SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies.
“That would have never occurred to experts.” – Opportunities and Limits of Digital Citizen Participation Today the event “Digital Discourse | Insights into Lived Participation”, supported by SBA Research and organized by Liquid Participation, took place. What expectations are linked to participatory online processes? How is the process design for… Read More
ESORICS 2015 will be held in Vienna from September 21-25. SBA Research is the local organizer, Edgar Weippl serves together with Peter Y A Ryan (University of Luxembourg) as Program Chair. Submission Deadline: April 4, 2015 … Read More
For the second time in a row the Best Paper Award of the International Conference on Preservation of Digital Objects (iPRES 2014) has been awarded to the researchers from SBA. In this year´s edition… Read More
SBA Research participates with three topics at the European Researchers’ Night: Security on the Internet: Facebook, WhatsApp, Instagramm & Co. Hollywood Hacking: A Reality Check Digital Forensics – CSI in IT… Read More
What is Shellshock? On 24/09/2014, a security vulnerability was published as CVE-2014-6271 (also Shellshock or Bashbleed). The vulnerability is in the command line software bash which is used in practically all Linux systems as the default shell. Due to an error when parsing environment variables, it is possible to execute… Read More
ARES 2014 was held from 8 – 12 September 2014 in Fribourg, Switzerland. Thanks to 133 participants from 30 countries for participating! ARES 2014 Opening Welcome Reception Keynote Bart Preneel Tiny Train through Fribourg ARES 2014 participants… Read More
Edgar Weippl gives a keynote on Advanced Persistent Threats & Social Engineering at the 11th International Conference on Security and Cryptography (SECRYPT 2014), wich takes place from 28 – 30 August 2014 in Vienna.
The Laravel framework versions between 11.9.0 and 11.35.1 are susceptible to reflected cross-site scripting due to an improper encoding of route parameters in the debug-mode error page. ∞