In addition to an approximate version of the original program code, function descriptions, an authorization model, UI elements, etc. are […]
Category: Mobile & Cloud
Detection of Code Injection Vulnerabilities in HTML5 Apps
In order to develop mobile cross-platform applications, frameworks based on JavaScript and HTML5 are often used. Unfortunately, such applications do […]
Protection Concepts of Mobile Operating Systems against Malware
This project evaluates concepts that mobile operating systems use to protect their users against malware. First, different security approaches used […]
Remote Attestation State-of-the-Art
Remote attestation and trusted computing are becoming increasingly important – especially in the mobile sector and in the DRM context. […]
Security Analysis of Current Peer-to-Peer Networks
This project analyses the security concepts of currently deployed peer-to-peer networks. The recent hype about cryptocurrencies has also been pushing […]
Possible Side Channels through Deduplication
Modern file systems like ZFS offer extended functionality such as deduplication by supporting Copy on Write (CoW). Deduplication allows duplicated […]
Distributed Event System
The use of distributed systems always requires a minimum amount of parallelism. More precisely, there is almost always a need […]
Security Comparison of Apps on Android and iOS
In order to gain a better understanding of what influences the security of mobile applications under Android and iOS, typical […]
Secure Push Notifications
Push Notifications are key components for mobile application developers used to alert their users of important updates and reengage their […]
Disaster Communication using Mesh Software
This project demonstrates the creation of a mesh network consisting of stationary and mobile nodes, based on cost-efficient hardware and […]