Floragasse 7 – 5th floor, 1040 Vienna
Subscribe to our Newsletter

SBA Research is a research center for Information Security
funded partly by the national initiative for COMET Competence Centers for Excellent Technologies.

Recent News:

Kristoffer Kleine successfully defended his master’s thesis

Kristoffer successfully defended his master’s thesis “Efficient Algorithms and Tools for Practical Combinatorial Testing” advised by Dimitris E. Simos, at the Faculty of Informatics of TU Vienna. Kristoffer gave an excellent presentation and graduated with distinction. Read More

Matthias Eckhart at CPSS ‘18

Today, Matthias Eckhart speaks about “Towards Security-Aware Virtual Environments for Digital Twins” at the “4th ACM Workshop on Cyber-Physical System Security”, taking place at the Songdo Central Park Hotel in Incheon, South Korea. Read More

Paper accepted @ RAID 2018

Our paper “Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids” by Johanna Ullrich, Nicholas Stifter, Aljosha Judmayer, Adrian Dabrowski and Edgar Weippl has been accepted at the International Symposium on Research in Attacks, Intrusions and Defenses (RAID).  Our work investigates whether cryptocurrencies are a threat for reliable power grid operation… Read More

Blocks and Chains now translated into Korean

Our book Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms (Aljosha Judmayer, Nicholas Stifter, Katharina Krombholz, Edgar Weippl) has been translated into Korean. Read More

Edgar Weippl ACM Distinguished Speaker

Edgar Weippl offers three talks with ACM’s Distinguished Speaker program. Blockchains & Distributed Ledger Technology Secure Development Lifecycle of Production Environments Improvement of Security of Information Processing in the Industrial Production System Lifecycle… Read More

Edgar Weippl Keynote at Ruhrsec

Power plants and many other industrial plants are an integral part of a country’s critical infrastructure. As systems become more automated and networked and complicated software systems control entire systems, IT security is playing an increasingly important role. Previous attacks have mostly exploited existing vulnerabilities, future attackers will strive to… Read More