Juice Jacking describes a family of attacks on mobile device that utilise a manipulated charging cable for extracting data or […]
News
Analysis of the Android Health Connect Programming Interface
A large amount of sensitive data is typically stored on smartphones. In combination with wearables and other smart diagnostic devices, […]
Identity Recovery in Case of Device Loss
The increasing prevalence of digital identities and cryptographic key materials on various devices poses a high security risk. If a […]
Reducing the Fingerprintability of Android Smartphones
This report introduces a method which makes it possible to reduce the fingerprintability of Android smartphones. This involves changing information […]
Detection of emulators in malware analysis on Android
To prevent malware from spreading, applications are examined before they are published in app stores. Dynamic analysis, in which the […]
State of the Art Black Box UI Testing of Android Applications
Automated Black Box UI testing has a wealth of use cases in dynamic software analysis, in the exploration of malware, […]
Access Control for Distributed Data Analysis using Secure Multi-party Computation
Multi-party computation (MPC) is a cryptographic method for secure distributed execution of computations. In an MPC system, multiple participants collaboratively […]
Investigation of the Content Provider Interface on Android
Content providers are used on Android to expose data to other components and applications in a defined way. They act […]
Analysis of Android Code Transparency
In 2018, Google introduced a new file format for submitting applications to Google Play called Android Application Bundle (AAB). As […]
Privacy comparison between paid and free apps
The statistics report that 97% of the Android apps from the official store are free. Nevertheless, a few free apps […]