SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies.
Together with sipgate and ISMK Stralsund, Gabriel Gegenhuber, researcher at SBA Research and University of Vienna, and Michael Pucher, researcher at SBA research, discovered and investigated a vulnerability in the Voice of LTE (VoLTE) stack that is broadly used within MediaTek-based smartphones. Read More
In the Mediatek modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Read More
In mid-May, our colleague Reinhard Kugler, applied research consultant at SBA Research, gave a talk on Tracing the Invisible: how to create Observability on Edge Devices with eBPF. His presentation focused on tracing protocols in embedded systems by instrumenting the kernel. He discussed protocols such as SPI, I2C, and… Read More
For over 25 years, Infraprotect has supported companies in the fields of crisis, emergency, risk, and security management, as well as crisis communication and R&D. The company provides tailored crisis management solutions to clients from a variety of sectors, including manufacturing, critical infrastructure, and public services. Read More
In 2025, the Austrian Computer Society (OCG) once again recognizes outstanding academic work in the fields of Computer Science and Business Informatics with the OCG Förderpreis and the OCG Förderpreis-FH. This year’s OCG Förderpreis goes to our research colleague Daryna Oliynyk for… Read More
In early April, we held a company-wide internal kick-off for our SBA-K1 NGC – Next Generation Cybersecurity COMET program, marking the beginning of an exciting new chapter for our research center. After months of preparation and collaboration, our team started the first COMET NGC phase, setting the stage for… Read More
In April 2025, the paper "Attackers Can Do Better: Over- and Understated Factors of Model Stealing Attacks", authored by Daryna Oliynyk, Rudolf Mayer, and Andreas Rauber, was presented at the IEEE Conference on Secure and Trustworthy Machine Learning (SaTML). ... Read More
Bluetooth Low Energy is one of the most widely used protocols used in Internet of Things (IoT) and multimedia devices. Security issues in these applications are prone to affect a significant number of end users and companies alike. In their latest work applying the Combinatorial Security Testing (CST) approach… Read More
The research on Combinatorial Security Testing (CST) by the MATRIS group of SBA Research is amongst the top five nominations for the Houska prize, Austria's largest private award for application-oriented research, in the category non-university research. ... Read More
Together with sipgate and ISMK Stralsund, Gabriel Gegenhuber, researcher at SBA Research and University of Vienna, and Michael Pucher, researcher at SBA research, discovered and investigated a vulnerability in the Voice of LTE (VoLTE) stack that is broadly used within MediaTek-based smartphones. ∞
In the Mediatek modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. ∞