In order to differentiate devices from other manufacturers and offer users added value, manufacturers of Android smartphones customize their devices. […]
Category: Mobile & Cloud
New Trust Models based on Trusted Computing
Traditionally, two basic approaches to implementing trust models exist. On the one hand, there is hierarchical trust (most prominently standardised […]
Security Analysis of Mobile Applications for Crypto-Currencies
To manage virtual currencies such as Bitcoin or Ethereum, many users turn to mobile apps that promise a convenient form […]
Compressible Blockchain
In this project, we propose a compressible blockchain. The main idea is to use a second, linked chain that stores […]
Modeling of fingerprintable information sources
The report presents a model that classifies fingerprintable information sources. The permission system of the Android operating system was used […]
IPFS Security Analysis
During this project, IPFS, a decentralized peer-to-peer hypermedia system, was subjected to a security analysis. Vulnerabilities with serious consequences could […]
Providing Smartphone Features on the Desktop
Current personal computing devices, such as smartphones, laptops, and traditional desktop computers, are geared towards different applications and use cases, […]
Semantic Search of Related Patterns in Source Code
The analysis of source code for security-critical elements can be supported by tools that search for certain predefined patterns in […]
Analysis of Electroneum Cloud Mining
Electroneum is one of the first cryptocurrencies that allows users to mine coins with a mobile device. Electroneum’s Cloud Mining […]
Measurements of Timing-Differences in the Android API
The report introduces a framework that can automatically detect timing leaks on Android devices. It does so by automatically invoking […]