SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies.
We participated in this years ruCTFe as part of the We_0wn_Y0u team. After eight hours of intense CTF we finished 3rd out of 140 participants. Kudos to fail0verflow and More Smoked Leet Chicken. Read More
The last FemTech internships were very successful. The work of Katharina Krombholz led to a journal publication (‘Fake Identities in Social Media – A case study on the sustainability of the Facebook business model’) which was adopted by Springer Journal of Service Science Research.
Edgar Weippl (as vice president of AARIT) will coordinate the upcoming ERCIM News special issue on mobile computing. CfP will be available shortly on the ERCIM Website, submission deadline Feb 11, 2013.
On 09/11/2012 SBA Research presents at the IT-SeCX an der FH St. Pölten. at FH St. Pölten. Sebastian Schrittwieser talks about “WhatsApp and Co.: Attack Vectors in Smartphone Messengers”. … Read More
Die Innovationsplattform Digital Networked Data, bei der SBA Research als Mitglied tätig ist, lädt heute zu einer Veranstaltung zum Thema “Transformation von Rechenzentren”. Transformation von Rechenzentren.
Despite advances in programming language design a lot of software that is actively maintained or developed today is written in C or C++. SBA Research has published a library, named Slibc, to make secure programming in C easier. Slibc provides an implementation of the bounds-checking C functions (as specified in… Read More
Together with sipgate and ISMK Stralsund, Gabriel Gegenhuber, researcher at SBA Research and University of Vienna, and Michael Pucher, researcher at SBA research, discovered and investigated a vulnerability in the Voice of LTE (VoLTE) stack that is broadly used within MediaTek-based smartphones. ∞
In the Mediatek modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. ∞