Android smartphone data spies exposed like bank robbers

Android smartphone data spies exposed like bank robbers

When a bank is robbed, the loot will often contain a wad of manipulated banknotes. These will explode en route and release a colorful dye, marking the money as stolen. Researchers use a similar principle to identify spyware on smartphones. Computer scientists from the...
With Boxmate malicious programs have no place left to hide

With Boxmate malicious programs have no place left to hide

By preventing unexpected behavior changes, the “Boxmate” approach defends existing embedded systems, mobile devices, and even servers against known and as-yet unknown forms of attack. Computer scientists from the Center for IT Security, Privacy and Accountability...
Computer animation: models for facial expression

Computer animation: models for facial expression

Computer scientists in Saarbruecken can produce realistic face models, for example for animated films, just from video recordings. Today’s film industry no longer relies solely on the skill of actors: in the latest movies, their faces are often edited on a computer...