The Digital Markets Act (DMA) of the European Union forced Apple to relax its position as the gatekeeper of the […]
Category: Mobile & Cloud
Analysis of the Android Privacy Sandbox
With the Android Privacy Sandbox, Google is introducing a new technology designed to improve the privacy of Android device users. […]
Potential Covert Channel Through Kernel Samepage Merging on Android
Kernel Samepage Merging (KSM) is a mechanism in the Linux kernel that allows identical pages in memory to be shared […]
Influence of changes to the runtime environment on Android applications
The programming interface of Android offers a variety of features and information sources to create applications. However, these information sources […]
State of the Art Juice Jacking Attacks and Countermeasures for Mobile Devices
Juice Jacking describes a family of attacks on mobile device that utilise a manipulated charging cable for extracting data or […]
Analysis of the Android Health Connect Programming Interface
A large amount of sensitive data is typically stored on smartphones. In combination with wearables and other smart diagnostic devices, […]
Reducing the Fingerprintability of Android Smartphones
This report introduces a method which makes it possible to reduce the fingerprintability of Android smartphones. This involves changing information […]
Detection of emulators in malware analysis on Android
To prevent malware from spreading, applications are examined before they are published in app stores. Dynamic analysis, in which the […]
State of the Art Black Box UI Testing of Android Applications
Automated Black Box UI testing has a wealth of use cases in dynamic software analysis, in the exploration of malware, […]
Investigation of the Content Provider Interface on Android
Content providers are used on Android to expose data to other components and applications in a defined way. They act […]