🔍 Exploring Global Solutions:The PH-US-UNCTAD Harnessing STI for DRR Workshop convened in Manila, Philippines from February 29 to March 1, 2024. With delegates from 44 UNCSTD member states, Dr. Dimitris Simos,... Read More
We would like to invite you to Reinhard Kugler‘s talk on “Will it crash? Kubernetes and Containers in your Car” at the Security Forum 2024. Speaker Reinhard Kugler is Applied Research Consultant at SBA Research. His focus relies on security testing of IT… Read More
Gabriel Gegenhuber’s new paper “Why E.T. Can’t Phone Home: A Global View on IP-based Geoblocking at VoWiFi” was recently accepted to the MobiSys conference happening in Tokyo in June 2024. The paper exposes existing blocking practices within worldwide mobile network operators that prevent customers from using Wi-Fi calling during roaming. Read More
As part of our ongoing research and consulting efforts, we frequently discover vulnerabilities in third-party products. Committed to enhancing the security of the digital ecosystem, we publish detailed security advisories according our vulnerability disclosure policy. You can find the full security advisories with complete details in our… Read More
Tomasz Miksa, senior researcher at SBA Research, gave an interesting talk on “Turning Machine-actionable DMPs into FAIR Digital Objects” at the International FAIR Digital Objects Implementation Summit in Berlin. Transition to FDOs requires significant changes in the design of existing tools and… Read More
ReOxide is an initiative for improving the Rust decompilation support in current software engineering frameworks. The main goal of the project is the extension of the Ghidra decompiler, integrating Rust specific decompilation steps and improving extensibility for languages beyond Rust. Abstract Modern compiled languages such as Rust and Go are… Read More
ARMify aims to become a plugin for the open-source reverse engineering tool Ghidra, with its primary goal being to assist security analysts in analyzing ARM Cortex-M bare-metal firmware. This is achieved through automatic microcontroller model identification and annotation of memory-mapped peripherals. It helps analysts to understand how the firmware interacts… Read More
Have you always wanted to solve security challenges or take part in a CTF? Then take the first step and come along to our “Let’s Hack Together”! We will solve and discuss selected challenges together (or in small groups). There will also be tips and tricks on how best to… Read More