Over the last years, Android has gradually moved from a traditional desktop-like paradigm of a shared filed system towards a […]
Category: Mobile & Cloud
Creation of an iOS automation framework for security analysis
Automated analysis tools have been able to find numerous vulnerabilities and problems in mobile operating systems. However, the existing analysis […]
Cryptographic Access Protection: Transformation from Interactive to Non-Interactive Proxy Re-Encryption
Cloud services made it possible for users to conveniently store their data in the cloud and share it with other […]
Secure Edge Computing Technologies
Complex tasks are often outsourced to the cloud because many small and mobile devices do not have the necessary computing […]
On-Device Patching Framework for Android Applications
Patching existing Android packages has a broad range of applications, ranging from fixing security vulnerabilities to instrumenting potential malware, or […]
Cross-User Security on Android
This report takes a closer look at the security of the isolation between different user accounts on Android. In particular, […]
Challenges of Encyption: Recovery and Computation
Encryption represents a fundamental tool to protect the confidentiality of sensitive data, such as identity attributes, medical data, and digital […]
Automatic Detection and Mitigation of Crypto API Misuse in Android Applications
Almost a decade after its first scientific discussion, crypto API misuse remains one of the most common security flaws in […]
Decentral Methods for Simultaneous Editing of Shared Data Structures
Systems such as Google Docs or web-based versions of Microsoft Office have been instrumental in driving collaborative document editing. Distributed […]
Android Application Patching Through Runtime Manipulation
Application patching is a promising concept for modifying the execution flow of a compiled Android application for the purpose of […]