A cloud-based mobile augmentation solution enables the efficient use of mobile device performance by decoupling resources such as the programming […]
News
Static analysis of selected Android applications
We analyzed how a set of selected applications is capable of overcoming real-world threats. Based on current attack vectors, we […]
Firefox plugin highlighting security information
This Firefox plugin developed by A-SIT shows security-relevant parameters of the active connection. Typically, browsers keep the display of security-related […]
Apache Cordova Cryptography Plugin
This project implements a cryptography plugin for the Cross-Platform Framework Apache Cordova. The plugin is currently available for Android only. […]
Analysis of Windows Phone Applications
A study of ways to analyze applications for Windows Phone 8 and 8.1. This document provides an overview of current […]
TPMv2 Analysis
The “Trusted Computing” technology offers interesting concepts and methods to increase the trustworthiness of connected systems. By adding a new component […]
eID in the Cloud with SCIM
System for Cross-Domain Identity Management (SCIM) describes a new protocol that facilitates and supports the management of e-identities in cloud-based […]
Cloud-based Mobile Augmentation Systems
A survey on systems for offloading resource intense tasks from mobile end devices. Since the emergence of mobile devices, researchers […]
Citizen Card Plugin for KeePass
A plugin to use the Austrian citizen card with the free password manager KeePass has been developed. KeePass can protect passwords using […]
Threats Posed by Malicious USB Devices
Recently, manipulated USB devices have appeared that can not be detected as a threat to current protection measures. This short […]