Blog
People
Research
Publications
Contact
Contact Us
Impressum
Privacy Policy
Light
Dark
Automatic
9
Opcode Coverage-Guided Virtualization Deobfuscation Based on Symbolic Execution
Obfuscation is a common concept centered around the idea of semantically equivalent transformations that increase the difficulty of …
Christian Tatzer
Hashiko: A generative hybrid Password Manager for Android Design, Implementation and Security Analysis
Patrick Jofen
Open source and privacy aware Push notifications for mobile phones
The popularity of instant messaging services is ever rising. The metadata exposed via the usage of these services is personal and …
Harald Jagenteufel
Towards a scalable secure element cluster: a recommendation on hardware configuration
Hardware protected storage of key material and secure processing of cryptographic operations are required in data centers as well as …
Timo Hinterleitner
Security and privacy of secure messaging services: a case study of wire
End-to-end encryption has become a requirement for secure messaging, which has improved a lot since Signal introduced the Double …
Andreas Boll
Automatic Identification of Cross-Container Side-Channels
Jakob Baumgartner
Human-assisted information extraction through Bluetooth Low Energy on Android
Gabor Szivos
A multi-architecture decompiler based on an SSA-form IR
Thomas Wagner
Automated XSS Vulnerability Detection Through Context Aware Fuzzing and Dynamic Analysis
Tobias Fink
«
Cite
×