Juice jacking refers to a family of attacks on mobile devices in which a manipulated charging cable is used to […]
Category: Mobile & Cloud
Man-In-The-Middle Attacks against Wi-Fi
Wireless network communication via Wi-Fi has today become a taken-for-granted part of everyday life. Especially on mobile devices such as […]
Implementation and Evaluation of the Digital Credentials API
The Digital Credentials API is currently being developed as part of the Web Incubator Community Group (WICG). The programing interface […]
Security Analysis of Native Cryptography in Android Apps
Although Android apps are primarily developed in Java and compatible languages for portability reasons, there is the possibility of implementing […]
Analysis of Fingerprinting Libraries on Android
In order to recognise a user across different applications, a fingerprint of the used device can be created. Specialised software […]
Analysis of the Permission System of Android
The Android permissions system is a key security feature that is used to control the access of applications to certain […]
Security Analysis of new Sideloading Possibilities on iOS 17.4 / iPadOS 18
The Digital Markets Act (DMA) of the European Union forced Apple to relax its position as the gatekeeper of the […]
Analysis of the Android Privacy Sandbox
With the Android Privacy Sandbox, Google is introducing a new technology designed to improve the privacy of Android device users. […]
Potential Covert Channel Through Kernel Samepage Merging on Android
Kernel Samepage Merging (KSM) is a mechanism in the Linux kernel that allows identical pages in memory to be shared […]
Influence of changes to the runtime environment on Android applications
The programming interface of Android offers a variety of features and information sources to create applications. However, these information sources […]