Publications
2020
Max
Bannach,
Sebastian
Berndt,
Martin
Schuster, and
Marcel
Wienöbst,
PACE Solver Description: Fluid, in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 27:1--27:3.
PACE Solver Description: Fluid, in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 27:1--27:3.
Sebastian
Berndt, and
Maciej
Liskiewicz,
On the universal steganography of optimal rate, Inf. Comput. , vol. 275, pp. 104632, 2020.
On the universal steganography of optimal rate, Inf. Comput. , vol. 275, pp. 104632, 2020.
Zane
Weissman,
Thore
Tiemann,
Daniel
Moghimi,
Evan
Custodio,
Thomas
Eisenbarth, and
Berk
Sunar,
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2020, no. 3, pp. 169-195, 2020.
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2020, no. 3, pp. 169-195, 2020.
DOI: | 10.13154/tches.v2020.i3.169-195 |
Weblink: | https://tches.iacr.org/index.php/TCHES/article/view/8587 |
Weblink: | https://www.youtube.com/watch?v=cBe3YTtrM5s |
File: | 8154 |
Bibtex: | @article{weissman2020jackhammer, author = {Zane Weissman and Thore Tiemann and Daniel Moghimi and Evan Custodio and Thomas Eisenbarth and Berk Sunar}, title = {JackHammer: Efficient Rowhammer on Heterogeneous {FPGA-CPU} Platforms}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {169--195}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.169-195}, doi = {10.13154/TCHES.V2020.I3.169-195} } |
Debajyoti
Das,
Sebastian
Meiser,
Esfandiar
Mohammadi, and
Aniket
Kate,
Comprehensive Anonymity Trilemma: User Coordination is not enough, in Proceedings on Privacy Enhancing Technologies (PETS/PoPETS) 2020.3 , Sciendo, 2020.
Comprehensive Anonymity Trilemma: User Coordination is not enough, in Proceedings on Privacy Enhancing Technologies (PETS/PoPETS) 2020.3 , Sciendo, 2020.
DOI: | 10.2478/popets-2020-0056 |
File: | article-p356.xml |
2019
Saad
Islam,
Ahmad
Moghimi,
Ida
Bruhns,
Moritz
Krebbel,
Berk
Gulmezoglu,
Thomas
Eisenbarth, and
Berk
Sunar,
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks, in 28th USENIX Security Symposium (USENIX Security 19) , Santa Clara, CA: USENIX Association, 2019. pp. 621--637.
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks, in 28th USENIX Security Symposium (USENIX Security 19) , Santa Clara, CA: USENIX Association, 2019. pp. 621--637.
ISBN: | 978-1-939133-06-9 |
File: | islam |
Berk
Gulmezoglu,
Andreas
Zankl,
M. Caner
Tol,
Saad
Islam,
Thomas
Eisenbarth, and
Berk
Sunar,
Undermining User Privacy on Mobile Devices Using AI, in Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2019. pp. 214--227.
Undermining User Privacy on Mobile Devices Using AI, in Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2019. pp. 214--227.
DOI: | 10.1145/3321705.3329804 |
File: | 3321705.3329804 |
David
Sommer,
Aritra
Dhar,
Luka
Malisa,
Esfandiar
Mohammadi,
Daniel
Ronzani, and
Srdjan
Capkun,
Deniable Upload and Download via Passive Participation, in 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) , Boston, MA: USENIX Association, 2019. pp. 649--666.
Deniable Upload and Download via Passive Participation, in 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) , Boston, MA: USENIX Association, 2019. pp. 649--666.
ISBN: | 978-1-931971-49-2 |
File: | sommer |
David
Sommer,
Sebastian
Meiser, and
Esfandiar
Mohammadi,
Privacy Loss Classes: The Central Limit Theorem in Differential Privacy, Proceedings on Privacy Enhancing Technologies , vol. 2019, no. 2, pp. 245 - 269, 2019. Sciendo.
Privacy Loss Classes: The Central Limit Theorem in Differential Privacy, Proceedings on Privacy Enhancing Technologies , vol. 2019, no. 2, pp. 245 - 269, 2019. Sciendo.
DOI: | https://doi.org/10.2478/popets-2019-0029 |
File: | article-p245.xml |
Berk
Gulmezoglu,
Ahmad
Moghimi,
Thomas
Eisenbarth, and
Berk
Sunar,
FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning, arXiv e-prints , 2019.
FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning, arXiv e-prints , 2019.
File: | 2019arXiv190703651G |
Damien
Desfontaines,
Elisabeth
Krahmer, and
Esfandiar
Mohammadi,
Passive and active attackers in noiseless privacy, CoRR , vol. abs/1905.00650, 2019.
Passive and active attackers in noiseless privacy, CoRR , vol. abs/1905.00650, 2019.
File: | 1905.00650 |
2018
Ahmad
Moghimi,
Jan
Wichelmann,
Thomas
Eisenbarth, and
Berk
Sunar,
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations, International Journal of Parallel Programming , 2018.
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations, International Journal of Parallel Programming , 2018.
File: | s10766-018-0611-9 |
Marc
Stelzner, and
Thomas
Eisenbarth,
IT Security in Lübeck - The design of a modern and future-proof security curriculum, in 2018 12th European Workshop on Microelectronics Education (EWME) , 2018. pp. 79-82.
IT Security in Lübeck - The design of a modern and future-proof security curriculum, in 2018 12th European Workshop on Microelectronics Education (EWME) , 2018. pp. 79-82.
DOI: | 10.1109/EWME.2018.8629494 |
File: | 8629494 |
Jan
Wichelmann,
Ahmad
Moghimi,
Thomas
Eisenbarth, and
Berk
Sunar,
MicroWalk: A Framework for Finding Side Channels in Binaries, in Proceedings of the 34th Annual Computer Security Applications Conference , New York, NY, USA: ACM, 2018. pp. 161--173.
MicroWalk: A Framework for Finding Side Channels in Binaries, in Proceedings of the 34th Annual Computer Security Applications Conference , New York, NY, USA: ACM, 2018. pp. 161--173.
DOI: | 10.1145/3274694.3274741 |
File: | 3274694.3274741 |
Gorka
Irazoqui,
Thomas
Eisenbarth, and
Berk
Sunar,
MASCAT: Preventing Microarchitectural Attacks Before Distribution, in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018 , 2018. pp. 377--388.
MASCAT: Preventing Microarchitectural Attacks Before Distribution, in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018 , 2018. pp. 377--388.
DOI: | 10.1145/3176258.3176316 |
File: | 3176258.3176316 |
Elke
De Mulder,
Thomas
Eisenbarth, and
Patrick
Schaumont,
Identifying and Eliminating Side-Channel Leaks in Programmable Systems, IEEE Design Test , vol. 35, no. 1, pp. 74-89, 2018.
Identifying and Eliminating Side-Channel Leaks in Programmable Systems, IEEE Design Test , vol. 35, no. 1, pp. 74-89, 2018.
DOI: | 10.1109/MDAT.2017.2766166 |
Okan
Seker,
Abraham
Fernandez-Rubio,
Thomas
Eisenbarth, and
Rainer
Steinwandt,
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2018, no. 3, pp. 394-430, 2018.
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2018, no. 3, pp. 394-430, 2018.
DOI: | 10.13154/tches.v2018.i3.394-430 |
File: | 7281 |
Mehmet Sinan
Inci,
Thomas
Eisenbarth, and
Berk
Sunar,
DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes, 2018.
DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes, 2018.
Weblink: | https://dblp.uni-trier.de/rec/journals/corr/abs-1808-01352.html?view=bibtex |
File: | 1808.01352 |
Samira
Briongos,
Gorka
Irazoqui,
Pedro
Malagon, and
Thomas
Eisenbarth,
CacheShield: Detecting Cache Attacks through Self-Observation, in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018 , 2018. pp. 224--235.
CacheShield: Detecting Cache Attacks through Self-Observation, in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018 , 2018. pp. 224--235.
DOI: | 10.1145/3176258.3176320 |
File: | 3176258.3176320 |
Fergus
Dall,
Gabrielle De
Micheli,
Thomas
Eisenbarth,
Daniel
Genkin,
Nadia
Heninger,
Ahmad
Moghimi, and
Yuval
Yarom,
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks, IACR Trans. Cryptogr. Hardw. Embed. Syst. , vol. 2018, no. 2, pp. 171--191, 2018.
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks, IACR Trans. Cryptogr. Hardw. Embed. Syst. , vol. 2018, no. 2, pp. 171--191, 2018.
DOI: | 10.13154/tches.v2018.i2.171-191 |
File: | tches.v2018.i2.171-191 |
2017
Samira
Briongos,
Gorka
Irazoqui,
Pedro
Malagon, and
Thomas
Eisenbarth,
CacheShield: Protecting Legacy Processes Against Cache Attacks, 09 2017.
CacheShield: Protecting Legacy Processes Against Cache Attacks, 09 2017.
File: | 1709.01795v1 |
Berk
Gulmezoglu,
Thomas
Eisenbarth, and
Berk
Sunar,
Cache-Based Application Detection in the Cloud Using Machine Learning, in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2017. pp. 288--300.
Cache-Based Application Detection in the Cloud Using Machine Learning, in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2017. pp. 288--300.
ISBN: | 978-1-4503-4944-4 |
File: | 3052973.3053036 |
Ahmad
Moghimi,
Gorka
Irazoqui, and
Thomas
Eisenbarth,
CacheZoom: How SGX Amplifies the Power of Cache Attacks, in Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings , 2017. pp. 69--90.
CacheZoom: How SGX Amplifies the Power of Cache Attacks, in Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings , 2017. pp. 69--90.
File: | 978-3-319-66787-4_4 |
Gorka
Irazoqui,
Kai
Cong,
Xiaofei
Guo,
Hareesh
Khattri,
Arun
Kanuparthi,
Thomas
Eisenbarth, and
Berk
Sunar,
Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries, CoRR , vol. abs/1709.01552, 2017.
Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries, CoRR , vol. abs/1709.01552, 2017.
File: | 1709.01552 |
Berk
Gulmezoglu,
Andreas
Zankl,
Thomas
Eisenbarth, and
Berk
Sunar,
PerfWeb: How to Violate Web Privacy with Hardware Performance Events, in Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II , 2017. pp. 80--97.
PerfWeb: How to Violate Web Privacy with Hardware Performance Events, in Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II , 2017. pp. 80--97.
File: | 978-3-319-66399-9_5 |
Michael
Moukarzel,
Thomas
Eisenbarth, and
Berk
Sunar,
uLeech: A side-channel evaluation platform for IoT, in 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS) , 2017. pp. 25-28.
uLeech: A side-channel evaluation platform for IoT, in 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS) , 2017. pp. 25-28.
DOI: | 10.1109/MWSCAS.2017.8052851 |
File: | 8052851 |