SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies.
Today, Matthias Eckhart speaks about “Towards Security-Aware Virtual Environments for Digital Twins” at the “4th ACM Workshop on Cyber-Physical System Security”, taking place at the Songdo Central Park Hotel in Incheon, South Korea. Read More
Our paper “Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids” by Johanna Ullrich, Nicholas Stifter, Aljosha Judmayer, Adrian Dabrowski and Edgar Weippl has been accepted at the International Symposium on Research in Attacks, Intrusions and Defenses (RAID). Our work investigates whether cryptocurrencies are a threat for reliable power grid operation… Read More
Computers & Security welcomes submissions to the special issue on Security and Privacy in Smart Cyber-physical Systems. Important Dates: Submission deadline: 30 November 2018 Authors’ notification: 31 January 2019 Revisions due: 30 April 2019 Final decision: 30 June 2019 Camera ready version due: 30 September 2019 Tentative publication… Read More
Our book Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms (Aljosha Judmayer, Nicholas Stifter, Katharina Krombholz, Edgar Weippl) has been translated into Korean. Read More
Edgar Weippl offers three talks with ACM’s Distinguished Speaker program. Blockchains & Distributed Ledger Technology Secure Development Lifecycle of Production Environments Improvement of Security of Information Processing in the Industrial Production System Lifecycle… Read More
Thomas Konrad held a workshop on “real security starts where frameworks end” at the WeAreDevelopers World Congress 2018 in Vienna. Presentation slides can be found here
Power plants and many other industrial plants are an integral part of a country’s critical infrastructure. As systems become more automated and networked and complicated software systems control entire systems, IT security is playing an increasingly important role. Previous attacks have mostly exploited existing vulnerabilities, future attackers will strive to… Read More
Philipp Reisinger talks about “Cyber Security Trends 2018, Security Highlights 2017 and future threat scenarios” at tomorrow´s SecuritySummit. More information
Thomas Konrad talks about the “Life of a Pentester” at the world congress taking place from 16-18 May. He will additionally conduct a workshop on “Real Security Starts where Frameworks End”. Details and Registration
Together with sipgate and ISMK Stralsund, Gabriel Gegenhuber, researcher at SBA Research and University of Vienna, and Michael Pucher, researcher at SBA research, discovered and investigated a vulnerability in the Voice of LTE (VoLTE) stack that is broadly used within MediaTek-based smartphones. ∞
In the Mediatek modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. ∞