Policies for access control systems enable the decoupling of the control of data and resource access from the business logic. […]
News
Possibilities for implementing an Austrian e-government service using open data
The use of open government data is becoming increasingly important to drive the development of artificial intelligence (AI) applications in […]
Secure development of AI services
AI-based services can reduce time and costs on the part of government agencies and private companies, while increasing user satisfaction. […]
Detecting Inconsistencies between Android App Descriptions and Permissions
Android users are offered a vast number of apps that provide a variety of functionalities and assistance in everyday life. […]
Runtime Integrity Checks in Android Applications
In order to hamper reverse engineering of applications and thwart repackaging attacks, some particularly security aware Android developers integrate runtime […]
Prevalence of HTTP in Android applications
In contrast to the web ecosystem, where after initial problems the encryption of HTTP connections through TLS has gained wide […]
Utilising an Android smartphone as a key store for Web Authentication
This report shows how an Android smartphone can be used as a secure keystore for Web Authentication on the desktop. […]
Analysis of the Fingerprintability of iOS devices
This report examines the sources of information provided by the iOS programming interface suitable for recognizing iOS devices and their […]
A survey on enhancing privacy awareness on Android
The prevalence of mobile devices in everyday life has led to the expansion of mobile apps on the market. While […]
Artificial Intelligence and IT-Security
With advancing digital transformation and growing labor shortages, many processes are being automated. However, pure software solutions are often unable […]