating Systems against Malware
This project evaluates concepts that mobile operating systems use to protect their users against malware. First, different security approaches used […]
Topological Analysis of Program Code
The findings from this project show an innovative approach to hierarchically prepare program code and to map this hierarchy “flat” […]
Remote Attestation State-of-the-Art
Remote attestation and trusted computing are becoming increasingly important – especially in the mobile sector and in the DRM context. […]
Detecting Certificate Misissue via CT Logs
Certificate Transparency (CT) is an open framework that provides visibility of newly issued SSL/TLS certificates by enforcing Certificate Authorities (CAs) […]
Threat Modeling based on hardware
Threat modeling is well established in the software engineering field to show potential IT vulnerabilities of an artefact and to […]