Blog
People
Research
Publications
Contact
Contact Us
Impressum
Light
Dark
Automatic
9
Automated Stitching for Scanning Electron Microscopy Images of Integrated Circuits
While established toolchains are widely available for reverse engineering software, firmware, and even hardware on the printed circuit …
Daniel Burian
Embedded Binary Rewriting - Utilizing Ghidra and LLVM
A suitable strategy for patching and updating applications is an essential cornerstone of a modern IT environment. While in an open …
Raphael Ludwig
Identification of Obfuscated Function Clones in Binaries using Machine Learning
With widespread use of higher-level languages for malware, such as C# on Windows or Go for cross-platform malware, the complexity and …
Michael Pucher
Privacy-Preserving Remote Attestation Protocol
Binary Attestation (BA) is a security mechanism which has existed for decades. The goal of BA is to guarantee that the correct software …
Dominik Roy George
Smart Home Privacy Leaks
Despite the ever-growing impact of smart home internet of things devices research has shown that users are usually not aware of privacy …
Simon Treiber
Object Capabilities and their Benefits for Web Application Security
Nowadays, more and more applications are built with web technologies like HTML, CSS, and JavaScript, which are then executed in …
Michael Koppmann
Cruel intentions : enhancing androids intent firewall
The inter process communication (IPC) functionality of the Android platform has received the attention of security researchers since …
Thomas Klepp
Opcode Coverage-Guided Virtualization Deobfuscation Based on Symbolic Execution
Obfuscation is a common concept centered around the idea of semantically equivalent transformations that increase the difficulty of …
Christian Tatzer
Hashiko: A generative hybrid Password Manager for Android Design, Implementation and Security Analysis
Patrick Jofen
Open source and privacy aware Push notifications for mobile phones
The popularity of instant messaging services is ever rising. The metadata exposed via the usage of these services is personal and …
Harald Jagenteufel
»
Cite
×