SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies.
Security Rockstars 2016 is the European sequel to the Austrian start-up competition Start Secure 2015. The competition’s goal is to find and support innovative ideas and solutions in the area of Information Security. Submission deadline for proposals is 15 July 2016. Apply now here: http://www.securityrockstars.com/ The final pitch takes place in… Read More
We are proud to announce that the ITEA2-action DIAMONDS where SBA Research participated through the MobseTip project received the prestigious EUREKA-award. For more information on relevant project aspects please contact Dimitris Simos.
Tomek defended his PhD thesis “Verification and Validation of Scientific Workflow Re-executions” successfully and graduated with distinction. Congratulations!… Read More
We will participate in the events of CPS Week 2016 (Vienna, Austria, April 11-14, 2016). On Monday (April 11), Johanna Ullrich presents our work on “The Quest for Privacy in the Consumer Internet of Things” at the International Workshop on Consumers and the Internet of Things (ConsIoT 2016). A… Read More
Katharina Krombholz has been interviewed about talent promotion for an APA Science Dossier with the title “Ein Praktikum als Türöffner in die Forschung”. The complete article can be found here.
The paper “’Weight Distribution of the Syndrome of Linear Codes and Connections to Combinatorial Designs” by Christoph Pacher (AIT), Philipp Grabenweger (AIT) and Dimitris Simos (SBA Research) has been accepted for publication in the 2016 IEEE International Symposium on Information Theory (ISIT) which takes place from July, 10th-15th, 2016 in… Read More
Dimitris Simos is invited to Johannes Kepler University (JKU) Linz on 4 April 2016 to give a colloquium talk at the Research Institute for Symbolic Computation (RISC) in Hagenberg. Colloquium announcement see here. Title: Information Security through Combinatorial Designs and Symbolic Computation: Recent Results and Challenges Ahead Abstract: In last 50 years,… Read More
Sebastian Schrittwieser, Stefan Katzenbeisser, Johannes Kinder, Georg Merzdovnik and Edgar Weippl. Protecting software through obfuscation: Can it keep pace with progress in code analysis? ACM Computing Surveys (CSUR), accepted for publication, 2016.
Our Tutorial ‘Cryptographic Currencies Crash Course‘ (Aljosha Judmayer, Edgar Weippl) has been accepted at WWW2016. We also have a workshop on empirical research methods at the conference.
Yet another paper was accepted at the International Conference of Financial Cryptography and Data Security (FC’16): “CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes” by Patrick Carter, Collin Mulliner, Martina Lindorfer, William Robertson, and Engin Kirda. CuriousDroid was developed in collaboration with Northeastern University in Boston and provides… Read More
Together with sipgate and ISMK Stralsund, Gabriel Gegenhuber, researcher at SBA Research and University of Vienna, and Michael Pucher, researcher at SBA research, discovered and investigated a vulnerability in the Voice of LTE (VoLTE) stack that is broadly used within MediaTek-based smartphones. ∞
In the Mediatek modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. ∞