SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies.
Edgar Weippl teaches at the summerschool in Cagliari. Other lecturers are Lorenzo Cavallaro, Royal Holloway, Univ. of London, Dawn Song, UC Berkeley, and Pierangela Samarati, University Milan (more…)
SBA organizes the ARES 20120 conference in Prague The ARES Conference Team: (from left to right) A Min Tjoa, Edgar Weippl, Yvonne Poul, Stefan Jakoubi, Simon Tjoa … Read More
12. Juli, 17:00 bei IBM – Architecture Circle Vienna in Wien. Thema: Wie sicher ist Mobile? Der Vortrag gibt Antworten auf brennende Fragen der Sicherheit von mobilen Endgeräten im Unternehmen. Wir werden beispielsweise der Frage nachgehen, ob diese Geräte überhaupt “managebar” sind. Die Devise “Bring your own device” ist… Read More
University of Freiburg together with Secure Business Austria is organizing a workshop on Emulation called “Towards Practical Emulation Tools and Strategies” on this years annual conference on the preservation of digital objects (iPres) to be held in Toronto, Canada in October. More information can be found on the workshop website… Read More
the BEST summer school on information security starts at the Vienna University of Technology. All lectures are held by researchers and professionals from SBA.
are now online: http://dx.doi.org/10.1007/978-3-642-30921-2 Trust and Trustworthy Computing, 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter and Xinwen Zhang
Together with sipgate and ISMK Stralsund, Gabriel Gegenhuber, researcher at SBA Research and University of Vienna, and Michael Pucher, researcher at SBA research, discovered and investigated a vulnerability in the Voice of LTE (VoLTE) stack that is broadly used within MediaTek-based smartphones. ∞
In the Mediatek modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. ∞