Prof. Dr.-Ing. Thomas Eisenbarth

Photo of Thomas  Eisenbarth

Institutsdirektor


Ratzeburger Allee 160
23562 Lübeck
Gebäude 64, 1. OG, Raum 043

Email: thomas.eisenbarth(at)uni-luebeck.de
Phone: +49 451 3101 6600
Fax: +49 451 3101 6604

About Me

I am a Professor of IT Security at the University of Lübeck.  I received my Ph.D. in ECE from Ruhr-Universität Bochum, Germany, where I was a member of the Horst Goertz Institute for IT Security (HGI). Starting in 2010, I spent two years at the Center for Cryptology and Information Security (CCIS) at Florida Atlantic University. In 2012, I joined the Department of Electrical and Computer Engineering at WPI. Since August 2017 I am the Director of the Institute of IT Security at the University of Lübeck.
Since October 2024, I am the head of the STEM sections (the non-medical departments) of University of Lübeck.

 

My research interests are in:

  • Systems security, software security and code analysis
  • Applied Cryptology
  • Secure virtualization, computer architecture and trusted execution environments
  • Side channel analysis, physical attacks and their prevention

Publications

2016

Cong Chen, Mohammad Farmani, and Thomas Eisenbarth,
A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile---and Why It Is Not, Cheon, Jung Hee and Takagi, Tsuyoshi, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016, pp. 819--843.
ISBN:978-3-662-53887-6
File: 10.1007%2F978-3-662-53887-6_30

2015

Baris Ege, Thomas Eisenbarth, and Lejla Batina,
Near Collision Side Channel Attacks, in Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers , 2015. pp. 277--292.
File: 978-3-319-31301-6_17
Gorka Irazoqui, Thomas Eisenbarth, and Berk Sunar,
Systematic Reverse Engineering of Cache Slice Selection in Intel Processors, in 2015 Euromicro Conference on Digital System Design, DSD 2015, Madeira, Portugal, August 26-28, 2015 , 2015. pp. 629--636.
File: DSD.2015.56
Gorka Irazoqui, Thomas Eisenbarth, and Berk Sunar,
SSA: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES, in 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015 , 2015. pp. 591--604.
File: SP.2015.42
Aria Shahverdi, Mostafa Taha, and Thomas Eisenbarth,
Silent Simon: A threshold implementation under 100 slices, in IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015 , 2015. pp. 1--6.
File: HST.2015.7140227
Zachary N. Goddard, Nicholas LaJeunesse, and Thomas Eisenbarth,
Power analysis of the t-private logic style for FPGAs, in IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015 , 2015. pp. 68--71.
File: HST.2015.7140239
Thomas Eisenbarth, Aaron Meyerowitz, and Rainer Steinwandt,
On the security margin of MAC striping, Inf. Process. Lett. , vol. 115, no. 11, pp. 899--902, 2015.
File: j.ipl.2015.05.009
Xin Ye, Mostafa Taha, Cong Chen, and Thomas Eisenbarth,
Faster Leakage Detection and Exploitation, in Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015 , 2015. pp. 21--29.
DOI:10.1145/2808414.2808419
File: 301419853_Faster_Leakage_Detection_and_Exploitation
Cong Chen, Thomas Eisenbarth, Ingo Maurich, and Rainer Steinwandt,
Masking Large Keys in Hardware: A Masked Implementation of McEliece, in Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers , 2015. pp. 293--309.
File: 978-3-319-31301-6_18
Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, and Berk Sunar,
Lucky 13 Strikes Back, in Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015 , 2015. pp. 85--96.
File: 2714576.2714625
Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, and Berk Sunar,
Know Thy Neighbor: Crypto Library Detection in Cloud, PoPETs , vol. 2015, no. 1, pp. 25--40, 2015.
File: popets-2015-0003.xml
Thomas Eisenbarth, Yunsi Fei, and Dimitrios Serpanos,
Guest Editorial: Special Section on Embedded System Security, IEEE Embedded Systems Letters , vol. 7, no. 1, pp. 1-2, 2015.
File: LES.2015.2404940
Cong Chen, Thomas Eisenbarth, Ingo Maurich, and Rainer Steinwandt,
Differential Power Analysis of a McEliece Cryptosystem, in Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers , 2015. pp. 538--556.
DOI:10.1007/978-3-319-28166-7_26
File: 534
Berk Gulmezoglu, Mehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth, and Berk Sunar,
A Faster and More Realistic Flush+Reload Attack on AES, in Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers , 2015. pp. 111--126.
File: 978-3-319-21476-4_8

2014

Xin Ye, Cong Chen, and Thomas Eisenbarth,
Non-Linear Collision Analysis, in Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers , 2014. pp. 198--214.
File: 978-3-319-13066-8_13
Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, and Berk Sunar,
Wait a minute! A fast, Cross-VM attack on AES, IACR Cryptology ePrint Archive , vol. 2014, pp. 435, 2014.
File: 435
Yarkin Doröz, Aria Shahverdi, Thomas Eisenbarth, and Berk Sunar,
Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince, in Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers , 2014. pp. 208--220.
File: 978-3-662-44774-1_17
Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, and Berk Sunar,
Fine Grain Cross-VM Attacks on Xen and VMware, in 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, BDCloud 2014, Sydney, Australia, December 3-5, 2014 , 2014. pp. 737--744.
DOI:10.1109/BDCloud.2014.102
File: 248
Cong Cong Chen, Thomas Eisenbarth, Aria Shahverdi, and Xin Ye,
Balanced Encoding to Mitigate Power Analysis: A Case Study, IACR Cryptology ePrint Archive , vol. 2014, pp. 952, 2014.
File: 952
Xin Ye, Thomas Eisenbarth, and William Martin,
Bounded, yet Sufficient? How to Determine Whether Limited Side Channel Information Enables Key Recovery, in Smart Card Research and Advanced Applications - 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers , 2014. pp. 215--232.
File: 978-3-319-16763-3_13

2013

Thomas Eisenbarth, Ingo Maurich, Christof Paar, and Xin Ye,
A Performance Boost for Hash-Based Signatures, in Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday , 2013. pp. 166--182.
File: 978-3-642-42001-6_13
Xin Ye, and Thomas Eisenbarth,
On the Vulnerability of Low Entropy Masking Schemes, in Smart Card Research and Advanced Applications - 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers , 2013. pp. 44--60.
File: 978-3-319-08302-5_4

2012

Thomas Eisenbarth, Zheng Gong, Tim Güneysu, Stefan Heyse, Sebastiaan Indesteege, Stéphanie Kerckhof, François Koeune, Tomislav Nad, Thomas Plos, Francesco Regazzoni, François-Xavier Standaert, and Loic Oldenzeel,
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices, in Progress in Cryptology - AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings , 2012. pp. 172--187.
File: 978-3-642-31410-0_11
Amir Moradi, Mario Kirschbaum, Thomas Eisenbarth, and Christof Paar,
Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power Analysis Methods, IEEE Trans. VLSI Syst. , vol. 20, no. 9, pp. 1578--1589, 2012.
File: TVLSI.2011.2160375
Xin Ye, and Thomas Eisenbarth,
Wide Collisions in Practice, in Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings , 2012. pp. 329--343.
File: 978-3-642-31284-7_20