SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies.
Last Saturday, We_0wn_Y0u hosted students from the course “Attacks and Defenses in Computer Security”, which we hold jointly with the Security and Privacy research group at TU Wien at SBA Research to participate in the Bambi CTF, where… Read More
Luiza Corpaci, representing SBA’s CORE and CALGO, joined the 36th International Conference on Testing Software and Systems (ICTSS), held from October 30 to November 1 in London, UK. In the very first session of… Read More
Professor Violet Syrotiuk from Arizona State University visited the MATRIS Research Group for two days of intensive research discussions and exchange from October 24-25, 2024. Prof. Syrotiuk is a distinguished researcher in mathematical system dynamics modeling, wireless networks, and algorithm development. ... Read More
On October 23, the Diversity Think Tank team hosted the re:think diversity congress at the Vienna Chamber of Commerce. Jeanine Lefèvre, project lead of Fem4CyberSec and research coordinator, and Gregor Roschitz, Human Resources, were there for SBA Research. ... Read More
Alexander Schatten, senior researcher at SBA Research, got interviewed by journalist Daphne Hruby for the podcast episode "Science under stress: When science is under time pressure", in October. ... Read More
Our hiking days have become a cherished tradition at SBA Research, bringing us all together to explore exciting trails. Every few months, we pick a different hiking path and warmly invite all team members to join in. This time, we took on the scenic Kieneck hiking area, a route known… Read More
Together with sipgate and ISMK Stralsund, Gabriel Gegenhuber, researcher at SBA Research and University of Vienna, and Michael Pucher, researcher at SBA research, discovered and investigated a vulnerability in the Voice of LTE (VoLTE) stack that is broadly used within MediaTek-based smartphones. ∞
In the Mediatek modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. ∞