Blog
People
Research
Publications
Contact
Contact Us
Impressum
Privacy Policy
Light
Dark
Automatic
9
Concealed Honeypots: Developing a Tunneling System
This work identifies and addresses approaches to developing a tunneling application for network traffic to and from multiple cloud VMs …
Michael Mente
Fuzzing Embedded Protocols
Embedded systems are prevalent in all parts of modern life, consumer electronics, home automation, and also in various safety critical …
Martin Szewieczek
Scanning for IoT Devices Using a Mobile Android Application
The number of IoT devices has been growing in the last few years. Many devices that usually had no connectivity whatsoever, are now …
Michael Bernd Stöger
Automated Stitching for Scanning Electron Microscopy Images of Integrated Circuits
While established toolchains are widely available for reverse engineering software, firmware, and even hardware on the printed circuit …
Daniel Burian
Embedded Binary Rewriting - Utilizing Ghidra and LLVM
A suitable strategy for patching and updating applications is an essential cornerstone of a modern IT environment. While in an open …
Raphael Ludwig
Identification of Obfuscated Function Clones in Binaries using Machine Learning
With widespread use of higher-level languages for malware, such as C# on Windows or Go for cross-platform malware, the complexity and …
Michael Pucher
Privacy-Preserving Remote Attestation Protocol
Binary Attestation (BA) is a security mechanism which has existed for decades. The goal of BA is to guarantee that the correct software …
Dominik Roy George
Smart Home Privacy Leaks
Despite the ever-growing impact of smart home internet of things devices research has shown that users are usually not aware of privacy …
Simon Treiber
Object Capabilities and their Benefits for Web Application Security
Nowadays, more and more applications are built with web technologies like HTML, CSS, and JavaScript, which are then executed in …
Michael Koppmann
Cruel intentions : enhancing androids intent firewall
The inter process communication (IPC) functionality of the Android platform has received the attention of security researchers since …
Thomas Klepp
»
Cite
×