Präsentationen und Vorträge
Präsentationen und Vorträge sind auf unserem Youtube-Kanal zusammengestellt.
Publikationen
2023
Jan
Wichelmann,
Anna
Pätschke,
Luca
Wilke, and
Thomas
Eisenbarth,
Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software, in 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023 , Joseph A. Calandrino and Carmela Troncoso, Eds. USENIX Association, 2023. pp. 6789-6806.
Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software, in 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023 , Joseph A. Calandrino and Carmela Troncoso, Eds. USENIX Association, 2023. pp. 6789-6806.
DOI: | 10.48550/arXiv.2210.13124 |
Datei: | wichelmann |
Sebastian
Berndt,
Thomas
Eisenbarth,
Sebastian
Faust,
Marc
Gourjon,
Maximilian
Orlt, and
Okan
Seker,
Combined Fault and Leakage Resilience: Composability, Constructions and Compiler, in Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part III , Helena Handschuh and Anna Lysyanskaya, Eds. Cham: Springer, 2023. pp. 377-409.
Combined Fault and Leakage Resilience: Composability, Constructions and Compiler, in Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part III , Helena Handschuh and Anna Lysyanskaya, Eds. Cham: Springer, 2023. pp. 377-409.
DOI: | 10.1007/978-3-031-38548-3_13 |
ISBN: | 978-3-031-38548-3 |
Datei: | 978-3-031-38548-3_13 |
Nils
Loose,
Felix
Mächtle,
Claudius
Pott,
Volodymyr
Bezsmertnyi, and
Thomas
Eisenbarth,
Madvex: Instrumentation-based Adversarial Attacks on Machine Learning Malware Detection, in Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) - 20th International Conference , Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati, Eds. Springer, 2023. pp. 69-88.
Madvex: Instrumentation-based Adversarial Attacks on Machine Learning Malware Detection, in Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) - 20th International Conference , Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati, Eds. Springer, 2023. pp. 69-88.
DOI: | 10.1007/978-3-031-35504-2_4 |
Weblink: | https://arxiv.org/abs/2305.02559 |
Jan
Wichelmann,
Christopher
Peredy,
Florian
Sieck,
Anna
Pätschke, and
Thomas
Eisenbarth,
MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V, in Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) - 20th International Conference , Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati, Eds. Springer, 2023. pp. 3-23.
MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V, in Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) - 20th International Conference , Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati, Eds. Springer, 2023. pp. 3-23.
DOI: | 10.1007/978-3-031-35504-2_1 |
Weblink: | https://arxiv.org/abs/2305.00584 |
Philipp
Schmitz,
Tobias
Jauch,
Alex
Wezel,
Mohammad R.
Fadiheh,
Thore
Tiemann,
Jonah
Heller,
Thomas
Eisenbarth,
Dominik
Stoffel, and
Wolfgang
Kunz,
Okapi: A Lightweight Architecture for Secure Speculation Exploiting Locality of Memory Accesses, 2023.
Okapi: A Lightweight Architecture for Secure Speculation Exploiting Locality of Memory Accesses, 2023.
Weblink: | https://arxiv.org/abs/2312.08156 |
Bibtex: | ![]() @misc{schmitz2023okapi, author = {Philipp Schmitz and Tobias Jauch and Alex Wezel and Mohammad R. Fadiheh and Thore Tiemann and Jonah Heller and Thomas Eisenbarth and Dominik Stoffel and Wolfgang Kunz}, title = {Okapi: A Lightweight Architecture for Secure Speculation Exploiting Locality of Memory Accesses}, year = {2023}, eprint = {2312.08156}, archivePrefix = {arXiv}, primaryClass = {cs.CR}, url = {https://doi.org/10.48550/arXiv.2312.08156}, doi = {10.48550/arXiv.2312.08156}, } |
Claudius
Pott,
Berk
Gulmezoglu, and
Thomas
Eisenbarth,
Overcoming the Pitfalls of HPC-based Cryptojacking Detection in Presence of GPUs, in Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2023, Charlotte, NC, USA, April 24-26, 2023 , Mohamed Shehab and Maribel Fernandez and Ninghui Li, Eds. ACM, 2023. pp. 177-188.
Overcoming the Pitfalls of HPC-based Cryptojacking Detection in Presence of GPUs, in Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2023, Charlotte, NC, USA, April 24-26, 2023 , Mohamed Shehab and Maribel Fernandez and Ninghui Li, Eds. ACM, 2023. pp. 177-188.
DOI: | 10.1145/3577923.3583655 |
Datei: | 3577923.3583655 |
Pascal
Bemmann,
Sebastian
Berndt,
Denis
Diemert,
Thomas
Eisenbarth, and
Tibor
Jager,
Subversion-Resilient Authenticated Encryption Without Random Oracles, in Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part II , Mehdi Tibouchi and Xiaofeng Wang, Eds. Springer, 2023. pp. 460-483.
Subversion-Resilient Authenticated Encryption Without Random Oracles, in Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part II , Mehdi Tibouchi and Xiaofeng Wang, Eds. Springer, 2023. pp. 460-483.
DOI: | 10.1007/978-3-031-33491-7_17 |
Datei: | 978-3-031-33491-7_17 |
2022
Moritz
Kirschte,
Sebastian
Meiser,
Saman
Ardalan, and
Esfandiar
Mohammadi,
Distributed DP-Helmet: Scalable Differentially Private Non-interactive Averaging of Single Layers, arXiv , Nov. 2022.
Distributed DP-Helmet: Scalable Differentially Private Non-interactive Averaging of Single Layers, arXiv , Nov. 2022.
DOI: | 10.48550/arXiv.2211.02003 |
Datei: | 2211.02003 |
Mengyuan
Li,
Luca
Wilke,
Jan
Wichelmann,
Thomas
Eisenbarth,
Radu
Teodorescu, and
Yinqian
Zhang,
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP, in 2022 IEEE Symposium on Security and Privacy (SP) , San Francisco, CA, USA: IEEE, Mai2022. pp. 337-351.
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP, in 2022 IEEE Symposium on Security and Privacy (SP) , San Francisco, CA, USA: IEEE, Mai2022. pp. 337-351.
DOI: | 10.1109/SP46214.2022.9833768 |
Weblink: | https://doi.ieeecomputersociety.org/10.1109/SP46214.2022.9833768 |
Sebastian
Berndt,
Jan
Wichelmann,
Claudius
Pott,
Tim-Henrik
Traving, and
Thomas
Eisenbarth,
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols, in Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security , ACM, 2022. pp. 712-726.
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols, in Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security , ACM, 2022. pp. 712-726.
DOI: | 10.1145/3488932.3517387 |
ISBN: | 9781450391405 |
Datei: | 3488932.3517387 |
Jan
Wichelmann,
Florian
Sieck,
Anna
Pätschke, and
Thomas
Eisenbarth,
Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications, in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022 , Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi, Eds. ACM, 2022. pp. 2915-2929.
Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications, in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022 , Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi, Eds. ACM, 2022. pp. 2915-2929.
DOI: | 10.1145/3548606.3560654 |
Datei: | 3548606.3560654 |
2021
Diego F.
Aranha,
Sebastian
Berndt,
Thomas
Eisenbarth,
Okan
Seker,
Akira
Takahashi,
Luca
Wilke, and
Greg
Zaverucha,
Side-Channel Protections for Picnic Signatures, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 4, pp. 239-282, Aug. 2021.
Side-Channel Protections for Picnic Signatures, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 4, pp. 239-282, Aug. 2021.
DOI: | 10.46586/tches.v2021.i4.239-282 |
Datei: | 9066 |
Claudius
Pott,
Philipp
Jungklass,
David Jacek
Csejka,
Thomas
Eisenbarth, and
Marco
Siebert,
Firmware Security Module: A Framework for Trusted Computing in Automotive Multiprocessors, Journal of Hardware and Systems Security , pp. 103-113, Apr. 2021.
Firmware Security Module: A Framework for Trusted Computing in Automotive Multiprocessors, Journal of Hardware and Systems Security , pp. 103-113, Apr. 2021.
DOI: | 10.1007/s41635-021-00114-4 |
Datei: | s41635-021-00114-4 |
Okan
Seker,
Thomas
Eisenbarth, and
Maciej
Liskiewicz,
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 2, pp. 61-105, Feb. 2021. Cryptology ePrint Archive, Report 2020/443.
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 2, pp. 61-105, Feb. 2021. Cryptology ePrint Archive, Report 2020/443.
DOI: | 10.46586/tches.v2021.i2.61-105 |
Datei: | 8788 |
Johannes
Müller,
Mohammad Rahmani
Fadiheh,
Anna Lena
Duque Antón,
Thomas
Eisenbarth,
Dominik
Stoffel, and
Wolfgang
Kunz,
A Formal Approach to Confidentiality Verification in SoCs at the Register Transfer Level, in 58th ACM/IEEE Design Automation Conference, DAC 2021, San Francisco, CA, USA, December 5-9, 2021 , IEEE, 2021. pp. 991-996.
A Formal Approach to Confidentiality Verification in SoCs at the Register Transfer Level, in 58th ACM/IEEE Design Automation Conference, DAC 2021, San Francisco, CA, USA, December 5-9, 2021 , IEEE, 2021. pp. 991-996.
DOI: | 10.1109/DAC18074.2021.9586248 |
Datei: | DAC18074.2021.9586248 |
Samira
Briongos,
Ida
Bruhns,
Pedro
Malagón,
Thomas
Eisenbarth, and
José Manuel
Moya,
Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged Cache Attacks, in IEEE European Symposium on Security and Privacy, EuroS&P 2021 , IEEE, 2021. pp. 683-700.
Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged Cache Attacks, in IEEE European Symposium on Security and Privacy, EuroS&P 2021 , IEEE, 2021. pp. 683-700.
DOI: | 10.1109/EuroSP51992.2021.00051 |
Weblink: | https://doi.ieeecomputersociety.org/10.1109/EuroSP51992.2021.00051 |
Tim
Gellersen,
Okan
Seker, and
Thomas
Eisenbarth,
Differential Power Analysis of the Picnic Signature Scheme, in Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings , Jung Hee Cheon and Jean-Pierre Tillich, Eds. Springer, 2021. pp. 177-194.
Differential Power Analysis of the Picnic Signature Scheme, in Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings , Jung Hee Cheon and Jean-Pierre Tillich, Eds. Springer, 2021. pp. 177-194.
DOI: | 10.1007/978-3-030-81293-5_10 |
Datei: | 978-3-030-81293-5_10 |
Debajyoti
Das,
Sebastian
Meiser,
Esfandiar
Mohammadi, and
Aniket
Kate,
Divide and Funnel: a Scaling Technique for Mix-Networks, IACR Cryptol. ePrint Arch. , pp. 1685, 2021.
Divide and Funnel: a Scaling Technique for Mix-Networks, IACR Cryptol. ePrint Arch. , pp. 1685, 2021.
Datei: | 1685 |
Jan
Wichelmann,
Sebastian
Berndt,
Claudius
Pott, and
Thomas
Eisenbarth,
Help, My Signal has Bad Device! - Breaking the Signal Messenger's Post-Compromise Security Through a Malicious Device, in Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings , Leyla Bilge and Lorenzo Cavallaro and Giancarlo Pellegrino and Nuno Neves, Eds. Springer, 2021. pp. 88-105.
Help, My Signal has Bad Device! - Breaking the Signal Messenger's Post-Compromise Security Through a Malicious Device, in Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings , Leyla Bilge and Lorenzo Cavallaro and Giancarlo Pellegrino and Nuno Neves, Eds. Springer, 2021. pp. 88-105.
DOI: | 10.1007/978-3-030-80825-9_5 |
Datei: | 978-3-030-80825-9_5 |
David M.
Sommer,
Lukas
Abfalterer,
Sheila
Zingg, and
Esfandiar
Mohammadi,
Learning Numeric Optimal Differentially Private Truncated Additive Mechanisms, CoRR , vol. abs/2107.12957, 2021.
Learning Numeric Optimal Differentially Private Truncated Additive Mechanisms, CoRR , vol. abs/2107.12957, 2021.
Datei: | 2107.12957 |
Sebastian
Berndt,
Max A.
Deppert,
Klaus
Jansen, and
Lars
Rohwedder,
Load Balancing: The Long Road from Theory to Practice, CoRR , vol. abs/2107.13638, 2021.
Load Balancing: The Long Road from Theory to Practice, CoRR , vol. abs/2107.13638, 2021.
Datei: | 2107.13638 |
Ilia
Polian,
Frank
Altmann,
Tolga
Arul,
Christian
Boit,
Ralf
Brederlow,
Lucas
Davi,
Rolf
Drechsler,
Nan
Du,
Thomas
Eisenbarth,
Tim
Güneysu,
Sascha
Hermann,
Matthias
Hiller,
Rainer
Leupers,
Farhad
Merchant,
Thomas
Mussenbrock,
Stefan
Katzenbeisser,
Akash
Kumar,
Wolfgang
Kunz,
Thomas
Mikolajick,
Vivek
Pachauri,
Jean-Pierre
Seifert,
Frank
Sill Torres, and
Jens
Trommer,
Nano Security: From Nano-Electronics to Secure Systems, in Design, Automation & Test in Europe Conference & Exhibition, DATE 2021, Grenoble, France, February 1-5, 2021 , IEEE, 2021. pp. 1334-1339.
Nano Security: From Nano-Electronics to Secure Systems, in Design, Automation & Test in Europe Conference & Exhibition, DATE 2021, Grenoble, France, February 1-5, 2021 , IEEE, 2021. pp. 1334-1339.
DOI: | 10.23919/DATE51398.2021.9474187 |
Sebastian
Berndt,
Klaus
Jansen, and
Kim{-}Manuel
Klein,
New Bounds for the Vertices of the Integer Hull, in 4th Symposium on Simplicity in Algorithms, {SOSA} 2021, Virtual Conference, January 11-12, 2021 , Hung Viet Le and Valerie King, Eds. {SIAM}, 2021. pp. 25--36.
New Bounds for the Vertices of the Integer Hull, in 4th Symposium on Simplicity in Algorithms, {SOSA} 2021, Virtual Conference, January 11-12, 2021 , Hung Viet Le and Valerie King, Eds. {SIAM}, 2021. pp. 25--36.
DOI: | 10.1137/1.9781611976496.3 |
Datei: | 1.9781611976496.3 |
Eike
Petersen,
Yannik
Potdevin,
Esfandiar
Mohammadi,
Stephan
Zidowitz,
Sabrina
Breyer,
Dirk
Nowotka,
Sandra
Henn,
Ludwig
Pechmann,
Martin
Leucker,
Philipp
Rostalski, and
Christian
Herzog,
Responsible and Regulatory Conform Machine Learning for Medicine: A Survey of Technical Challenges and Solutions, CoRR , vol. abs/2107.09546, 2021.
Responsible and Regulatory Conform Machine Learning for Medicine: A Survey of Technical Challenges and Solutions, CoRR , vol. abs/2107.09546, 2021.
Datei: | 2107.09546 |
Sebastian
Berndt,
Kilian
Grage,
Klaus
Jansen,
Lukas
Johannsen, and
Maria
Kosche,
Robust Online Algorithms for Dynamic Choosing Problems, in Connecting with Computability - 17th Conference on Computability in Europe, CiE 2021, Virtual Event, Ghent, July 5-9, 2021, Proceedings , Liesbeth De Mol and Andreas Weiermann and Florin Manea and David Fern{\'{a}}ndez{-}Duque, Eds. Springer, 2021. pp. 38--49.
Robust Online Algorithms for Dynamic Choosing Problems, in Connecting with Computability - 17th Conference on Computability in Europe, CiE 2021, Virtual Event, Ghent, July 5-9, 2021, Proceedings , Liesbeth De Mol and Andreas Weiermann and Florin Manea and David Fern{\'{a}}ndez{-}Duque, Eds. Springer, 2021. pp. 38--49.
DOI: | 10.1007/978-3-030-80049-9_4 |
Datei: | 978-3-030-80049-9_4 |

- Forschung
- Publikationen
- Dissertationen
- Tools
- Seminar
- Projekte