The report presents a model that classifies fingerprintable information sources. The permission system of the Android operating system was used […]
News
IPFS Security Analysis
During this project, IPFS, a decentralized peer-to-peer hypermedia system, was subjected to a security analysis. Vulnerabilities with serious consequences could […]
IoT Devices in Service Compositions
Online applications are often composed of services provided by multiple service providers. In some cases, a service consumer may want […]
Providing Smartphone Features on the Desktop
Current personal computing devices, such as smartphones, laptops, and traditional desktop computers, are geared towards different applications and use cases, […]
Privacy-preserving Verifiable Data Audits
The main aim of this project was to build a prototype system that adds transparency to the way different parties […]
Semantic Search of Related Patterns in Source Code
The analysis of source code for security-critical elements can be supported by tools that search for certain predefined patterns in […]
SSI Offline-Verifiable Attributes
In a world with an increasing number of online services, digital identities become more and more important. Even in eGovernment, […]
MOCCA
Modular Open Citizen Card Architecture (MOCCA) was a project started by EGIZ for the implementation of a free, modular, open-source […]
Privacy-Preserving Service Composition
Service compositions are implemented through the interplay between actors of different organizations. Many composition systems use a middleware, which coordinates […]
Analysis of Electroneum Cloud Mining
Electroneum is one of the first cryptocurrencies that allows users to mine coins with a mobile device. Electroneum’s Cloud Mining […]