Christian Lindenmeier

ORCID: 0000-0003-2369-2196
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Security and Verification in Computing
  • Internet Traffic Analysis and Secure E-voting
  • Adversarial Robustness in Machine Learning
  • Privacy, Security, and Data Protection
  • Cloud Data Security Solutions
  • Service-Oriented Architecture and Web Services
  • User Authentication and Security Systems
  • Cryptographic Implementations and Security
  • Business Process Modeling and Analysis
  • Digital and Cyber Forensics
  • Digital Rights Management and Security
  • Distributed systems and fault tolerance
  • Software System Performance and Reliability
  • Libraries and Information Services
  • Advanced Steganography and Watermarking Techniques

Friedrich-Alexander-Universität Erlangen-Nürnberg
2024

The rise of end-to-end encryption has enabled end-users to protect their data a point that classical techniques lawful access (seizure devices, wiretaps) are futile. While there is heated discussion about regulating the primitive end-user devices for law enforcement, little attention given technical design how evidence should be collected. This especially critical during remote surveillance, as enforcement may have unrestricted over longer periods time. In this paper, we propose novel...

10.1016/j.fsidi.2024.301796 article EN cc-by Forensic Science International Digital Investigation 2024-07-05

To break end-to-end encryption used by apps (e.g., messengers) today, attackers must obtain code execution directly on an end device to access data before it is encrypted, resulting in Man-At-The-End (MATE) attacks. The effectiveness of such attacks rises with the privilege level executed on, e.g., system or hypervisor employing techniques as virtual machine introspection (VMI). Another option perform MATE place software trusted environments (TEEs), many platforms, these have highest while...

10.1145/3689934.3690838 article EN 2024-11-19

Remote forensic investigations, i.e., the covert lawful infiltration of computing devices, are a generic method to acquire evidence in presence strong defensive security. A precondition for such investigations is ability execute software with sufficient privileges on target devices. The standard way achieve remote access by exploiting yet unpatched vulnerabilities. This turn puts other users at risk, resulting dilemma state authorities that aim protect general public (by patching...

10.1145/3680294 article EN Digital Threats Research and Practice 2024-07-22

Der Marktanteil elektronischer Bucher (E-Books) am Buchmarkt wachst bestandig. Um E-Books zu rezipieren, benotigt man spezielle Leseumgebungen, die als Software (im Browser oder eigene Anwendung) Spezialgerat (E-Reader) realisiert sein konnen. Diese Leseumgebungen sind geeignet, Daten uber das Leseverhalten sammeln. Im Rahmen einer universitaren Lehrveranstaltung wurden Software-Leseumgebungen der beiden deutschen Marktfuhrer Kindle und Tolino untersucht. vorliegende Bericht fasst Ergebnisse...

10.25593/issn.2191-5008/cs-2019-06 article DE 2019-01-01
Coming Soon ...