Mobile

How to secure Over-the-Air software updates

How to secure Over-the-Air software updates

Is your device’s update protocol secure? And even if so, do updates introduce new and significant exploitable vulnerabilities? Is a security certified device still certified after a firmware ...
Exploring the Boundaries of EMFI – FI Needle

Exploring the Boundaries of EMFI – FI Needle

Learn whether a real-world mobile phone can be influenced by fault injection attacks without any hardware modifications or attacker control code.
Premium Content Delivery on Android: how to guard an open platform

Premium Content Delivery on Android: how to guard an open platform

In this publication, we discuss the state of security of Android applications for premium content delivery.