SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies.
Today is the first day of the TRUST 2013 Conference, which is hosted by the Imperial College London and supported by SBA Research. The TRUST 2013 Conference takes place from 17-19 June 2013 in London, UK. Website
In the general meeting on 7 May 2013, Markus Klemen, CEO of SBA Research, was elected Vice President (Institutional Members) of the Austrian Computer Society. Furthermore, Prof. Stefanie Rinderle-Ma and KommR Hans-Jürgen Pollirer were elected resp. confirmed as Vice Presidents. More information about the Austrian Computer Society can be found… Read More
SBA Research was instrumental in the founding of the (ISC)² Austrian Chapter which will be used as an exchange and networking platform for Austrian IT security experts. (press release) (website (ISC)2 Austria Chapter) The foundation of the (ISC)2 Austria Chapters in the media:… Read More
The Team “We_0wn_Y0u”, consisting of members of iseclab and SBA Research, has won the second place in the iCTF which took place last Friday (see scoreboard). “Critial infrastructure” was the theme, and the scenario was completely different to previous years. In total, nine services had to be attacked and defended… Read More
In an advertisement of bmvit and FFG in the newspaper “Heute” Katharina’s internship is listed as a successful example for the promotion of women. Subsequent to the internship her employment continued on a permanent basis and she began working on her dissertation. Within the cooperation with the NII Katharina is… Read More
Sebastian Schrittwieser presented a talk on ethics in computer security research at the Chaos Communication Congress (29c3) in Hamburg. You can watch the recording on Youtube. Read More
Together with sipgate and ISMK Stralsund, Gabriel Gegenhuber, researcher at SBA Research and University of Vienna, and Michael Pucher, researcher at SBA research, discovered and investigated a vulnerability in the Voice of LTE (VoLTE) stack that is broadly used within MediaTek-based smartphones. ∞
In the Mediatek modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. ∞