SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies. Within a network of more than 70 companies, 15 Austrian and international universities and research institutions, and many additional international research partners we jointly work on research challenges ranging from organizational to technical security to strengthen Europe’s Cybersecurity capabilities.
ISIS @ TU Wien IAIK @ TU Graz DKE @ Uni Wien NM @ WU Wien FH St. Pölten AIT


Access Control for Mobile Agents Baggage

Bo Sun, a master’s student from KTH Stockholm, presents her master thesis on Access Control for Mobile Agents Baggage

Bridge Grant accepted: MOdel-Based SEcurity Testing In Practice (MoBSeTIP)

Das Projekt “Modellbasiertes Testen der Systemsicherheit in der Praxis (MoBSeTIP)” beschäftigt sich mit der Anwendung des modellbasierten Testens (MBT) auf den Bereich des Testens der Informationssicherheit (Security Testing). Im Speziell geht es darum Testfälle, die Sicherheitsaspekte von Systemen abdecken, automatisiert zu generieren und auszuführen. Problemstellungen dabei sind das Finden einer geeigneten Modellierungssprache für Bedingungen der Informationssicherheit und die praktische Umsetzung der automatisierten Testfallgenerierung. Wenn man betrachtet das es derzeit aufgrund der steigenden Vernetzung und Komplexität von Systemen zu vermehrten Sicherheitsproblemen kommt, ist die zur Verfügungstellung von Werkzeugen für die Test solcher Systeme wichtig und von steigender Bedeutung für die Gesellschaft und die Wirtschaft.

Schwerpunkte im Rahmen von MoBSeTIP sind: (1) die Bereitstellung einer Modellierungssprache für Systemsicherheit, die gewünschten Eigenschaften und mögliche Angriffe abbilden lässt, (2) die Implementierung eines Werkzeugs zur Testfallgenierung ausgehend von den verfügbaren Modellen, (3) die Anwendung und Evaluierung der Werkzeuge auf ein konkretes Projekt der Firmenpartner, und (4) die Zusammenarbeit auf europäischer Ebene im Rahmen des ITEA 2 Projekts DIAMONDS ( Hier sollen sowohl die Testfallgenerierungswerkzeuge und zugrundeliegenden Methoden eingebracht werden. Die Erkenntnisse und Evaluierungsresultate für weitere Anwendungen und Fallstudien der europäischen Partnerfirmen fließen in MoBSeTIP ein.

Invited talk: A framework to support alignment of secure software engineering with legal regulations

Author: Dr. Shareeful Islam, Dr. Haralambos Mouratidis and Prof. Dr. Jan Jürjens

Regulation compliance is getting more and more important for software systems that process and manage sensitive information. Therefore, identifying and analysing relevant legal regulations and aligning them with security requirements become necessary for the effective development of secure software systems. Nevertheless, Secure Software Engineering Modelling Languages (SSEML) use different concepts and terminology from those used in the legal domain for the description of legal regulations. This situation, together with the lack of appropriate background and knowledge of laws and regulations, introduces a challenge for software developers to elicit security requirements from the relevant laws and regulations and to trace the elicited requirements throughout the development stages. Our work contributes to develop a framework that supports the consideration of laws and regulations during the development of secure software systems. The proposed framework enables software developers (i) to correctly elicit security requirements from the appropriate laws and regulations; and (ii) to trace these requirements throughout the development stages in order to ensure that the design indeed supports the required laws and regulations. Our framework is based on existing work from the area of secure software engineering, and it complements this work with a novel and structured process and a well-defined method.

Short Bio
Dr. Shareeful Islam was awarded his PhD in Software Risk Management Model using goal-driven approach from chair of Software & Systems Engineering (I4), Technische Universität München, Germany. He has received M.Sc. degree in Information Communication System Security(ICSS) from the Royal Institute of Technology, Sweden. He also received M.Sc. degree in Computer Science (CS)and B. Sc. (Hon’s) in applied physics and electronics (APE) from the University of Dhaka, Bangladesh. He completed the ISO 9001:2001 lead auditor certification and is a certified quality management system auditor. He has more than 10 publication in well recognized journals. His main research interests are in the field of software risk management, software security and privacy. Special interests are risk management model, security and privacy, requirements engineering and modelling.

USENIX Security ’11: Dark Clouds on the Horizon

In August we will present our work on cloud storage security at the 20th USENIX Security Symposium in San Francisco. The paper, in essence, outlines new attacks on cloud storage services that use server-side data deduplication.

It includes a security analysis of Dropbox, a popular cloud storage service. By manipulating the client software unauthorized data access becomes possible, if the hash values of the files are known to an attacker. This attack is completely undetectable to the victim, and novel compared to recent attacks discussed in the media. Data possession proofs which have been used so far in the context of assessing whether a cloud storage operator is still in possession of a file are the only countermeasure.

We further define online slack space as a method to hide data in the cloud to thwart forensic investigations. Compared to regular file slack all files are stored in the cloud without leaving any evidence on local persistent storage.

You can find the paper here: Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space. We have contacted Dropbox and they implemented countermeasures for our attacks while investigating the use of data possession proofs on the client side.

Jan Svab: FPGA-based Computer Vision Embedded Module

The presentation firstly covers the basics properties of image local feature extraction algorithms. Then a little bit closer description of algorithm selected for the implementation – SURF – and the platform – FPGA. Then it contains a summary of reasons why a new completely custom solution has been developed. The main concepts of the developed hardware, FPGA and software design are described next. The presentation is concluded with the module key parameters summary and a short video (1 min) showing the actual image interest point detector results. June 22, 13:30.

Stefan Katzenbeisser on ZDF (German TV)

Stefan Katzenbeisser talks about privacy and mobile security (starting at 14:43)

John Tait: Patent Search- a Challenging Problem!

1030 am: Guest talk by John Tait

Patent Search – a Challenging Problem!

To be valid a patent has to show that it it describes a novel and useful idea. The test of novelty is that at the date of filing there does not exist in the public domain (in another patent, or the academic literature, or elsewhere, for example in the news media) an earlier description of the invention. This earlier, invalidating, description might well be presented in another language or using quite different technical terms from the way the idea is expressed in the patent in question. Thus patent search is a very challenging information retrieval problem.

Patent Search is also economically important. It is difficult to estimate the total value of the patents in the world economy, but it certainly runs into many billions of euros, and many thousands of people around the world are employed in the patent ecosystem: in Patent Offices; patent attorneys; translators; software and data suppliers; and elsewhere.

The talk will overview the field of patent search, relate it to developments in semantic search, and in particular review some of the recent work reported in our new book “Current Challenges in atent Information Retrieval”.

Security in Social Media – Talks at BildungOnline

Managing director Markus Klemen gave two talks at the BildungOnline conference in Hall in Tirol focusing on Security in Social Media. The Austrian Computer Society (OCG) organized the talk. The target audience were teachers, students and parents.

Ivona Brandic, Energy Efficient Clouds

Ivona Brandic, Energy Efficient Clouds
May 31, 10am SBA

Cloud computing is a promising technology for the realization of large, scalable, and on-demand provisioned computing infrastructures. Currently, many enterprises are adopting this technology to achieve high performance and scalability for their applications while maintaining low cost. Service provisioning in the Cloud is based on a set of predefined non-functional properties specified and negotiated by means of Service Level Agreements (SLAs). Cloud workloads are dynamic and change constantly. Thus, in order to reduce steady human interactions, self-manageable Cloud techniques are required to comply with the agreed customers’ SLAs. In this talk we discuss flexible and reliable management of SLAs, which is of paramount importance for both Cloud providers and consumers. On the one hand, the prevention of SLA violations avoids penalties that are costly to providers. On the other hand, based on flexible and timely reactions to possible SLA violation threats, user interaction with the system can be minimized enabling Cloud computing to take roots as a flexible and reliable form of on-demand computing. Furthermore, a trade-off has to be found between proactive actions that prevent SLA violations and those that reduce energy consumption, i.e., increase energy efficiency.


Im Rahmen von IMPACT 2011 fanden vier interessante Vorträge statt.

Prof. Dr. Stefan Katzenbeisser – TU Darmstadt – Privacy by Design – Technischer Datenschutz für hochsensible Daten
Prof. Davide Balzarotti, Ph.D. – EURECOM Sophia Antipolis – G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries
Prof. Dr. Günther Pernul – Universität Regensburg – On the Maturity of RBAC – A Survey and Classification of the Research Area
Günther Wiesauer – CEO Underground_8, Linz – Sicherheitsarchitektur für moderne Firewallsysteme


By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.