Vocabularies to represent security relevant concepts. Linked Open Data (LOD) and Linked Open Vocabularies (LOV) deal with the definition of […]
News
Traffic Analysis of Mobile Applications
As a supporting measure for the inspection of mobile applications, the data sent and received to/from the Internet has always […]
Citizen Card Encrypted (CCE)
CCE enables container-based encryption of files and folders. Encryption of data can be performed using smart-cards (hardware based keys, currently various versions of Austrian […]
Analysis of Browser-Extensions
This study deals with dangers potentially posed from browser extensions. Browser extensions can extend the functionality of modern web browsers […]
Migrating Edge Computing to Hybrid Edge Computing
This project shows that approaches, as they are followed by Edge Computing and Mobile Edge Computing are insufficient and further […]
State of the Art Services for Direct Communication
Direct data transfer and direct communication services are becoming increasingly relevant due to widespread availability of high bandwidth Internet connections. […]
Automated Reasoning over Security Policies
Applied approaches on authorization management often focus on a single system or environment, neglecting the need to address the security […]
Security Aspects of Web-APIs
Analysis on the state of security of popular Web-API frameworks. Web-APIs represent a significant building block of the modern Web. […]
Browser Addon for Certificate Validation using EU Trust Lists
Intended for demonstration purposes, A-SIT realised an addon for Mozilla Firefox capable of verifying and displaying the trust status of […]
Automated Analysis of Windows Phone Applications
We carried out an automated analysis of about 65.000 Windows Phone apps. The idea was to automatically identify potential implementation errors that […]