Präsentationen und Vorträge
Präsentationen und Vorträge sind auf unserem Youtube-Kanal zusammengestellt.
Publikationen
2025
Felix
Mächtle,
Nils
Loose,
Jan-Niclas
Serr,
Jonas
Sander, and
Thomas
Eisenbarth,
AutoStub: Genetic Programming-Based Stub Creation for Symbolic Execution, in Proceedings of the 18th ACM/IEEE International Workshop on Search-Based and Fuzz Testing, SBFT 2025 , 2025.
AutoStub: Genetic Programming-Based Stub Creation for Symbolic Execution, in Proceedings of the 18th ACM/IEEE International Workshop on Search-Based and Fuzz Testing, SBFT 2025 , 2025.
Felix
Mächtle,
Jan-Niclas
Serr,
Nils
Loose,
Jonas
Sander, and
Thomas
Eisenbarth,
OCEAN: Open-World Contrastive Authorship Identification, in Applied Cryptography and Network Security (ACNS) 2025 , 2025.
OCEAN: Open-World Contrastive Authorship Identification, in Applied Cryptography and Network Security (ACNS) 2025 , 2025.
Weblink: | https://arxiv.org/abs/2412.05049 |
Bibtex: | @misc{maechtle2024oceanopenworldcontrastiveauthorship, title={OCEAN: Open-World Contrastive Authorship Identification}, author={Felix Mächtle and Jan-Niclas Serr and Nils Loose and Jonas Sander and Thomas Eisenbarth}, year={2024}, eprint={2412.05049}, archivePrefix={arXiv}, primaryClass={cs.AI}, url={https://arxiv.org/abs/2412.05049}, } |
Jonas
Sander,
Sebastian
Berndt,
Ida
Bruhns, and
Thomas
Eisenbarth,
Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2025, pp. 420-449, 2025. IACR.
Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2025, pp. 420-449, 2025. IACR.
DOI: | 10.46586/tches.v2025.i1.420-449 |
Zane
Weissman,
Thore
Tiemann,
Thomas
Eisenbarth, and
Berk
Sunar,
Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms, in Information Systems Security , Patil, Vishwas T. and Krishnan, Ram and Shyamasundar, Rudrapatna K., Eds. Springer Nature Switzerland, 2025. pp. 3-24.
Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms, in Information Systems Security , Patil, Vishwas T. and Krishnan, Ram and Shyamasundar, Rudrapatna K., Eds. Springer Nature Switzerland, 2025. pp. 3-24.
DOI: | 10.1007/978-3-031-80020-7_1 |
ISBN: | 978-3-031-80020-7 |
Weblink: | https://doi.org/10.48550/arXiv.2311.15999 |
Bibtex: | @inproceedings{weissman2025firecracker, author = {Weissman, Zane and Tiemann, Thore and Eisenbarth, Thomas and Sunar, Berk}, title = {Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms}, booktitle = {Information Systems Security}, editor = {Patil, Vishwas T. and Krishnan, Ram and Shyamasundar, Rudrapatna K.}, year = {2025}, pages = {3--24}, publisher = {Springer Nature Switzerland}, isbn = {978-3-031-80020-7}, doi = {10.1007/978-3-031-80020-7_1}, } |
2024
Luca
Wilke,
Florian
Sieck, and
Thomas
Eisenbarth,
TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security , ACM, Okt.2024.
TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security , ACM, Okt.2024.
DOI: | 10.1145/3658644.3690230 |
Weblink: | https://uzl-its.github.io/tdxdown/ |
Bibtex: | @INPROCEEDINGS{tdxdownCCS24, author = {Luca Wilke and Florian Sieck and Thomas Eisenbarth}, booktitle = {Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, {CCS} 2024, Salt Lake City, UT, USA, October 14--18, 2024}, title = {{TDXdown}: Single-Stepping and Instruction Counting Attacks against Intel {TDX}}, year = {2024}, doi = {10.1145/3658644.3690230} } |
Max
Schulze,
Yorck
Zisgen,
Moritz
Kirschte,
Esfandiar
Mohammadi, and
Agnes
Koschmider,
Differentially Private Inductive Miner, in 2024 6th International Conference on Process Mining (ICPM) , Curran Associates, Sep.2024. pp. 89-96.
Differentially Private Inductive Miner, in 2024 6th International Conference on Process Mining (ICPM) , Curran Associates, Sep.2024. pp. 89-96.
DOI: | 10.1109/ICPM63005.2024.10680684 |
ISBN: | 979-8-3503-6503-0 |
Datei: | 10680684 |
Johannes
Liebenow,
Timothy
Imort,
Yannick
Fuchs,
Marcel
Heisel,
Nadja
Käding,
Jan
Rupp, and
Esfandiar
Mohammadi,
PrivAgE: A Toolchain for Privacy-Preserving Distributed Aggregation on Edge-Devices, KI - Künstliche Intelligenz , vol. 38, pp. 183-188, 2024.
PrivAgE: A Toolchain for Privacy-Preserving Distributed Aggregation on Edge-Devices, KI - Künstliche Intelligenz , vol. 38, pp. 183-188, 2024.
DOI: | 10.1007/s13218-023-00823-8 |
Datei: | s13218-023-00823-8 |
Nils
Loose,
Felix
Mächtle,
Florian
Sieck, and
Thomas
Eisenbarth,
SWAT: Modular Dynamic Symbolic Execution for Java Applications using Dynamic Instrumentation (Competition Contribution), in Tools and Algorithms for the Construction and Analysis of Systems - 30th International Conference, TACAS 2024, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024, Luxembourg City, Luxembourg, April 6-11, 2024, Proceedings, Part III , Bernd Finkbeiner and Laura Kovács, Eds. Springer, 2024. pp. 399-405.
SWAT: Modular Dynamic Symbolic Execution for Java Applications using Dynamic Instrumentation (Competition Contribution), in Tools and Algorithms for the Construction and Analysis of Systems - 30th International Conference, TACAS 2024, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024, Luxembourg City, Luxembourg, April 6-11, 2024, Proceedings, Part III , Bernd Finkbeiner and Laura Kovács, Eds. Springer, 2024. pp. 399-405.
DOI: | 10.1007/978-3-031-57256-2_28 |
Datei: | 978-3-031-57256-2_28 |
Luca
Wilke, and
Gianluca
Scopelliti,
SNPGuard: Remote Attestation of SEV-SNP VMs Using Open Source Tools, in 2024 IEEE European Symposium on Security and Privacy Workshops EuroS&P , IEEE Computer Society, 2024. pp. 193-198.
SNPGuard: Remote Attestation of SEV-SNP VMs Using Open Source Tools, in 2024 IEEE European Symposium on Security and Privacy Workshops EuroS&P , IEEE Computer Society, 2024. pp. 193-198.
DOI: | 10.1109/EuroSPW61312.2024.00026 |
Weblink: | https://doi.ieeecomputersociety.org/10.1109/EuroSPW61312.2024.00026 |
Bibtex: | @INPROCEEDINGS {10628964, author = {L. Wilke and G. Scopelliti}, booktitle = {2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)}, title = {SNPGuard: Remote Attestation of SEV-SNP VMs Using Open Source Tools}, year = {2024}, volume = {}, issn = {}, pages = {193-198}, doi = {10.1109/EuroSPW61312.2024.00026}, url = {https://doi.ieeecomputersociety.org/10.1109/EuroSPW61312.2024.00026}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, month = {jul} } |
Ida
Bruhns,
Sebastian
Berndt,
Jonas
Sander, and
Thomas
Eisenbarth,
Slalom at the Carnival: Privacy-preserving Inference with Masks from Public Knowledge, IACR Commun. Cryptol. , vol. 1, no. 3, pp. 40, 2024.
Slalom at the Carnival: Privacy-preserving Inference with Masks from Public Knowledge, IACR Commun. Cryptol. , vol. 1, no. 3, pp. 40, 2024.
DOI: | 10.62056/AKP-49QGXQ |
Datei: | akp-49qgxq |
Luca
Wilke,
Jan
Wichelmann,
Anja
Rabich, and
Thomas
Eisenbarth,
SEV-Step: A Single-Stepping Framework for AMD-SEV, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 180-206.
SEV-Step: A Single-Stepping Framework for AMD-SEV, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 180-206.
DOI: | 10.46586/tches.v2024.i1.180-206 |
Datei: | 10792 |
Thorsten
Peinemann,
Moritz
Kirschte,
Joshua
Stock,
Carlos
Cotrini, and
Esfandiar
Mohammadi,
S-BDT: Distributed Differentially Private Boosted Decision Trees, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS '24) , New York, NY, USA: Association for Computing Machinery, 2024. pp. 288–302.
S-BDT: Distributed Differentially Private Boosted Decision Trees, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS '24) , New York, NY, USA: Association for Computing Machinery, 2024. pp. 288–302.
DOI: | 10.1145/3658644.3690301 |
ISBN: | 9798400706363 |
Datei: | 2309.12041 |
Paula
Arnold,
Sebastian
Berndt,
Thomas
Eisenbarth, and
Maximilian
Orlt,
Polynomial sharings on two secrets: Buy one, get one free, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 671-706.
Polynomial sharings on two secrets: Buy one, get one free, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 671-706.
DOI: | 10.46586/tches.v2024.i3.671-706 |
Datei: | 11691 |
Jan
Wichelmann,
Anja
Rabich,
Anna
Pätschke, and
Thomas
Eisenbarth,
Obelix: Mitigating Side-Channels Through Dynamic Obfuscation, in 2024 IEEE Symposium on Security and Privacy (S&P) , San Francisco, CA, USA: IEEE, 2024. pp. 4182-4199.
Obelix: Mitigating Side-Channels Through Dynamic Obfuscation, in 2024 IEEE Symposium on Security and Privacy (S&P) , San Francisco, CA, USA: IEEE, 2024. pp. 4182-4199.
DOI: | 10.1109/SP54263.2024.00261 |
Weblink: | https://doi.ieeecomputersociety.org/10.1109/SP54263.2024.00261 |
Thore
Tiemann,
Zane
Weissman,
Thomas
Eisenbarth, and
Berk
Sunar,
Microarchitectural Vulnerabilities Introduced, Exploited, and Accelerated by Heterogeneous FPGA-CPU Platforms, in Security of FPGA-Accelerated Cloud Computing Environments , Szefer, Jakub and Tessier, Russell, Eds. Cham: Springer International Publishing, 2024, pp. 203-237.
Microarchitectural Vulnerabilities Introduced, Exploited, and Accelerated by Heterogeneous FPGA-CPU Platforms, in Security of FPGA-Accelerated Cloud Computing Environments , Szefer, Jakub and Tessier, Russell, Eds. Cham: Springer International Publishing, 2024, pp. 203-237.
DOI: | 10.1007/978-3-031-45395-3_8 |
ISBN: | 978-3-031-45395-3 |
Bibtex: | @inbook{tiemann2024fpgaplatform, author = {Tiemann, Thore and Weissman, Zane and Eisenbarth, Thomas and Sunar, Berk}, editor = {Szefer, Jakub and Tessier, Russell}, title = {Microarchitectural Vulnerabilities Introduced, Exploited, and Accelerated by Heterogeneous {FPGA-CPU} Platforms}, bookTitle = {Security of FPGA-Accelerated Cloud Computing Environments}, year = {2024}, publisher = {Springer International Publishing}, pages = {203--237}, isbn = {978-3-031-45395-3}, doi = {10.1007/978-3-031-45395-3_8}, url = {https://doi.org/10.1007/978-3-031-45395-3_8}, } |
Marcel
Gehrke,
Johannes
Liebenow,
Esfandiar
Mohammadi, and
Tanya
Braun,
Lifting in Support of Privacy-Preserving Probabilistic Inference, KI - Künstliche Intelligenz , vol. 38, pp. 225-241, 2024.
Lifting in Support of Privacy-Preserving Probabilistic Inference, KI - Künstliche Intelligenz , vol. 38, pp. 225-241, 2024.
DOI: | 10.1007/s13218-024-00851-y |
Datei: | s13218-024-00851-y |
Roland
Stenger,
Steffen
Busse,
Jonas
Sander,
Thomas
Eisenbarth, and
Sebastian
Fudickar,
Evaluating the Impact of Face Anonymization Methods on Computer Vision Tasks: A Trade-off Between Privacy and Utility, IEEE Access , pp. 1-1, 2024.
Evaluating the Impact of Face Anonymization Methods on Computer Vision Tasks: A Trade-off Between Privacy and Utility, IEEE Access , pp. 1-1, 2024.
DOI: | 10.1109/ACCESS.2024.3519441 |
Weblink: | https://ieeexplore.ieee.org/document/10804775 |
Datei: | ACCESS.2024.3519441 |
Debopriya Roy
Dipta,
Thore
Tiemann,
Berk
Gulmezoglu,
Eduard
Marin, and
Thomas
Eisenbarth,
Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments, in 9th IEEE European Symposium on Security and Privacy, EuroS&P 2024 , IEEE, 2024. pp. 327-344.
Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments, in 9th IEEE European Symposium on Security and Privacy, EuroS&P 2024 , IEEE, 2024. pp. 327-344.
DOI: | 10.1109/EUROSP60621.2024.00025 |
Weblink: | https://doi.ieeecomputersociety.org/10.1109/EuroSP60621.2024.00025 |
Weblink: | https://doi.org/10.48550/arXiv.2404.10715 |
Bibtex: | @inproceedings{DBLP:conf/eurosp/DiptaTGME24, author = {Debopriya Roy Dipta and Thore Tiemann and Berk G{\"{u}}lmezoglu and Eduard Marin and Thomas Eisenbarth}, title = {Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments}, booktitle = {9th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2024, Vienna, Austria, July 8-12, 2024}, pages = {327--344}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/EuroSP60621.2024.00025}, doi = {10.1109/EUROSP60621.2024.00025} } |
Volodymyr
Bezsmertnyi,
Jean Michel
Cioranesco, and
Thomas
Eisenbarth,
Duplication-Based Fault Tolerance for RISC-V Embedded Software, in Computer Security - ESORICS 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part IV , Joaquin Garcia Alfaro, Rafal Kozik, Michal Choras, Sokratis K. Katsikas, Eds. Springer, 2024. pp. 86--104.
Duplication-Based Fault Tolerance for RISC-V Embedded Software, in Computer Security - ESORICS 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part IV , Joaquin Garcia Alfaro, Rafal Kozik, Michal Choras, Sokratis K. Katsikas, Eds. Springer, 2024. pp. 86--104.
DOI: | 10.1007/978-3-031-70903-6\_5 |
Weblink: | https://dblp.org/rec/conf/esorics/BezsmertnyiCE24.html |
Weblink: | https://link.springer.com/chapter/10.1007/978-3-031-70903-6_5 |
Datei: | 978-3-031-70903-6\_5 |
Johannes
Liebenow,
Yara
Schütt,
Tanya
Braun,
Marcel
Gehrke,
Florian
Thaeter, and
Esfandiar
Mohammadi,
DPM: Clustering Sensitive Data through Separation, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, CCS 2024 , ACM, 2024.
DPM: Clustering Sensitive Data through Separation, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, CCS 2024 , ACM, 2024.
DOI: | 10.48550/arXiv.2307.02969 |
Datei: | arXiv.2307.02969 |
2023
Florian
Sieck,
Zhiyuan
Zhang,
Sebastian
Berndt,
Chitchanok
Chuengsatiansup,
Thomas
Eisenbarth, and
Yuval
Yarom,
TeeJam: Sub-Cache-Line Leakages Strike Back, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , Dez.2023. pp. 457-500.
TeeJam: Sub-Cache-Line Leakages Strike Back, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , Dez.2023. pp. 457-500.
DOI: | 10.46586/tches.v2024.i1.457-500 |
Weblink: | https://tches.iacr.org/index.php/TCHES/article/view/11259 |
Bibtex: | @article{Sieck_Zhang_Berndt_Chuengsatiansup_Eisenbarth_Yarom_2023, title={TeeJam: Sub-Cache-Line Leakages Strike Back}, volume={2024}, url={https://tches.iacr.org/index.php/TCHES/article/view/11259}, DOI={10.46586/tches.v2024.i1.457-500}, number={1}, journal={IACR Transactions on Cryptographic Hardware and Embedded Systems}, author={Sieck, Florian and Zhang, Zhiyuan and Berndt, Sebastian and Chuengsatiansup, Chitchanok and Eisenbarth, Thomas and Yarom, Yuval}, year={2023}, month={Dec.}, pages={457–500} } |
Andrija
Neskovic,
Saleh
Mulhem,
Alexander
Treff,
Rainer
Buchty,
Thomas
Eisenbarth, and
Mladen
Berekovic,
SystemC Model of Power Side-Channel Attacks Against AI Accelerators: Superstition or not?, in 2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD) , IEEE/ACM, Nov.2023. pp. 1-8.
SystemC Model of Power Side-Channel Attacks Against AI Accelerators: Superstition or not?, in 2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD) , IEEE/ACM, Nov.2023. pp. 1-8.
DOI: | 10.1109/ICCAD57390.2023.10323687 |
Weblink: | https://arxiv.org/abs/2311.13387 |
Philipp
Schmitz,
Tobias
Jauch,
Alex
Wezel,
Mohammad R.
Fadiheh,
Thore
Tiemann,
Jonah
Heller,
Thomas
Eisenbarth,
Dominik
Stoffel, and
Wolfgang
Kunz,
Okapi: A Lightweight Architecture for Secure Speculation Exploiting Locality of Memory Accesses, 2023.
Okapi: A Lightweight Architecture for Secure Speculation Exploiting Locality of Memory Accesses, 2023.
Weblink: | https://arxiv.org/abs/2312.08156 |
Bibtex: | @misc{schmitz2023okapi, author = {Philipp Schmitz and Tobias Jauch and Alex Wezel and Mohammad R. Fadiheh and Thore Tiemann and Jonah Heller and Thomas Eisenbarth and Dominik Stoffel and Wolfgang Kunz}, title = {Okapi: A Lightweight Architecture for Secure Speculation Exploiting Locality of Memory Accesses}, year = {2023}, eprint = {2312.08156}, archivePrefix = {arXiv}, primaryClass = {cs.CR}, url = {https://doi.org/10.48550/arXiv.2312.08156}, doi = {10.48550/arXiv.2312.08156}, } |
Pascal
Bemmann,
Sebastian
Berndt,
Denis
Diemert,
Thomas
Eisenbarth, and
Tibor
Jager,
Subversion-Resilient Authenticated Encryption Without Random Oracles, in Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part II , Mehdi Tibouchi and Xiaofeng Wang, Eds. Springer, 2023. pp. 460-483.
Subversion-Resilient Authenticated Encryption Without Random Oracles, in Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part II , Mehdi Tibouchi and Xiaofeng Wang, Eds. Springer, 2023. pp. 460-483.
DOI: | 10.1007/978-3-031-33491-7_17 |
Datei: | 978-3-031-33491-7_17 |
Claudius
Pott,
Berk
Gulmezoglu, and
Thomas
Eisenbarth,
Overcoming the Pitfalls of HPC-based Cryptojacking Detection in Presence of GPUs, in Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2023, Charlotte, NC, USA, April 24-26, 2023 , Mohamed Shehab and Maribel Fernandez and Ninghui Li, Eds. ACM, 2023. pp. 177-188.
Overcoming the Pitfalls of HPC-based Cryptojacking Detection in Presence of GPUs, in Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2023, Charlotte, NC, USA, April 24-26, 2023 , Mohamed Shehab and Maribel Fernandez and Ninghui Li, Eds. ACM, 2023. pp. 177-188.
DOI: | 10.1145/3577923.3583655 |
Datei: | 3577923.3583655 |