This project evaluates concepts that mobile operating systems use to protect their users against malware. First, different security approaches used […]
News
Topological Analysis of Program Code
The findings from this project show an innovative approach to hierarchically prepare program code and to map this hierarchy “flat” […]
Remote Attestation State-of-the-Art
Remote attestation and trusted computing are becoming increasingly important – especially in the mobile sector and in the DRM context. […]
Detecting Certificate Misissue via CT Logs
Certificate Transparency (CT) is an open framework that provides visibility of newly issued SSL/TLS certificates by enforcing Certificate Authorities (CAs) […]
Threat Modeling based on hardware
Threat modeling is well established in the software engineering field to show potential IT vulnerabilities of an artefact and to […]
Security Analysis of Current Peer-to-Peer Networks
This project analyses the security concepts of currently deployed peer-to-peer networks. The recent hype about cryptocurrencies has also been pushing […]
Security of Blockchain-Based Cryptocurrencies
In this project, we first describe different attacks on blockchain-based cryptocurrencies with a focus on Bitcoin. Examples are the 51% […]
Possible Side Channels through Deduplication
Modern file systems like ZFS offer extended functionality such as deduplication by supporting Copy on Write (CoW). Deduplication allows duplicated […]
Evaluation of safety standards for IoT household appliances
This work provides an overview of various safety standards applicable to IoT household appliances. We differentiate between compulsory standards, like […]
Voting Systems for Public Blockchains
In this project, we analyzed different blockchain based voting and signaling systems for public blockchains. These voting mechanisms are different […]