SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies.
Despite advances in programming language design a lot of software that is actively maintained or developed today is written in C or C++. SBA Research has published a library, named Slibc, to make secure programming in C easier. Slibc provides an implementation of the bounds-checking C functions (as specified in… Read More
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) Guest Editorial Board – Edgar Weippl, Simon Tjoa, Gerald Quirchmayr, and A Min Tjoa Guest Editorial Assistant of JoWUA Yvonne Poul. Time Schedule Paper submission due: October 31, 2012 First-round acceptance notification: November 30, 2012 Revision: December… Read More
After a successful 1st Young Researcher’s Day in March 2012, we now start in round two! Ingrid Schaumüller-Bichl and Edgar Weippl cordially invite to the 2nd Young Researcher’s Day which will take place during the OCG working group „IT Security“ on 29/11/2012. The basic idea behind this event is the… Read More
Am 06.11.2012 lädt die Innovationsplattform Digital Networked Data, bei der SBA Research als Mitglied tätig ist, zu einer Veranstaltung zum Thema “Transformation von Rechenzentren”. Nähere Infos zum Programm finden Sie hier: Transformation von Rechenzentren.
Wir freuen uns, dass wieder 2 Femtech-Praktika genehmigt wurden. Beim letzten Mal konnten wir uns beiden Praktikantinnen (Heidi Hobel und Katharina Krombholz) in ein fixes Dienstverhältnis als Forscherinnen übernehmen.
Heute fand das erste Kamingespräch bei SBA Research zum Thema “Innovative Cloudlösungen” statt. Ziel dieser neuen, sehr klein gehaltenen Veranstaltungsreihe ist es, bestehende Partner untereinander noch besser zu vernetzen, um neue Ideen, Konzepte und Projekte zu generieren und die Netzwerke der Partner zu erweitern. Zu diesem ersten Kamingespräch durften wir… Read More
Privacy and Security issues in Published or Outsourced Databases by Dimitris Sacharidis The concept of k-anonymity has received considerable attention due to the need of several organizations to release microdata without revealing the identity of individuals. Standard anonymization techniques assume the existence of a public database that a… Read More
From September 19 to 21, around 65 talented and curious women and FINTA* immersed themselves in the exciting world of cybersecurity at the University of Vienna. This continuing education and networking program is unique in Europe and is designed to make it easier to enter and advance in IT security. ... ∞
The 20th International Conference on Availability, Reliability, and Security (ARES 2025) took center stage in Ghent, Belgium, from August 11-14, 2025, offering a platform for experts and enthusiasts to explore the latest developments in the field. Co-located with ARES 2025 was the 8th International Symposium for Industrial Control System & SCADA Cyber Security Research.... ∞