AC Cyber & Public Security
The advancing digitalization opens up many new opportunities, but also leads to new risks and threats. On a personal level, smartphones can be a threat to privacy and in particular, digitalization of critical infrastructures requires innovative measures to protect critical information infrastructures. AC Cyber & Public Security develops KI-based solutions for this purpose.
In the area of civil security, digitalisation also creates new possibilities for protecting citizens and increasing security. AC Cyber & Public Security develops solutions based on AI and UAVs.
Topics
Critical Information Infrastructure Protection
The correct functioning of critical infrastructures is hardly conceivable without IT systems. Past incidents have shown that these can be targeted by criminal actors, but are also endangered by highly professional attackers. It is
Next Generation Mobile Security
Mobile devices such as smartphones, notebooks and tablets are gaining increasing popularity. In particular, next-generation mobile phones are spreading faster and faster and are increasingly an important part of our every days life with growing opportunities. The ever increasing dependency on mobile applications leads mobile users to gain leap of faith and therefore to entrust applications private data. Due to the growing number of functions and computing capacity of such mobile devices the risk increases, in which mobile users become targets of various attacks. In order to protect todays and tomorrows mobile devices and their users effective, new approaches are required which take also the peculiarities of these devices into account.
With the solution called Androlyzer, which was developed at the DAI laboratory, we carry out static data flow analyses on any Android app. With this analysis technique we are able to investigate data protection violations without the source code of an app. The app does not even have to be installed or started. As a result of a source sink investigation, access to private data is detected. Starting from here, further processing steps of the app are analyzed in which such a step could correspond to the sending of such data. These and other analysis results are made available to the evaluator in the form of a report.