SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies.
Vulnerability Overview In the modem, the client can be forced into accepting a less secure key exchange algorithm during the VoWiFi IKE handshake due to a missing downgrade check on the proposed Diffie-Hellman (DH) group. This could lead to remote information disclosure with no additional execution privileges needed. User interaction… Read More
Vulnerability Overview ZTE ZXUN-ePDG product, which serves as the network node of the VoWiFi system, under by default configuration, uses a set of non-unique cryptographic keys during establishing a secure connection (IKE) with the mobile devices connecting over the internet. If the set of keys are leaked or cracked, the… Read More
We are thrilled to announce the successful conclusion of IEEE Euro S&P 2024, held in the city of Vienna! This year’s conference brought together more than 300 leading experts, researchers, and practitioners from 32 countries in the field of cybersecurity, offering an unparalleled platform for knowledge exchange and collaboration. Read More
We would like to thank all participants, sponsors, and speakers for their active participation and exchange at this year's sec4dev Dialogues! Under the motto "Security for Software Developers" there were six exciting talks on: Read More
We are proud to announce that SBA Research will once again be funded as one of six COMET Centers by the Austrian Research Promotion Agency (FFG), starting in 2025. This marks the third funding period since its establishment as a K-Ind (industrial competence center)… Read More
Philipp Frenzel, Gabriel Gegenhuber, Florian Holzbauer, Markus Maier and Jakob Rosenblattl – all researchers from the ERIS research group – attended this year`s TMA PhD School and Conference in Dresden. Read More
On June 14, 2024, Matthias Eckhart attended the DCNA Young Scientists Networking Event and pitched his research on “Security-by-Design for Industrial Control Systems (ICSs).” The event was organized by the Disaster Competence Network Austria (DCNA) and hosted by the… Read More
Alexander Schatten, senior researcher at SBA Research and Marco Reiser published an interesting article on "What programming at prompt level leads to". Where can AI systems really help programmers and is the approach taken here really new? This article takes a look at their role. ... Read More
The Paradox IP150 Internet Module in version 1.40.00 is vulnerable to Cross-Site Request Forgery (CSRF) attacks due to a lack of countermeasures and the use of the HTTP method GET to introduce changes in the system. Read More