SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies. Within a network of more than 70 companies, 15 Austrian and international universities and research institutions, and many additional international research partners we jointly work on research challenges ranging from organizational to technical security to strengthen Europe’s Cybersecurity capabilities.
ISIS @ TU Wien IAIK @ TU Graz DKE @ Uni Wien NM @ WU Wien FH St. Pölten AIT

SBA Research moved to a new location!

Our new address: Floragasse 7, 1040 Vienna, Austria Effective since: June 25, 2019 More at: www.sba-research.org/relocation

News

STRAW – Security Technology Active Watch

In October 2008, Edgar Weippl joined the STRAW project as an external expert.

STRAW stands for ‘Security Technology Active Watch‘. STRAW is a support action under the Security Research theme that aims at providing a European Service of Technology Watch on Security Technologies.

The consortium:

  • Atos Origin SAE
  • AeroSpace and Defence Industries Association
  • Thales Services S.AS € Stiftelsen SINTEF
  • Fraunhofer FHG
  • Instituto Nacional de Técnica Aeroespacia
  • Elsag Datamat S.p.A
  • Asociación de Empresas de Electrónica, Tecnologías de la Información y Telecomunicaciones de España (AETIC)
  • Fondazione Rosselli
  • European Organisation for Security (EOS)

Scope:
The concept of STRAW is to bring together the defence and security research industry by a neutral coordination to ensure the awareness of underpinning technologies that make possible the implementation of civil security applica tions.

The target of STRAW is to stimulate the cooperation of providers and users f or civil security applications.

SBA@Impulse08

8.10.08: At the “Impulse08” events of the Austrian Computer Society (OCG) in Vienna, Graz and Salzburg, GM Markus Klemen talks about the challenges to IT-Security due to company employees.

SBA@Bundesamt für Landesverteidigung

01./02.10.08: General Manager Markus Klemen presents new developments in the area of data theft at two events for executives, which were organized by the Abwehramt, the defense intelligence unit of the Austrian Ministry of Defense.

SBA@Medienmesse 08

At the Vienna media exhibition (http://www.medienmesse.at/) Edgar Weippl presents current projects of the research centre in cooperation with ZIT (Zentrum für Innovation und Technologie – Center for Innovation and Technology: http://www.zit.co.at/).

Computer Forensics work on securing and analyzing digital data in order to reconstruct cancelled information, track changes or manipulations and to prove chronological coherences. Every use of digital data leaves traces that are difficult to erase, which endangers the confidentiality of information or renders falsified information identifiable.

Academic Community Launch 2008

SBA supports microsoft’s student partners organizing this years academic community launch.
This event aims at informing students about the newest technologies regarding .NET.

anuga.jpg

SBA @ Die Zeit

General Manager of SBA Markus Klemen about secure ways to browse the internet.
Download »

SBA @ Economy

econoomy_28_sba_2.jpgGeneral Manager of SBA Markus Klemen provides details about the current situation of computer security and the OCG Securitycertificate. Download »

PIPE @ Economy

Dr. Thomas Mück, stvtr. Generaldirektor der Sozialversicherungsanstalt der gewerblichen Wirtschaft, im Interview über ELGA (elektronische Gesundheitsakte) und Dr. Edgar Weippl, wissenschaftlicher Leiter von SBA, über die neu entwickelte Pseudonymisierungsarchitektur PIPE: zum Artikel »

Prof. Lopez-Muñoz – PhD seminar – Malaga

dsc04027_thumb.jpgdsc04025_thumb.jpgThe joint PhD seminar of Prof. Lopez-Muñoz’ research Lab and Secure Business Austria was a great success. A new research cooperation in the area of “Security for Critical Information Infrastructure” and in improvements in malware detections may follow.

Online-Trojaner

Christopher Krügel said that Trojans used by law enforcement need to be installed on the specific computer of the suspect. It is therefore necessary to rely on vulnerabilities of the system which may be difficult to find…

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close