Research blog

We believe in the transformative power of digitalization

We actively contribute to technology evolution by finding weaknesses so that better technology can emerge. Our research interests cover diverse technology areas, but generally focus on complex systems with many users. It is our mission to inform these users of the risk of today’s systems.

Category
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
The Hackability of organizations can be measured and compared
hackability
11/29/2018
The Android ecosystem contains a hidden patch gap
android
open source
4/12/2018
The Cloud exposes your private IP cameras
IoT
device hacking
11/16/2017
Legacy booking systems disclose travelers’ private information
cryptography
12/26/2016
Outdated payment protocols expose customers and merchants
device hacking
cryptography
12/22/2015
USB peripherals can turn against their users
device hacking
hacking projects
7/31/2014
Fingerprints are not fit for secure device unlocking
device hacking
IoT
9/25/2013
SIM cards are prone to remote hacking
telco
open source
7/21/2013
Mobile networks differ widely in security, none protect well in all dimensions
telco
open source
7/14/2012
-->