Ex-post Transparency-Enhancing-Technologies aim to help data subjects exercise their right to transparency by providing them with visibility on the sensitive […]
News
MPC-based Secure Aggregation in Federated Learning: Overview, Protocols, & Google’s Gboard
As digitalization progresses, it is becoming increasingly attractive to learn from as much data as possible in order to, e.g., […]
Privacy-preserving Identifiers
In federated authentication protocols (e.g., OpenID Connect), users are often assigned unique identifiers to be identified by service providers (SPs). […]
Security Analysis of new Sideloading Possibilities on iOS 17.4 / iPadOS 18
The Digital Markets Act (DMA) of the European Union forced Apple to relax its position as the gatekeeper of the […]
Analysis of the Android Privacy Sandbox
With the Android Privacy Sandbox, Google is introducing a new technology designed to improve the privacy of Android device users. […]
Evaluation of Secure-Multi-Party-Computation-Frameworks for the Web Browser
Secure Multi-Party Computation (MPC) is now a practical privacy-preserving cryptographic building block. With the help of MPC, numerous data analyses […]
The Role of Verifiable Data Registries in the Verifiable Credential Ecosystem
Verifiable data registries are defined in the W3C-VC data model and manage all data related to the creation and verification […]
Potential Covert Channel Through Kernel Samepage Merging on Android
Kernel Samepage Merging (KSM) is a mechanism in the Linux kernel that allows identical pages in memory to be shared […]
Service Provider Accreditation with Attribute Constraints
In credential-based authentication systems, users transmit personally identifiable and potentially sensitive data to Service Providers (SP; also called Relying Parties, […]
Influence of changes to the runtime environment on Android applications
The programming interface of Android offers a variety of features and information sources to create applications. However, these information sources […]