Bachelor | Master | PhD – Thesis Supervision

Education is a core activity of SBA Research, and complements and supports our core, research-intensive activities. We aim at providing high-quality of education in postgraduate and undergraduate studies as well as secondary education, continuing education and in trainings. SBA Research draws from the vast experience, knowledge, and expertise of our staff, the latest research developments in the broader field of cyber-security, and our highly-specialized research infrastructures.

SBA Research is strongly affiliated with the Institute of Software Technology and Interactive Systems of TU Wien. In collaboration with the Faculty of Informatics, SBA Research offers the following courses:

  • Internet Security (jointly with the Secure Systems Lab)
  • Advanced Internet Security (jointly with the Secure Systems Lab)
  • Software Security
  • Organizational Aspects of Security
  • Digital Forensics
  • Privacy Enhancing Technologies
  • Security Seminar

Jointly with Prof. Steinhardt we offer the course Wissenschaftliches Arbeiten / Scientific Work (180.765). If you are interested and provided that you have completed the first part of the course positively, please join our  preliminary meeting on March, 29th 2019 at 10am at SBA Research (Favoritenstraße 16, 1st floor Schulungsraum).

Furthermore, SBA Research provides internships and part-time employment (4 to 10 hours per week) for undergraduate students.

SBA Research affiliates often teach advanced cybersecurity topics in higher education institutes like FH St. Pölten, FH Campus Wien, FH Oberösterreich, FH Technikum Wien, and Danube University Krems. Also, SBA Research contributes every year to the Intensive Programme on Information and Communication Security (IPICS academic summer school).

STUDENTS INTERESTED to do an INTERNSHIP or pursue a THESIS (B.Sc., DI, M.Sc., or Ph.D.) are advised to directly CONTACT OUR RESEARCHERS as listed below.

Machine Learning and Security

Digital Sustainability and Resilience

  • Demonstrate a complex yet resilient component based infrastructure by implementing a (Netflix) Chaos Monkey demonstration setup with Docker/Kubernetes  components. Edgar Weippl
  • Runtime analysis of selected open source system(s): use debug interface of (Java) virtual machine to analyse runtime behaviour, draw a “code-landscape” and identify processes. Edgar Weippl
  • Analyse the complexity of selected Open Source projects following established complexity- and entropy-indicators. This might include static code analysis and analysis of code changes (source code repository). Edgar Weippl
  • Implement a dynamic simulation of an organisation and deduce efficiency “bottle-necks” using queuing theory. Edgar Weippl

Security for Cyber Physical Production Systems

  • Network Security in CPPS. Which tools (like metasploit) are readily available for pentesting CPPS (instead of business systems)? Edgar Weippl
  • Forensics Analysis in CPPS. Which tools exist that can be used to analyse CPPS? Are there guidelines on how to proceed? Edgar Weippl
  • Secure Software Engineering Processes in CPPS. Edgar Weippl

Combinatorial Testing for Information Security



Fileformat Security

Internet of Things (IoT) Security and Privacy

  • Update mechanisms for constrained IoT systems
  • Secure embedded operating systems for IoT applications: Georg Merzdovnik
  • IoT network protocol security analysis
  • Privacy leaks and protections for IoT devices and protocols
  • Lightweight intrusion detection for IoT systems: Georg Merzdovnik
  • Efficient implementation of security and cryptography for IoT
  • Moving-target defenses in IoT environments
  • Resilient communication protocols for IoT

Cyber-Physical System Security

Mobile Security and Privacy

Network Security

Privacy Enhancing Technologies

Cloud Security

Research in Information Security

  • Comparing military research and academic research – analysis of de-classified content: Edgar Weippl
  • Analysis of security in standardization processes: Johanna Ullrich

Software Security

System Security

Usable Security

  • Usable Security. Developing a guideline of how to do research correctly: Edgar Weippl


By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.