Präsentationen und Vorträge

Präsentationen und Vorträge sind auf unserem Youtube-Kanal zusammengestellt.

Publikationen

2021

Tim Gellersen, Okan Seker, and Thomas Eisenbarth,
Differential Power Analysis of the Picnic Signature Scheme, in Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings , Jung Hee Cheon and Jean-Pierre Tillich, Eds. Springer, 2021. pp. 177-194.
DOI:10.1007/978-3-030-81293-5_10
Datei: 978-3-030-81293-5_10
Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, and Aniket Kate,
Divide and Funnel: a Scaling Technique for Mix-Networks, IACR Cryptol. ePrint Arch. , pp. 1685, 2021.
Datei: 1685
Claudius Pott, Philipp Jungklass, David Jacek Csejka, Thomas Eisenbarth, and Marco Siebert,
Firmware Security Module: A Framework for Trusted Computing in Automotive Multiprocessors, Journal of Hardware and Systems Security , pp. 103-113, 2021.
DOI:10.1007/s41635-021-00114-4
Datei: s41635-021-00114-4

2020

Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, and Aniket Kate,
Comprehensive Anonymity Trilemma: User Coordination is not enough, in Proceedings on Privacy Enhancing Technologies (PETS/PoPETS) 2020.3 , Sciendo, 2020.
DOI:10.2478/popets-2020-0056
Datei: article-p356.xml
Zane Weissman, Thore Tiemann, Daniel Moghimi, Evan Custodio, Thomas Eisenbarth, and Berk Sunar,
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2020, no. 3, pp. 169-195, 2020.
DOI:10.13154/tches.v2020.i3.169-195
Datei: Dateilink
Bibtex: BibTeX
@article{weissman2020jackhammer,
  author       = {Zane Weissman and
                  Thore Tiemann and
                  Daniel Moghimi and
                  Evan Custodio and
                  Thomas Eisenbarth and
                  Berk Sunar},
  title        = {JackHammer: Efficient Rowhammer on Heterogeneous {FPGA-CPU} Platforms},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {169--195},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.169-195},
  doi          = {10.13154/TCHES.V2020.I3.169-195}
}
Sebastian Berndt, and Maciej Liskiewicz,
On the universal steganography of optimal rate, Inf. Comput. , vol. 275, pp. 104632, 2020.
Max Bannach, Sebastian Berndt, Martin Schuster, and Marcel Wienöbst,
PACE Solver Description: Fluid, in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 27:1--27:3.
Max Bannach, Sebastian Berndt, Martin Schuster, and Marcel Wienöbst,
PACE Solver Description: PID (star), in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 28:1--28:4.
Samira Briongos, Pedro Malagon, Jose M. Moya, and Thomas Eisenbarth,
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks, in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, 2020. pp. 1967-1984.
ISBN:978-1-939133-17-5
Datei: briongos
Luca Wilke, Jan Wichelmann, Mathias Morbitzer, and Thomas Eisenbarth,
SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions, in 2020 IEEE Symposium on Security and Privacy (SP) , Los Alamitos, CA, USA: IEEE Computer Society, 2020. pp. 1431-1444.
DOI:10.1109/SP40000.2020.00080
Weblink: https://uzl-its.github.io/SEVurity/
Weblink: https://doi.ieeecomputersociety.org/10.1109/SP40000.2020.00080
Okan Seker, Sebastian Berndt, Luca Wilke, and Thomas Eisenbarth,
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis, in CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security , Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna, Eds. ACM, 2020. pp. 1033-1049.
DOI:10.1145/3372297.3417889
Datei: 3372297.3417889
Max Bannach, Sebastian Berndt, Marten Maack, Matthias Mnich, Alexandra Lassota, Malin Rau, and Malte Skambath,
Solving Packing Problems with Few Small Items Using Rainbow Matchings, in MFCS 2020 , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020.
Daniel Moghimi, Berk Sunar, Thomas Eisenbarth, and Nadia Heninger,
TPM-FAIL: TPM meets Timing and Lattice Attacks, in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, 2020. pp. 2057-2073.
ISBN:978-1-939133-17-5
Weblink: https://tpm.fail/
Datei: moghimi-tpm
Samira Briongos, Pedro Malag'on, Jose Manuel Moya, and Thomas Eisenbarth,
Microarchitectural Isolation Guarantees Through Execution Based Signatures, in XXXV Conference on Design of Circuits and Integrated Systems, DCIS, 2020, Segovia, Spain, November 18-20, 2020 , IEEE, 2020. pp. 1-6.
DOI:10.1109/DCIS51330.2020.9268660
Datei: DCIS51330.2020.9268660

2019

Saad Islam, Ahmad Moghimi, Ida Bruhns, Moritz Krebbel, Berk Gulmezoglu, Thomas Eisenbarth, and Berk Sunar,
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks, in 28th USENIX Security Symposium (USENIX Security 19) , Santa Clara, CA: USENIX Association, 2019. pp. 621-637.
ISBN:978-1-939133-06-9
Datei: islam
Berk Gulmezoglu, Andreas Zankl, M. Caner Tol, Saad Islam, Thomas Eisenbarth, and Berk Sunar,
Undermining User Privacy on Mobile Devices Using AI, in Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2019. pp. 214-227.
DOI:10.1145/3321705.3329804
Datei: 3321705.3329804
Berk Gulmezoglu, Ahmad Moghimi, Thomas Eisenbarth, and Berk Sunar,
FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning, arXiv e-prints , 2019.
Datei: 2019arXiv190703651G
David Sommer, Sebastian Meiser, and Esfandiar Mohammadi,
Privacy Loss Classes: The Central Limit Theorem in Differential Privacy, Proceedings on Privacy Enhancing Technologies , vol. 2019, no. 2, pp. 245 - 269, 2019. Sciendo.
DOI:https://doi.org/10.2478/popets-2019-0029
Datei: article-p245.xml
David Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, and Srdjan Capkun,
Deniable Upload and Download via Passive Participation, in 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) , Boston, MA: USENIX Association, 2019. pp. 649--666.
ISBN:978-1-931971-49-2
Datei: sommer
Damien Desfontaines, Elisabeth Krahmer, and Esfandiar Mohammadi,
Passive and active attackers in noiseless privacy, CoRR , vol. abs/1905.00650, 2019.
Datei: 1905.00650

2018

Ahmad Moghimi, Jan Wichelmann, Thomas Eisenbarth, and Berk Sunar,
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations, International Journal of Parallel Programming , 2018.
Datei: s10766-018-0611-9
Marc Stelzner, and Thomas Eisenbarth,
IT Security in Lübeck - The design of a modern and future-proof security curriculum, in 2018 12th European Workshop on Microelectronics Education (EWME) , 2018. pp. 79-82.
DOI:10.1109/EWME.2018.8629494
Datei: 8629494
Jan Wichelmann, Ahmad Moghimi, Thomas Eisenbarth, and Berk Sunar,
MicroWalk: A Framework for Finding Side Channels in Binaries, in Proceedings of the 34th Annual Computer Security Applications Conference , New York, NY, USA: ACM, 2018. pp. 161--173.
DOI:10.1145/3274694.3274741
Datei: 3274694.3274741
Gorka Irazoqui, Thomas Eisenbarth, and Berk Sunar,
MASCAT: Preventing Microarchitectural Attacks Before Distribution, in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018 , 2018. pp. 377--388.
DOI:10.1145/3176258.3176316
Datei: 3176258.3176316
Elke De Mulder, Thomas Eisenbarth, and Patrick Schaumont,
Identifying and Eliminating Side-Channel Leaks in Programmable Systems, IEEE Design Test , vol. 35, no. 1, pp. 74-89, 2018.
DOI:10.1109/MDAT.2017.2766166