Search

AppSec - Applied Security
AppSec - Applied Security
  • Blog
  • People
  • Research
  • Publications
  • Contact
    Contact Us Impressum
  • Light Dark Automatic

10

Automated User-Mode Emulation of Embedded Web Interfaces
With an increasing number of IoT devices, cyberattacks that target these devices are on the rise. In order to cut development costs, …
Klaus Hahnenkamp
Automatic Creation of Low-Interaction Honeypots forStateless Network Protocols
Low-interaction honeypots are always a compromise between having good interactivity and being cheap to create and run. Tools exist to …
Felix Kehrer
Firmware Re-Hosting: An Evaluation and Verification of FirmAE
Firmware re-hosting has been getting more attention as its use cases in developing embedded systems and security analysis are …
Sebastian Dietz
Analysis of Android Factory Resets
Smartphones are our every day companions. We use them to communicate, perform payments, track activities, or perform work-related …
Michael Lang
An evaluation of Anti-Tracking methods in Mobile environments
Lukas Hafenecker
Function Clone Detection Evaluation
While reverse engineering unknown binaries, one often finds already known or duplicate binary functions. These functions from the …
Burkhard Otwin Hampl
Large-Scale Fuzzing of Embedded Web Interfaces
Every day IoT is being used more and more, they connect from our fridge to our security cameras. Recent studies have showed that they …
Marc Sarri
Firmware Sample Analysis - Distinguish between Compressed Encrypted and Plain Binary Files
A device which we use on a daily basis could have flaws which risks the users privacy and security. This means that it is very …
Kevin Gufler
Taint Trace Visualization
Moritz Ilg
Android Information Extraction
Mario Doppler
  • »

© 2023 The AppSec Team. This work is licensed under CC BY 4.0

Published with Wowchemy — the free, open source website builder that empowers creators.

Cite
Copy Download