Blog
People
Research
Publications
Contact
Contact Us
Impressum
Light
Dark
Automatic
10
Automated User-Mode Emulation of Embedded Web Interfaces
With an increasing number of IoT devices, cyberattacks that target these devices are on the rise. In order to cut development costs, …
Klaus Hahnenkamp
Automatic Creation of Low-Interaction Honeypots forStateless Network Protocols
Low-interaction honeypots are always a compromise between having good interactivity and being cheap to create and run. Tools exist to …
Felix Kehrer
Firmware Re-Hosting: An Evaluation and Verification of FirmAE
Firmware re-hosting has been getting more attention as its use cases in developing embedded systems and security analysis are …
Sebastian Dietz
Analysis of Android Factory Resets
Smartphones are our every day companions. We use them to communicate, perform payments, track activities, or perform work-related …
Michael Lang
An evaluation of Anti-Tracking methods in Mobile environments
Lukas Hafenecker
Function Clone Detection Evaluation
While reverse engineering unknown binaries, one often finds already known or duplicate binary functions. These functions from the …
Burkhard Otwin Hampl
Large-Scale Fuzzing of Embedded Web Interfaces
Every day IoT is being used more and more, they connect from our fridge to our security cameras. Recent studies have showed that they …
Marc Sarri
Firmware Sample Analysis - Distinguish between Compressed Encrypted and Plain Binary Files
A device which we use on a daily basis could have flaws which risks the users privacy and security. This means that it is very …
Kevin Gufler
Taint Trace Visualization
Moritz Ilg
Android Information Extraction
Mario Doppler
»
Cite
×