Implementation and Evaluation of Novel Juice Jacking Attacks
Juice jacking refers to a family of attacks on mobile devices in which a manipulated charging cable is used to…
Juice jacking refers to a family of attacks on mobile devices in which a manipulated charging cable is used to…
Wireless network communication via Wi-Fi has today become a taken-for-granted part of everyday life. Especially on mobile devices such as…
Browsers and the web community are continuously introducing new web browser interfaces for various use cases. Of particular interest here…
The A-SIT SSL/TLS tool tests the security properties of Web browsers and Web Servers. The A-SIT SSL/TLS tool consists of […]
CCE enables container-based encryption of files and folders. Encryption of data can be performed using smart-cards (hardware based keys, currently various versions of Austrian […]