SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies.
At BSidesVienna 2012, Manuel Leithner gave a talk on public transport titled “Hackers on a train – Toying with transportation”, detailing equipment and possible flaws in the on-board network infrastructure and ticketing system of WESTbahn.
The key researcher Stefan Katzenbeisser gave a talk at 28C3 (derStandard.at, heise.de, futurezone.at, diePresse.com, reuters.com, telegraph.co.uk, bbc.co.uk)
Our researchers plan future research in cooperation with NII: Dr. N. Sonehara, Information and Society Research Director at NII and Project Reader at ROIS/TRIC. Dr. Y. Ichifuji, ROIS/TRIC Dr. I. Echizen, Associate Professor at NII. Dr. S. Wohlgemuth, Associate Professor at NII and ROIS/TRIC … Read More
Starting at 3pm Dr. N. Sonehara, “Data-centric Socio-Informatics Supporting Public Policy Decision Making, NII and ROIS/TRIC. Dr. Y. Ichifuji, “Web Data Driven Information Circulation and Its application of Resilience Evaluation”, ROIS/TRIC Dr. I. Echizen, “Multimedia Location Privacy Control Mechanism”, NII Dr. S. Wohlgemuth, “Resilient Social System Design… Read More
The team of the Technical University of Vienna “We_0wn_Y0u” could achieve victory at the iCTF 2011 under the direction of Adrian Dabrowski. In a very exciting, nine-hour competition against 85 international competing teams, also Martin Mulazzani, Peter Frühwirt and Manuel Leithner… Read More
“We have subjected the cloud solution from A1 to an architecture analysis and can confirm that the data in the A1 Austria Cloud are stored only on servers that are operated in Austria,” confirms Markus Klemen, CEO of Secure Business Austria Research. (mehr…)
A Bird’s-Eye View of Optimal Codes and Symmetric Cryptography from Combinatorial Designs Dimitris E. Simos, Department of Mathematics, National Technical University of Athens, Abstract: In the past few decades, combinatorial design theory has grown to encompass a wider variety of investigations, many… Read More
Clemens Kolbitsch recently finished his PhD supervised by Engin Kirda and Chris Kruegel. Tomorrow, he will present his paper “The Power of Procrastination: Detection and Mitigation of Execution-Stalling Malicious Code” at CCS 2011. Clemens will shortly join our partner company TLLOD.
We are going to present our social snapshot forensic tool at the Annual Computer Security Applications Conference (ACSAC) 2011. Abstract: Recently, academia and law enforcement alike have shown a strong demand for data that is collected from online social networks. In this work, we present a novel method for… Read More
Together with sipgate and ISMK Stralsund, Gabriel Gegenhuber, researcher at SBA Research and University of Vienna, and Michael Pucher, researcher at SBA research, discovered and investigated a vulnerability in the Voice of LTE (VoLTE) stack that is broadly used within MediaTek-based smartphones. ∞
In the Mediatek modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. ∞