Patching existing Android packages has a broad range of applications, ranging from fixing security vulnerabilities to instrumenting potential malware, or […]
News
PDF-Over
How does it work PDF-Over is your tool for frequent & efficient PDF signing. Configured according to your individual needs, […]
Cross-User Security on Android
This report takes a closer look at the security of the isolation between different user accounts on Android. In particular, […]
Whitepaper APIs in E-Government (DE)
Application Programming Interfaces, or APIs for short, enable the provision of web services and data via machine-readable interfaces while restricting […]
Challenges of Encyption: Recovery and Computation
Encryption represents a fundamental tool to protect the confidentiality of sensitive data, such as identity attributes, medical data, and digital […]
Automatic Detection and Mitigation of Crypto API Misuse in Android Applications
Almost a decade after its first scientific discussion, crypto API misuse remains one of the most common security flaws in […]
Behavioral Authentication in Digitales-Amt-App
Biometric authentication has become one of the most widely used authentication methods, especially on smartphones and in the Digitales-Amt app. […]
Decentral Methods for Simultaneous Editing of Shared Data Structures
Systems such as Google Docs or web-based versions of Microsoft Office have been instrumental in driving collaborative document editing. Distributed […]
Resource efficient DTLS Handshakes for IoT Sensors
Every year, more and more smart sensors measure and influence many parts of our daily lives. Such sensors usually work […]
Fundamental challenges with public blockchains
In this study, we present selected properties of public blockchains on the example of Bitcoin. Depending on the use case, […]