SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies. Within a network of more than 70 companies, 15 Austrian and international universities and research institutions, and many additional international research partners we jointly work on research challenges ranging from organizational to technical security to strengthen Europe’s Cybersecurity capabilities.
ISIS @ TU Wien IAIK @ TU Graz DKE @ Uni Wien NM @ WU Wien FH St. Pölten AIT

SBA Research moved to a new location!

Our new address: Floragasse 7, 1040 Vienna, Austria Effective since: June 25, 2019 More at:


May 6, 2010: Impact 2010

Our annual event for partners, researchers and everyone who is interested in the research of our center (more…)

Best Paper Award: Context Oriented Analysis of Web 2.0 Social Network Contents

ACIIDS 2010: Context Oriented Analysis of Web 2.0 Social Network Contents (Amin Anjomshoaa, Vo Sao Khue, AMin Tjoa, Edgar Weippl, Michael Hollauf)

ADV Forum IT-Management: Statistische Sicherheitsanalyse von SecLookOn

April 13, 2010 Passwort war gestern – SecLookOn ist heute! Statistische Sicherheitsanalyse von SecLookOn

Forensic Workshop: Memory analysis with Andreas Schuster

Andreas Schuster will present a special forensics workshop ragarding memory analysis. The workshop will take place on the 22/23 of april, 2010 and will focus on:

  • Intel x86 hardware platform
  • Random Access Memory (RAM)
  • Techniques of adressing
  • Forensic backup of the RAM, methods and tools
  • Windows memory management
  • Objects of the system kernel
  • Applied techniques for analysis
  • Use of the Microsoft debugger and the volatility framework
  • Excercises on memory dumps

The course will be held in German.

ADV Seminar: 20. April 2010 SaaS (ASP) – „EDV aus der Steckdose“

ADV Seminar 8. April 2010 Virtualisierung: Storage und Applications

Guest Talk Prof. Müller: Does the Current Security Research only Solve Known Problems?

Guest Talk Prof. Müller: Does the Current Security Research only Solve Known Problems?

So far, security meant access control. Statistics show that this paradigm becomes less sufficient, therefore applications of cloud computing and service orientation are at risk. One wants not only to have access, but also the assurance that agreements will be fulfilled at any time. This so-called „usage control“ is understood as the known reliability complemented with security and the accuracy of the services. Vulnerabilities allow via an inevitable interference the deriving of information, made possible only through unreliable information flows. The lecture presents the current starting and security situation based on statistics about security breaches. Especially due to the shortcomings of the security research vulnerabilities have occurred which today can be summarized under the term “compliance” and are very difficult to combat. This involves security problems in processes. Therefore, the DFG (German Research Foundation) has established a priority program entitled “Reliably Secure Systems” for which the lecturer is also responsible. The point is to expand the security question beyond access control by incorporating reliability. The practical and technical challenges are in the focus of this presentation.

ACM SAC 2010

Today, Stefan Fenz presents the paper “Ontology-based Generation of IT-Security Metrics” at the 25th ACM Symposium on Applied Computing.

Security Ontology online

Click here to browse and edit the security ontology online.

ADV zu Gast bei SBA Research zum Thema “Cloud & Virtualization Security”

Mar 2, 2010 @SBA:

17:30 – 17:50, SBA: “Cloud-Tools” und Auswirkungen auf Sicherheitsanforderungen
17:50 – 18:25, SBA-Partner Security Research: Sicherheit und Virtualisierung
18:25 – 19:00, SBA-Partner factline: Bedeutung der Verlässlichkeit und Sicherheit für Zusammenarbeit über Web-Plattformen

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.