SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies.
Today, SBA Research releases SSNOOB, a simple Java tool to create Social Snapshots of Facebook accounts, into the public domain. SNOOB serves three main purposes: Digital Forensics (Extract Facebook account data from forensic images via valid Facebook session cookies) Research (Extract Facebook account data for scientific studies ranging… Read More
Edgar Weippl gives a keynote on Advanced Persistent Threats & Social Engineering at the 11th International Conference on Security and Cryptography (SECRYPT 2014), wich takes place from 28 – 30 August 2014 in Vienna.
We are proud to announce, that our paper “IMSI-Catch Me If You Can: IMSI-Catcher-Catchers” has been accepted to the 2014 Annual Computer Security Applications Conference (ACSAC). In this paper, we identify and describe multiple methods for detecting artifacts in the mobile network produced by IMSI Catchers. IMSI Catchers are used… Read More
Dr. Artemios G. Voyiatzis, Associate Researcher, Industrial Systems Institute, “Athena” Research and Innovation Center in ICT, Greece gives a talk about “Security challenges in industrial systems”. Abstract Tuesday, June 26, 2014, 10.00 – 11.30 This event is hosted by the Vienna ACM SIGSAC Chapter. Read More
Adrian Dabrowski, Martina Lindorfer and Johanna Ullrich visited the flagship conference Usenix Security Symposium, held from 20-22 August in San Diego, California. As usual, the conference hosted a variety of interesting talks covering a vast amont of different aspects in computer security. Johanna presented her paper on IPv6 Security at… Read More
A delegation of professors and researchers from the Changwon National University in South Korea visited SBA Research to learn about the successful COMET model where industry and researchers collaborate tightly in long-term research projects.
Together with sipgate and ISMK Stralsund, Gabriel Gegenhuber, researcher at SBA Research and University of Vienna, and Michael Pucher, researcher at SBA research, discovered and investigated a vulnerability in the Voice of LTE (VoLTE) stack that is broadly used within MediaTek-based smartphones. ∞
In the Mediatek modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. ∞