Skip to main content
FAU.de
Structure
Search
Friedrich-Alexander-Universität
Lehrstuhl für Informatik 1, IT-Sicherheitsinfrastrukturen
Research
Lab
Teaching
How to reach us
Menu
Friedrich-Alexander-Universität
Erlangen-Nürnberg
Teaching
Start
Teaching
Courses
No matching records found.
Back to overview
Services
Use Tab to navigate through menu items, Enter to select, Escape to close, or use the Close button.
Back
Close
No menu items found.
Structure
Use Tab to navigate through menu items, Enter to select, Escape to close, or use the Close button.
Back
Close
Website Menu
Use Tab to navigate through menu items, Enter to select, Escape to close, or use the Close button.
Back
Close
Research
Forensic Computing Group
DiOS: Dynamic Privacy Analysis of iOS Applications
Fingerprinting Mobile Devices Using Personalized Configurations
Forensische Informatik: Datensicherung von problematischen Asservaten
Selective Deletion
Human Factors in Security and Privacy Group
Antivirus Usability
Browser Fingerprinting
Consistency of CVSS
Cybercrime and Forensic Computing
IoT Security Update Labels
Phishing Susceptibility
Security Experts
System Administrators
ZigBee Security Research
Multimedia Security
Image & Video Forensics
Image Analysis & Enhancement
X-ray Phase Contrast
Blog
Code and Data
Copy-Move Forgery Detectors and Ground Truth Generator
Image Manipulation Dataset
Reprocessed DetectRL Dataset
Colloquium
Security Education Development Group
Open C3S Overview
Open-C3S-Projektergebnisse
Ulix - a Literate OS
System Security Group
AppAuth: On App-based Matrix Code Authentication in Online Banking
AppTAN (In)Security: (In)Security of App-based TAN Methods in Online Banking
AVX Crypto: AVX Instructions to Accelerate Crypto Primitives
Bispe: A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory
Centroid
CPU-bound Encryption (TRESOR, TreVisor, ARMORED)
FROST: Forensic Recovery Of Scrambled Telephones
How Android’s UI Security is Undermined by Accessibility
HyperCrypt: Hypervisor-based Encryption of Kernel and User Space
N26
Nomorp
On the Prevalence and Usage of TEE-based Features on Android
One Key to Rule Them All: Recovering the Master Key from RAM to break Android's File-Based Encryption
RamCrypt: Kernel-based Address Space Encryption for User-mode Processes
ReFuzz — Structure Aware Fuzzing of the Resilient File System (ReFS)
RISCoT - Security Analysis of Trusted Execution Environments on RISC-V
SED (In)Security: Hardware-based Full Disk Encryption (In)Security
SGX-Kernel: Isolating Operating System Components with Intel SGX
SGX-Timing: Cache Attacks on Intel SGX
SoK: The Evolution of Trusted UI on Mobile
Soteria: Offline Software Protection within Low-cost Embedded Devices
STARK / MARK: Tamperproof/Mutual Authentication to Resist Keylogging
TEEshift: Protecting Code Confidentiality by Selectively Shifting Functions into TEEs
VMAttack: Deobfuscating Virtualization-Based Packed Binaries
Information Security Group
Security Analytics
AI in Digital Forensics
Digital Vehicle Forensics
Vehicle Security Operations Center
Archive
ContrOWL: A new security app based on crowed intelligence
Ext4 File Recovery
Forensic Email Visualization
Forensic RAID Recovery
Forensig²: File System Images for Training Courses in Forensic Computing
Mobile Hotspots
Mobile-Sandbox & ADEL: Automated Malware Analyses / Mobile Phone Forensics
Privacy Aspects of Forensic Computing
PyBox - A Python Sandbox
TrustedPals: Framework to Help Establish Security in a Mutually Untrusted Distributed System
VirMA: Windows NT pagefile.sys Virtual Memory Analysis
Win Vista/7/8/10 Thumbnails Analyzer
Funded Projects
Publications
Technische Berichte in Digitaler Forensik
Lab
Staff & Research Groups
Alumni
Partners
FAU i1 Webshop
Teaching
Courses
General Information regarding Teaching/Courses
Notes on Examinations
eTeaching
Theses
Writing a Thesis at Informatik 1
Writing a Thesis at Informatik 1
How to reach us
Search
Use Tab to navigate through menu items, Enter to select, Escape to close, or use the Close button.
Close
Search all pages and documents:
Search