In order to recognise a user across different applications, a fingerprint of the used device can be created. Specialised software […]
Category: Mobile & Cloud
Analysis of the Permission System of Android
The Android permissions system is a key security feature that is used to control the access of applications to certain […]
Security Analysis of new Sideloading Possibilities on iOS 17.4 / iPadOS 18
The Digital Markets Act (DMA) of the European Union forced Apple to relax its position as the gatekeeper of the […]
Analysis of the Android Privacy Sandbox
With the Android Privacy Sandbox, Google is introducing a new technology designed to improve the privacy of Android device users. […]
Potential Covert Channel Through Kernel Samepage Merging on Android
Kernel Samepage Merging (KSM) is a mechanism in the Linux kernel that allows identical pages in memory to be shared […]
Influence of changes to the runtime environment on Android applications
The programming interface of Android offers a variety of features and information sources to create applications. However, these information sources […]
State of the Art Juice Jacking Attacks and Countermeasures for Mobile Devices
Juice Jacking describes a family of attacks on mobile device that utilise a manipulated charging cable for extracting data or […]
Analysis of the Android Health Connect Programming Interface
A large amount of sensitive data is typically stored on smartphones. In combination with wearables and other smart diagnostic devices, […]
Reducing the Fingerprintability of Android Smartphones
This report introduces a method which makes it possible to reduce the fingerprintability of Android smartphones. This involves changing information […]
Detection of emulators in malware analysis on Android
To prevent malware from spreading, applications are examined before they are published in app stores. Dynamic analysis, in which the […]