Security of mobile and ubiquitous computing

Mission

The mobile and ubiquitous computing research area focuses on the design, analysis, and evaluation of secure mobile and ubiquitous computing systems.

Mobile and ubiquitous computing have already and will continue to heavily influence our every-day lives, be it our smart phones or new technologies like wearables. Since these smart computing devices are part of our daily routines and we heavily rely on their functionality, the more important become their security and privacy properties.

The research in this area aims to develop ubiquitous computing systems with strong data confidentiality and integrity guarantees, as well as secure, controllable, and privacy-preserving mobile platforms.

Publications

ARTist: The Android Runtime Instrumentation and Security Toolkit

Richterliche Unabhängigkeit und Bring Your Own Device (BYOD) – Weg in die Zukunft oder unvertretbares Sicherheitsrisiko?

Reliable Third-Party Library Detection in Android and its Security Applications

Leading By (Insecure) Example: How Internet Resources Might be Helping You Develop Faster But Less Securely

SGX-Enabled Oblivious Machine Learning

On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis

VatiCAN - Vetted, Authenticated CAN Bus

Boxify: Bringing Full-Fledged App Sandboxing to Stock Android

R-Droid: Leveraging Android App Analysis with Static Slice Optimization

SoK: Lessons Learned From Android Security Research For Appified Software Platforms

You Get Where You're Looking For: The Impact Of Information Sources On Code Security

HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving

Nearly Optimal Verifiable Data Streaming

Nearly Optimal Verifiable Data Streaming

Datenspeicherung in modernen Fahrzeugen – wem „gehören” die im Fahrzeug gespeicherten Daten?

Efficient smart metering based on homomorphic encryption

Privacy Challenges in the Quantified Self Movement - An EU Perspective

Delegatable Functional Signatures

Mining Android Apps for Anomalies

Boxify: Full-fledged App Sandboxing for Stock Android

Mining Apps for Abnormal Usage of Sensitive Data

Scippa: System-Centric IPC Provenance on Android

DEMO: Enhancing Security and Privacy with Google Glass

SDDR: Light-Weight, Secure Mobile Encounters

A Tutorial on Human Activity Recognition Using Body-worn Inertial Sensors

Detection and Tracking of Occluded People

EnCore: Private, Context-based Communication for Mobile Social Apps

Investigating the effectiveness of peephole interaction for smartwatches in a map navigation task

Interrupted by a phone call: exploring designs for lowering the impact of call notifications for smartphone users

Interacting with 3D Content on Stereoscopic Displays

Race Detection for Android Applications

SurfacePhone: A Mobile Projection Device for Single- and Multiuser Everywhere Tabletop Interaction

Scalable Multitask Representation Learning for Scene Classification