SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies.
Das Risiko der Whistleblower. Tippgeber setzen sich einigen Risiken aus. Darauf sollte man achten, wenn man anonym auf Missstände hinweisen will. Edgar Weippl im Interview Manfred Huber, Risiko Whistleblowing, E-Media, 7/13, 6-7. Read More
Heute fand die Sitzung des Leitungsgremiums des GI-Fachbereiches „Sicherheit – Schutz und Zuverlässigkeit“ bei SBA Research statt, u.a. um die Organisation der Informatik 2014 zu besprechen. Die Informatik 2014 wird vom 19.-21.3. 2014 an der TU Wien im Kuppelsaal stattfinden.
Last day of AsiaARES & ICT-EurAsia 2013 organized by SBA Research in conjunction with the Universiti Gadah Madja. The conference takes place at the University Gadah Madja in Yogyakarta, Indonesia from 24th – 29th of March, 2013. in 2014 AsiaARES & ICT-EurAsia will be held at the Universiti Teknikal Malaysia… Read More
The Team “We_0wn_Y0u”, consisting of members of iseclab and SBA Research, has won the second place in the iCTF which took place last Friday (see scoreboard). “Critial infrastructure” was the theme, and the scenario was completely different to previous years. In total, nine services had to be attacked and defended… Read More
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, special issues on “Frontiers in Security and Dependability” (Vol 4, No.1; an ARES Special issue) is available now.
Vom 14.-16. März 2013 fand das “Wiener Forschungsseminar” statt, das seit 2001 alle 2 Jahre unter der Ägide des Forums eBusiness der OCG als Kooperation der Universität Magdeburg und der Universität Wien abgehalten wird. Herr Professor Gerhard Wäscher, president elect der EURO – ‘Association of European Operational Research Societies’… Read More
Together with sipgate and ISMK Stralsund, Gabriel Gegenhuber, researcher at SBA Research and University of Vienna, and Michael Pucher, researcher at SBA research, discovered and investigated a vulnerability in the Voice of LTE (VoLTE) stack that is broadly used within MediaTek-based smartphones. ∞
In the Mediatek modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. ∞