Präsentationen und Vorträge

Präsentationen und Vorträge sind auf unserem Youtube-Kanal zusammengestellt.

Publikationen

2024

Max Schulze, Yorck Zisgen, Moritz Kirschte, Esfandiar Mohammadi, and Agnes Koschmider,
Differentially Private Inductive Miner, in 2024 6th International Conference on Process Mining (ICPM) , Curran Associates, Sep.2024.
DOI:10.1109/ICPM63005.2024.10680684
ISBN:979-8-3503-6503-0
Datei: 10680684
Debopriya Roy Dipta, Thore Tiemann, Berk Gulmezoglu, Eduard Marin, and Thomas Eisenbarth,
Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments, in 9th IEEE European Symposium on Security and Privacy, EuroS&P 2024 , IEEE, 2024. pp. 327-344.
DOI:10.1109/EUROSP60621.2024.00025
Datei: arXiv.2404.10715
Bibtex: BibTeX
@inproceedings{DBLP:conf/eurosp/DiptaTGME24,
  author       = {Debopriya Roy Dipta and
                  Thore Tiemann and
                  Berk G{\"{u}}lmezoglu and
                  Eduard Marin and
                  Thomas Eisenbarth},
  title        = {Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox
                  Environments},
  booktitle    = {9th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2024, Vienna, Austria, July 8-12, 2024},
  pages        = {327--344},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/EuroSP60621.2024.00025},
  doi          = {10.1109/EUROSP60621.2024.00025}
}
Marcel Gehrke, Johannes Liebenow, Esfandiar Mohammadi, and Tanya Braun,
Lifting in Support of Privacy-Preserving Probabilistic Inference, KI - Künstliche Intelligenz , vol. 1610-1987, 2024.
DOI:https://doi.org/10.1007/s13218-024-00851-y
Datei: s13218-024-00851-y
Thore Tiemann, Zane Weissman, Thomas Eisenbarth, and Berk Sunar,
Microarchitectural Vulnerabilities Introduced, Exploited, and Accelerated by Heterogeneous FPGA-CPU Platforms, in Security of FPGA-Accelerated Cloud Computing Environments , Szefer, Jakub and Tessier, Russell, Eds. Cham: Springer International Publishing, 2024, pp. 203-237.
DOI:10.1007/978-3-031-45395-3_8
ISBN:978-3-031-45395-3
Bibtex: BibTeX
@inbook{tiemann2024fpgaplatform,
  author      = {Tiemann, Thore
                  and Weissman, Zane
                  and Eisenbarth, Thomas
                  and Sunar, Berk},
  editor      = {Szefer, Jakub
                  and Tessier, Russell},
  title       = {Microarchitectural Vulnerabilities Introduced, 
                  Exploited, and Accelerated by Heterogeneous 
                  {FPGA-CPU} Platforms},
  bookTitle   = {Security of FPGA-Accelerated Cloud Computing 
                  Environments},
  year        = {2024},
  publisher   = {Springer International Publishing},
  pages       = {203--237},
  isbn        = {978-3-031-45395-3},
  doi         = {10.1007/978-3-031-45395-3_8},
  url         = {https://doi.org/10.1007/978-3-031-45395-3_8},
}
Jan Wichelmann, Anja Rabich, Anna Pätschke, and Thomas Eisenbarth,
Obelix: Mitigating Side-Channels Through Dynamic Obfuscation, in 2024 IEEE Symposium on Security and Privacy (S&P) , San Francisco, CA, USA: IEEE, 2024.
DOI:10.1109/SP54263.2024.00261
Weblink: https://www.computer.org/csdl/proceedings-article/sp/2024/313000a189/1WPcYic94rK
Paula Arnold, Sebastian Berndt, Thomas Eisenbarth, and Maximilian Orlt,
Polynomial sharings on two secrets: Buy one, get one free, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 671–706.
DOI:10.46586/tches.v2024.i3.671-706
Datei: 11691
Johannes Liebenow, Timothy Imort, Yannick Fuchs, Marcel Heisel, Nadja Käding, Jan Rupp, and Esfandiar Mohammadi,
PrivAgE: A Toolchain for Privacy-Preserving Distributed Aggregation on Edge-Devices, KI - Künstliche Intelligenz , vol. 1610-1987, 2024.
DOI:https://doi.org/10.1007/s13218-023-00823-8
Datei: s13218-023-00823-8
Thorsten Peinemann, Moritz Kirschte, Joshua Stock, Carlos Cotrini, and Esfandiar Mohammadi,
S-BDT: Distributed Differentially Private Boosted Decision Trees, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, October 14-18, 2024 , 2024.
DOI:10.48550/arXiv.2309.12041
Datei: 2309.12041
Luca Wilke, Jan Wichelmann, Anja Rabich, and Thomas Eisenbarth,
SEV-Step: A Single-Stepping Framework for AMD-SEV, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 180-206.
DOI:10.46586/tches.v2024.i1.180-206
Datei: 10792
Nils Loose, Felix Mächtle, Florian Sieck, and Thomas Eisenbarth,
SWAT: Modular Dynamic Symbolic Execution for Java Applications using Dynamic Instrumentation (Competition Contribution), in Tools and Algorithms for the Construction and Analysis of Systems - 30th International Conference, TACAS 2024, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024, Luxembourg City, Luxembourg, April 6-11, 2024, Proceedings, Part III , Bernd Finkbeiner and Laura Kovács, Eds. Springer, 2024. pp. 399--405.
DOI:10.1007/978-3-031-57256-2_28
Datei: 978-3-031-57256-2_28
Johannes Liebenow, Yara Schütt, Tanya Braun, Marcel Gehrke, Florian Thaeter, and Esfandiar Mohammadi,
DPM: Clustering Sensitive Data through Separation, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, CCS 2024 , ACM, 2024.
DOI:10.48550/arXiv.2307.02969
Datei: arXiv.2307.02969

2023

Florian Sieck, Zhiyuan Zhang, Sebastian Berndt, Chitchanok Chuengsatiansup, Thomas Eisenbarth, and Yuval Yarom,
TeeJam: Sub-Cache-Line Leakages Strike Back, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , Dez.2023. pp. 457 - 500.
DOI:10.46586/tches.v2024.i1.457-500
Weblink: https://tches.iacr.org/index.php/TCHES/article/view/11259
Bibtex: BibTeX
@article{Sieck_Zhang_Berndt_Chuengsatiansup_Eisenbarth_Yarom_2023, 
title={TeeJam: Sub-Cache-Line Leakages Strike Back}, 
volume={2024}, 
url={https://tches.iacr.org/index.php/TCHES/article/view/11259}, 
DOI={10.46586/tches.v2024.i1.457-500}, 
number={1}, 
journal={IACR Transactions on Cryptographic Hardware and Embedded Systems}, 
author={Sieck, Florian and Zhang, Zhiyuan and Berndt, Sebastian and Chuengsatiansup, Chitchanok and Eisenbarth, Thomas and Yarom, Yuval}, 
year={2023}, 
month={Dec.}, 
pages={457–500} 
}
Andrija Neskovic, Saleh Mulhem, Alexander Treff, Rainer Buchty, Thomas Eisenbarth, and Mladen Berekovic,
SystemC Model of Power Side-Channel Attacks Against AI Accelerators: Superstition or not?, in ICCAD '23: Proceedings of the 42nd IEEE/ACM International Conference on Computer-Aided Design , IEEE/ACM, Nov.2023.
DOI:10.48550/arXiv.2311.13387
Weblink: https://arxiv.org/abs/2311.13387
Philipp Schmitz, Tobias Jauch, Alex Wezel, Mohammad R. Fadiheh, Thore Tiemann, Jonah Heller, Thomas Eisenbarth, Dominik Stoffel, and Wolfgang Kunz,
Okapi: A Lightweight Architecture for Secure Speculation Exploiting Locality of Memory Accesses, 2023.
Weblink: https://arxiv.org/abs/2312.08156
Bibtex: BibTeX
@misc{schmitz2023okapi,
  author        = {Philipp Schmitz and
                   Tobias Jauch and
                   Alex Wezel and
                   Mohammad R. Fadiheh and
                   Thore Tiemann and
                   Jonah Heller and
                   Thomas Eisenbarth and
                   Dominik Stoffel and
                   Wolfgang Kunz},
  title         = {Okapi: A Lightweight Architecture for Secure
                   Speculation Exploiting Locality of Memory Accesses}, 
  year          = {2023},
  eprint        = {2312.08156},
  archivePrefix = {arXiv},
  primaryClass  = {cs.CR},
  url           = {https://doi.org/10.48550/arXiv.2312.08156},
  doi           = {10.48550/arXiv.2312.08156},
}
Pascal Bemmann, Sebastian Berndt, Denis Diemert, Thomas Eisenbarth, and Tibor Jager,
Subversion-Resilient Authenticated Encryption Without Random Oracles, in Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part II , Mehdi Tibouchi and Xiaofeng Wang, Eds. Springer, 2023. pp. 460--483.
DOI:10.1007/978-3-031-33491-7\_17
Datei: 978-3-031-33491-7\_17
Claudius Pott, Berk Gulmezoglu, and Thomas Eisenbarth,
Overcoming the Pitfalls of HPC-based Cryptojacking Detection in Presence of GPUs, in Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2023, Charlotte, NC, USA, April 24-26, 2023 , Mohamed Shehab and Maribel Fernandez and Ninghui Li, Eds. {ACM}, 2023. pp. 177--188.
DOI:10.1145/3577923.3583655
Datei: 3577923.3583655
Jan Wichelmann, Christopher Peredy, Florian Sieck, Anna Pätschke, and Thomas Eisenbarth,
MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V, in Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) - 20th International Conference , Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati, Eds. Springer, 2023. pp. 3-23.
DOI:10.1007/978-3-031-35504-2_1
Weblink: https://arxiv.org/abs/2305.00584
Nils Loose, Felix Mächtle, Claudius Pott, Volodymyr Bezsmertnyi, and Thomas Eisenbarth,
Madvex: Instrumentation-based Adversarial Attacks on Machine Learning Malware Detection, in Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) - 20th International Conference , Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati, Eds. Springer, 2023. pp. 69-88.
DOI:10.1007/978-3-031-35504-2_4
Weblink: https://arxiv.org/abs/2305.02559
Thore Tiemann, Zane Weissman, Thomas Eisenbarth, and Berk Sunar,
IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems, in Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2023 , Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik, Eds. ACM, 2023. pp. 827-840.
DOI:10.1145/3579856.3582838
Weblink: https://arxiv.org/abs/2202.11623
Datei: Dateilink
Bibtex: BibTeX
@inproceedings{tiemann2023iotlbsc,
  author       = {Thore Tiemann and
                  Zane Weissman and
                  Thomas Eisenbarth and
                  Berk Sunar},
  editor       = {Joseph K. Liu and
                  Yang Xiang and
                  Surya Nepal and
                  Gene Tsudik},
  title        = {{IOTLB-SC:} An Accelerator-Independent Leakage Source in Modern Cloud
                  Systems},
  booktitle    = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
                  2023},
  pages        = {827--840},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579856.3582838},
  doi          = {10.1145/3579856.3582838}
}
Sebastian Berndt, Thomas Eisenbarth, Sebastian Faust, Marc Gourjon, Maximilian Orlt, and Okan Seker,
Combined Fault and Leakage Resilience: Composability, Constructions and Compiler, in Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part III , Helena Handschuh and Anna Lysyanskaya, Eds. Cham: Springer, 2023. pp. 377--409.
DOI:10.1007/978-3-031-38548-3\_13
ISBN:978-3-031-38548-3
Datei: 978-3-031-38548-3\_13
Jan Wichelmann, Anna Pätschke, Luca Wilke, and Thomas Eisenbarth,
Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software, in 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023 , Joseph A. Calandrino and Carmela Troncoso, Eds. USENIX Association, 2023.
DOI:10.48550/arXiv.2210.13124
Datei: wichelmann
Thore Tiemann, Sebastian Berndt, Thomas Eisenbarth, and Maciej Liskiewicz,
"Act natural!": Exchanging Private Messages on Public Blockchains, in 8th IEEE European Symposium on Security and Privacy, EuroS&P 2023 , IEEE, 2023. pp. 292-308.
DOI:10.1109/EuroSP57164.2023.00026
Weblink: https://eprint.iacr.org/2021/1073
Weblink: https://doi.ieeecomputersociety.org/10.1109/EuroSP57164.2023.00026
Datei: Dateilink
Bibtex: BibTeX
@inproceedings{tiemann2023actnatural,
  author       = {Thore Tiemann and
                  Sebastian Berndt and
                  Thomas Eisenbarth and
                  Maciej Liskiewicz},
  title        = {"Act natural!": Exchanging Private Messages on Public Blockchains},
  booktitle    = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023, Delft, Netherlands, July 3-7, 2023},
  pages        = {292--308},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSP57164.2023.00026},
  doi          = {10.1109/EUROSP57164.2023.00026}
}

2022

Moritz Kirschte, Sebastian Meiser, Saman Ardalan, and Esfandiar Mohammadi,
Distributed DP-Helmet: Scalable Differentially Private Non-interactive Averaging of Single Layers, arXiv , Nov. 2022.
DOI:10.48550/arXiv.2211.02003
Datei: 2211.02003
Mengyuan Li, Luca Wilke, Jan Wichelmann, Thomas Eisenbarth, Radu Teodorescu, and Yinqian Zhang,
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP, in 2022 IEEE Symposium on Security and Privacy (SP) , San Francisco, CA, USA: IEEE, 2022. pp. 337-351.
DOI:10.1109/SP46214.2022.9833768
Datei: SP46214.2022.9833768
Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving, and Thomas Eisenbarth,
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols, in Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security , ACM, 2022. pp. 712-726.
DOI:10.1145/3488932.3517387
ISBN:9781450391405
Datei: 3488932.3517387