Floragasse 7 – 5th floor, 1040 Vienna

SBA Research is a research center for Information Security
funded partly by the national initiative for COMET Competence Centers for Excellent Technologies.

Recent News:

Research Talk: Designing Truthful Mechanisms

May 10, 2011, 10am @ SBA: Designing Truthful Mechanisms Angelina Vidali In this talk I will present my work on many different aspects of one of the most fundamental problems in algorithmic game theory (and more specifically algorithmic mechanism design), the problem of scheduling unrelated machines to… Read More

Talk by Daniel S Yeung on “Sensitivity Based Generalization Error for Single and Multiple Classifier Systems with Applications”

Sensitivity Based Generalization Error for Single and Multiple Classifier Systems with Applications Abstract Generalization error model provides a theoretical support for a classifier’s performance in terms of prediction accuracy. However, existing models give very loose error bounds. This explains why classification systems generally rely on experimental validation for their claims… Read More

USENIX Security ’11: Paper accepted

Our paper Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space was accepted. Unfortunately we cannot provide a preprint because the affected vendor(s) still need the time to fix some things…… Read More

Gilbert Wondracek joined SBA research as senior researcher

We are happy to have Gilbert Wondracek as a senior researcher on our team. His last two IEEE S&P papers: Gilbert Wondracek, Thorsten Holz, Engin Kirda, and Christopher Kruegel. 2010. A Practical Attack to De-anonymize Social Network Users. In Proceedings of the 2010 IEEE Symposium on Security and Privacy… Read More

INMOTOS website online

Interdependencies among Critical Infrastructures, both inside the ICT domain and between ICT and other sectors (e.g. Oil&Gas and Transport), are complex to be understood. Critical Infrastructures risks always change due to new threats, interdependencies and possible scenarios. Read More

Gilbert Wondracek in the Economist

“Gilbert Wondracek at the Vienna University of Technology in Austria and his colleagues built a history-stealing website aimed at groups on Xing, a business-orientated social network. Mr Wondracek’s analysis of over 6,500 Xing groups, containing a total of more than 1.8m users, suggested that his rogue site would be able… Read More

Invited Talk at NII

Edgar Weippl gives an invited talk at NII. Whenever data is being processed, there are many places where parts of the data are temporarily stored; thus forensic analysis can reveal past activities, create a (partial) timeline and restore deleted data. While this fact is well known for computer forensic and… Read More

IPhone privacy

Our partners at ISecLab have a nice paper on privacy and IPhones (German heise Article)… Read More

Guest talk / Seminar: John Tait

Guest talk: John Tait The term Semantic Search is becoming fashionable, but there are a number of problems with the term. 1) There are at least two forms of semantic search. One is based more-or-less hand programmed knowledge sources, like domain ontologies or thesauri. The other is based on emergent… Read More

This Website uses Cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close