SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies.
Sebastian Schrittwieser presented a talk on ethics in computer security research at the Chaos Communication Congress (29c3) in Hamburg. You can watch the recording on Youtube. Read More
Journal of Universal Computer Science (J.UCS) This special issue aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications. (Call for Papers)… Read More
Towards a Secure DNS (Dec 13, 2pm, SBA) Most caching DNS resolvers still rely for their security, against poisoning, on validating that the DNS responses contain some ‘unpredictable’ values, copied from the request. These values include the 16 bit identifier field, and other fields, randomised and validated by different… Read More
Heute fand das zweite Kamingespräch bei SBA Research zum Thema “Wissen und Prozesse in Unternehmen” statt. Ziel dieser neuen, sehr klein gehaltenen Veranstaltungsreihe ist es, bestehende Partner untereinander noch besser zu vernetzen, um neue Ideen, Konzepte und Projekte zu generieren und die Netzwerke der Partner zu erweitern. Zum Dezember-Kamingespräch durften… Read More
Heute fand der 2nd Young Researcher’s Day statt, der im Rahmen des OCG-Arbeitskreises IT-Sicherheit wieder von uns mitgestaltet wurde. Vertreten waren die WU Wien, JKU Linz, FH Hagenberg, FH St. Pölten, TU Wien, Uni Innsbruck und FH Salzburg. Read More
Together with sipgate and ISMK Stralsund, Gabriel Gegenhuber, researcher at SBA Research and University of Vienna, and Michael Pucher, researcher at SBA research, discovered and investigated a vulnerability in the Voice of LTE (VoLTE) stack that is broadly used within MediaTek-based smartphones. ∞
In the Mediatek modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. ∞