Navigation
Skip links
Jump to content
Jump to page navigation
Meta Navigation
Faculty of Engineering
Mein Campus
UnivIS
Jobs
Map
Search
Search website
Please enter the search term for searching into the documents of this website:
Main navigation
Navigation
Research
Forensic Computing Group
Human Factors in Security and Privacy Group
Multimedia Security
Security Education Development Group
System Security Group
Archive
Funded Projects
Publications
Portal Research
Lab
Staff & Research Groups
Alumni
Partners
Portal Lab
Teaching
Courses
Hinweise zu den Lehrveranstaltungen
Notes on Examinations
eTeaching
Theses
Writing a Thesis at Informatik 1
Portal Teaching
How to reach us
Breadcrumb
Home
/
Research
/
Research
Security Education Development Group
In page navigation:
Research
Forensic Computing Group
DiOS: Dynamic Privacy Analysis of iOS Applications
Fingerprinting Mobile Devices Using Personalized Configurations
Selective Deletion
Human Factors in Security and Privacy Group
Browser Fingerprinting
ZigBee Security Research
Multimedia Security
Image & Video Forensics
Image Analysis & Enhancement
X-ray Phase Contrast
Blog
Colloquium
Security Education Development Group
Open C3S Overview
Open-C3S-Projektergebnisse
Ulix – a Literate OS
System Security Group
AppAuth: On App-based Matrix Code Authentication in Online Banking
AppTAN (In)Security: (In)Security of App-based TAN Methods in Online Banking
AVX Crypto: AVX Instructions to Accelerate Crypto Primitives
Bispe: A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory
Centroid
CPU-bound Encryption (TRESOR, TreVisor, ARMORED)
FROST: Forensic Recovery Of Scrambled Telephones
How Android’s UI Security is Undermined by Accessibility
HyperCrypt: Hypervisor-based Encryption of Kernel and User Space
N26
Nomorp
One Key to Rule Them All: Recovering the Master Key from RAM to break Android’s File-Based Encryption
RamCrypt: Kernel-based Address Space Encryption for User-mode Processes
SED (In)Security: Hardware-based Full Disk Encryption (In)Security
SGX-Kernel: Isolating Operating System Components with Intel SGX
SGX-Timing: Cache Attacks on Intel SGX
Soteria: Offline Software Protection within Low-cost Embedded Devices
STARK / MARK: Tamperproof/Mutual Authentication to Resist Keylogging
TEEshift: Protecting Code Confidentiality by Selectively Shifting Functions into TEEs
VMAttack: Deobfuscating Virtualization-Based Packed Binaries
Archive
ContrOWL: A new security app based on crowed intelligence
Ext4 File Recovery
Forensic Email Visualization
Forensic RAID Recovery
Forensig²: File System Images for Training Courses in Forensic Computing
Mobile Hotspots
Mobile-Sandbox & ADEL: Automated Malware Analyses / Mobile Phone Forensics
Privacy Aspects of Forensic Computing
PyBox – A Python Sandbox
TrustedPals: Framework to Help Establish Security in a Mutually Untrusted Distributed System
VirMA: Windows NT pagefile.sys Virtual Memory Analysis
Win Vista/7/8/10 Thumbnails Analyzer
Funded Projects
Publications
Technische Berichte in Digitaler Forensik
Security Education Development Group