Blog
People
Research
Publications
Contact
Contact Us
Impressum
Privacy Policy
Light
Dark
Automatic
10
Malware Detection Evasion using IO Uring
Nowadays, many frameworks allow running high-level code. Diverse frameworks treat individual requests differently. A popular approach …
Kondrashov Dmytro
GRIEviOS: Generating RandomInput Events for iOS app analysis
The automated analysis of mobile applications for Apples iOS platform has historically been hindered by the restricted system …
Hannes Hauer
Faulting RISC-V - Comparing the Fault Resilience of the RISC-V Instruction Set Architecture
Side-channel analysis allows sophisticated attackers to extract information by observing the time of different code paths, or the way a …
Philipp Eichinger
Game Console Hacking
Video game consoles are different from regular systems since they are designed with limitations that only allow them be used in the …
Aleksandar Djordjevic
Automated User-Mode Emulation of Embedded Web Interfaces
With an increasing number of IoT devices, cyberattacks that target these devices are on the rise. In order to cut development costs, …
Klaus Hahnenkamp
Automatic Creation of Low-Interaction Honeypots for Stateless Network Protocols
Low-interaction honeypots are always a compromise between having good interactivity and being cheap to create and run. Tools exist to …
Felix Kehrer
Firmware Re-Hosting: An Evaluation and Verification of FirmAE
Firmware re-hosting has been getting more attention as its use cases in developing embedded systems and security analysis are …
Sebastian Dietz
Analysis of Android Factory Resets
Smartphones are our every day companions. We use them to communicate, perform payments, track activities, or perform work-related …
Michael Lang
An evaluation of Anti-Tracking methods in Mobile environments
Lukas Hafenecker
Function Clone Detection Evaluation
While reverse engineering unknown binaries, one often finds already known or duplicate binary functions. These functions from the …
Burkhard Otwin Hampl
»
Cite
×