Complex tasks are often outsourced to the cloud because many small and mobile devices do not have the necessary computing […]
Category: Mobile & Cloud
On-Device Patching Framework for Android Applications
Patching existing Android packages has a broad range of applications, ranging from fixing security vulnerabilities to instrumenting potential malware, or […]
Cross-User Security on Android
This report takes a closer look at the security of the isolation between different user accounts on Android. In particular, […]
Challenges of Encyption: Recovery and Computation
Encryption represents a fundamental tool to protect the confidentiality of sensitive data, such as identity attributes, medical data, and digital […]
Automatic Detection and Mitigation of Crypto API Misuse in Android Applications
Almost a decade after its first scientific discussion, crypto API misuse remains one of the most common security flaws in […]
Decentral Methods for Simultaneous Editing of Shared Data Structures
Systems such as Google Docs or web-based versions of Microsoft Office have been instrumental in driving collaborative document editing. Distributed […]
Android Application Patching Through Runtime Manipulation
Application patching is a promising concept for modifying the execution flow of a compiled Android application for the purpose of […]
Influence of Vendor Customisations on Device Security
In order to differentiate devices from other manufacturers and offer users added value, manufacturers of Android smartphones customize their devices. […]
New Trust Models based on Trusted Computing
Traditionally, two basic approaches to implementing trust models exist. On the one hand, there is hierarchical trust (most prominently standardised […]
Security Analysis of Mobile Applications for Crypto-Currencies
To manage virtual currencies such as Bitcoin or Ethereum, many users turn to mobile apps that promise a convenient form […]