SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies.
Artemios G. Voyiatzis is representing SBA Research at the Special Interest Group (SIG) meetings on Digital Forensics (DF) and Teaching/Learning (TL) of the EU-funded project “Strengthening European Network Centres of Excellence in Cybercrime” (SENTER). The meetings take place on June 26-27, 2017 in Esslingen, Germany.
Our book on blockchains has just been published: Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms. Aljosha Judmayer, Nicholas Stifter, Katharina Krombholz, and Edgar Weippl… Read More
Adrian Dabrowski is today at the ETSI in Sophia Antipolis, presenting at the ETSI 5G Security workshop, part of the Security Week at ETSI. You can find the Agenda here.
Today, Martin Schmiedecker presents at the Linz Cyber Security Conference 2017 on “Online Anonymity beyond Tor”. The slides can be found here. You can find the full schedule here. Read More
Artemios G. Voyiatzis is visiting Cranfield University in the UK. He is hosted by the TES Centre. During his stay, Artemios gives a talk about “Engineering Lifetime Information Security” at the 5th Through-life Engineering Services Summer School (June 5-9, 2017). A short tour to Bletchley Park… Read More
Today, Vinzenz Heußler (University of Vienna) and Peter Kieseberg (SBA Research) give a talk on “Privacy by Design Data Exchange between CSIRTs” at the Annual Privacy Forum in Vienna.
Together with sipgate and ISMK Stralsund, Gabriel Gegenhuber, researcher at SBA Research and University of Vienna, and Michael Pucher, researcher at SBA research, discovered and investigated a vulnerability in the Voice of LTE (VoLTE) stack that is broadly used within MediaTek-based smartphones. ∞
In the Mediatek modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. ∞