Applications for mobile platforms, such as Android and iOS, are frequently updated and pushed to devices via the respective distribution […]
Category: IT Security
Policy Enforcement in Distributed Environments
In scenarios in which several participants with different properties operate on a common database, the need for (automated) policy enforcement […]
Browser Detection Methods
In order to be able to display personalized offers to website users, ad networks must recognize users beyond the context […]
Protection Concepts of Mobile Operating Systems against Malware
This project evaluates concepts that mobile operating systems use to protect their users against malware. First, different security approaches used […]
Topological Analysis of Program Code
The findings from this project show an innovative approach to hierarchically prepare program code and to map this hierarchy “flat” […]
Remote Attestation State-of-the-Art
Remote attestation and trusted computing are becoming increasingly important – especially in the mobile sector and in the DRM context. […]
Detecting Certificate Misissue via CT Logs
Certificate Transparency (CT) is an open framework that provides visibility of newly issued SSL/TLS certificates by enforcing Certificate Authorities (CAs) […]
Threat Modeling based on hardware
Threat modeling is well established in the software engineering field to show potential IT vulnerabilities of an artefact and to […]
Security Analysis of Current Peer-to-Peer Networks
This project analyses the security concepts of currently deployed peer-to-peer networks. The recent hype about cryptocurrencies has also been pushing […]
Security of Blockchain-Based Cryptocurrencies
In this project, we first describe different attacks on blockchain-based cryptocurrencies with a focus on Bitcoin. Examples are the 51% […]