SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies.
SBA Research participated at the innovation panel “IT Security and Privacy”, organized by the City of Vienna! Articles about and photos of the event on the ZIT blog. … Read More
ERCIM, the European Research Consortium for Informatics and Mathematics, offers fellowships for PhD holders from all over the world. Next application deadline: April 30 2012. (details…)
The section about our projects in the Digital Preservation area is now up-to-date. Information on the research topics of the group and their current projects can be found here.
The thin line between design aspects for the private IT infrastructure in enterprises and the ones used to build a Private Cloud Computing environments makes it difficult to find actual differences. In many areas, there is actually a significant amount of similarities and overlaps between design approaches. To emphasizes essential… Read More
“This is not a book about security management; it is book [sic] about security leadership” — the first lines of the introduction clearly summarize the goal of this book and thus set it apart from the pile of books on information security management. (more)… Read More
The overall goal of EDImine is the analysis of inter-organizational business processes. Thereby, EDImine’s approach extends innovative process mining techniques, which currently have a pure focus on processes within a company. The project delivers means for mining the messages exchanged between companies, discovering the inherent inter-organizational processes using process mining, extracting relevant information out of these… Read More
Together with sipgate and ISMK Stralsund, Gabriel Gegenhuber, researcher at SBA Research and University of Vienna, and Michael Pucher, researcher at SBA research, discovered and investigated a vulnerability in the Voice of LTE (VoLTE) stack that is broadly used within MediaTek-based smartphones. ∞
In the Mediatek modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. ∞