SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies.
In the course of a 2-day strategy meeting at the Europahaus Wien we intensively worked out new strategies and set future goals. In a great atmosphere we brainstormed in small groups and were provided with outlooks for anticipated development and projects. The stimulating yet relaxed off site setting enabled a… Read More
At the VHS Mariahilf Edgar Weippl gave a presentation ‘Vom Morris-Wurm bis WannaCry’ to offer the interested general public an insight into how information security evolved in the past decades. Read More
Edgar Weippl gives an invited talk at ENISA’s NIS Summer School 2018 in Heraklion. His talk is on Blockchains and Opportunities for Interdisciplinary Research. In addition, Edgar is on the panel on ‘Upcoming NIS Challenges from a European perspective’ representing the research view from the perspective of the presidency… Read More
After Srdjan Capkun’s opening keynote on ‘Secure Positioning and Location-Based Security’ and Bart Preneel’s presentation on ‘Challenges for Embedded Cryptography’, Edgar Weippl gave his invited talk on “Distributed Ledger Technology, Blockchain & Crypto Currencies – Hype & an Opportunity for Interdisciplinary Research” at the Cryptacus Conference. Read More
The workshop entitled “Domain specific extensions for machine-actionable Data Management Plans” was held during the 22nd International Conference on Theory and Practice of Digital Libraries in Porto, Porugal. In the workshop participants focused on the common data model for machine-actionable DMPs and seek to identify which domain specific extensions must be implemented… Read More
Today, at the 2nd IMA Conference on Theoretical and Computational Discrete Mathematics [IMA], Bernhard Garn gives a talk titled ‘Algebraic Techniques for Covering Arrays and Related Structures’ (joint work with Dimitris Simos). The conference showcases theoretical and computational advances in the general field of discrete mathematics. [IMA] https://ima.org.uk/7775/2nd-ima-conference-theoretical-computational-discrete-mathematics/
Tomasz Miksa presented a paper entitled “Research Data Preservation Using Process Engines and Machine-Actionable Data Management Plans” at the 22nd International Conference on Theory and Practice of Digital Libraries (TPDL 2018) which was held 10-13 September in Porto, Portugal. The paper demonstrates how systems used for managing data during research… Read More
Yesterday, Nicholas Stifter presented their paper: Johanna Ullrich, Nicholas Stifter, Aljosha Judmayer, Adrian Dabrowski and Edgar Weippl, “Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids” at RAID 2018 in Heraklion, Crete The paper analyzes the potential impact cryptocurrency mining and its large power consumption could have on the reliable operation… Read More
Photo by Atilla Elçi The morning session started with Edgar’s Opening Keynote on Distributed Ledger Technology, Blockchain & Crypto Currencies. The topic is not only a hype area but also well-suited for graduate students to start with focused research. In the presentation Edgar showed three aspects that are… Read More
Together with sipgate and ISMK Stralsund, Gabriel Gegenhuber, researcher at SBA Research and University of Vienna, and Michael Pucher, researcher at SBA research, discovered and investigated a vulnerability in the Voice of LTE (VoLTE) stack that is broadly used within MediaTek-based smartphones. ∞
In the Mediatek modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. ∞