Prof. Dr.-Ing. Thomas Eisenbarth

Photo of Thomas  Eisenbarth

Institutsdirektor


Ratzeburger Allee 160
23562 Lübeck
Gebäude 64, 1. OG, Raum 043

Email: thomas.eisenbarth(at)uni-luebeck.de
Phone: +49 451 3101 6600
Fax: +49 451 3101 6604

Kurzbiographie

Thomas Eisenbarth ist Professor für IT Sicherheit an der Universität zu Lübeck. Er studierte bis 2006 Elektro- und Informationstechnik an der Ruhr Universität Bochum, wo er bis 2009 am Horst Görtz Institut für IT-Sicherheit promovierte. Ab 2010 forschte er als Assistant Professor am Center for Cryptography and Information Security (CCIS) an der Florida Atlantic University. 2012 wechselte er an das Worcester Polytechnic Institute (WPI). Seit August 2017 ist er als Direktor des Instituts für IT Sicherheit an der Universität zu Lübeck.
Seit Okrober 2024 bin ich der Vorsitzende der MINT Sektionen.

Seine Forschungsinteressen umfassen:

  • Systemsicherheit , Softwaresicherheit und Code-Analyse
  • Angewandte Kryptografie
  • Sichere Vortualisierung, Mikroarchitekturen und Trusted Execution Envorinments
  • Seitenkanalangriffe, physische Sicherheit und Gegenmaßnahmen

Publikationen

2023

Thore Tiemann, Sebastian Berndt, Thomas Eisenbarth, and Maciej Liskiewicz,
"Act natural!": Exchanging Private Messages on Public Blockchains, in 8th IEEE European Symposium on Security and Privacy, EuroS&P 2023 , IEEE, 2023. pp. 292-308.
DOI:10.1109/EuroSP57164.2023.00026
Weblink: https://doi.ieeecomputersociety.org/10.1109/EuroSP57164.2023.00026
Weblink: https://eprint.iacr.org/2021/1073
Datei: Dateilink
Bibtex: BibTeX
@inproceedings{tiemann2023actnatural,
  author       = {Thore Tiemann and
                  Sebastian Berndt and
                  Thomas Eisenbarth and
                  Maciej Liskiewicz},
  title        = {"Act natural!": Exchanging Private Messages on Public Blockchains},
  booktitle    = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023, Delft, Netherlands, July 3-7, 2023},
  pages        = {292--308},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSP57164.2023.00026},
  doi          = {10.1109/EUROSP57164.2023.00026}
}

2022

Mengyuan Li, Luca Wilke, Jan Wichelmann, Thomas Eisenbarth, Radu Teodorescu, and Yinqian Zhang,
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP, in 2022 IEEE Symposium on Security and Privacy (SP) , San Francisco, CA, USA: IEEE, 2022. pp. 337-351.
DOI:10.1109/SP46214.2022.9833768
Weblink: https://doi.ieeecomputersociety.org/10.1109/SP46214.2022.9833768
Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving, and Thomas Eisenbarth,
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols, in Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security , ACM, 2022. pp. 712-726.
DOI:10.1145/3488932.3517387
ISBN:9781450391405
Datei: 3488932.3517387
Jan Wichelmann, Florian Sieck, Anna Pätschke, and Thomas Eisenbarth,
Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications, in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022 , Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi, Eds. ACM, 2022. pp. 2915-2929.
DOI:10.1145/3548606.3560654
Datei: 3548606.3560654

2021

Ilia Polian, Frank Altmann, Tolga Arul, Christian Boit, Ralf Brederlow, Lucas Davi, Rolf Drechsler, Nan Du, Thomas Eisenbarth, Tim Güneysu, Sascha Hermann, Matthias Hiller, Rainer Leupers, Farhad Merchant, Thomas Mussenbrock, Stefan Katzenbeisser, Akash Kumar, Wolfgang Kunz, Thomas Mikolajick, Vivek Pachauri, Jean-Pierre Seifert, Frank Sill Torres, and Jens Trommer,
Nano Security: From Nano-Electronics to Secure Systems, in Design, Automation & Test in Europe Conference & Exhibition, DATE 2021, Grenoble, France, February 1-5, 2021 , IEEE, 2021. pp. 1334-1339.
DOI:10.23919/DATE51398.2021.9474187
Florian Sieck, Sebastian Berndt, Jan Wichelmann, and Thomas Eisenbarth,
Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries, in CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security , Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi, Eds. ACM, 2021. pp. 2456-2473.
DOI:10.1145/3460120.3484783
Datei: 3460120.3484783
Luca Wilke, Jan Wichelmann, Florian Sieck, and Thomas Eisenbarth,
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation, in 2021 IEEE Security and Privacy Workshops (SPW) , 2021. pp. 456-466.
DOI:10.1109/SPW53761.2021.00064
Weblink: https://doi.ieeecomputersociety.org/10.1109/SPW53761.2021.00064
Datei:
Diego F. Aranha, Sebastian Berndt, Thomas Eisenbarth, Okan Seker, Akira Takahashi, Luca Wilke, and Greg Zaverucha,
Side-Channel Protections for Picnic Signatures, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 4, pp. 239-282, 2021.
DOI:10.46586/tches.v2021.i4.239-282
Datei: 9066
Okan Seker, Thomas Eisenbarth, and Maciej Liskiewicz,
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 2, pp. 61-105, 2021. Cryptology ePrint Archive, Report 2020/443.
DOI:10.46586/tches.v2021.i2.61-105
Datei: 8788
Jan Wichelmann, Sebastian Berndt, Claudius Pott, and Thomas Eisenbarth,
Help, My Signal has Bad Device! - Breaking the Signal Messenger's Post-Compromise Security Through a Malicious Device, in Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings , Leyla Bilge and Lorenzo Cavallaro and Giancarlo Pellegrino and Nuno Neves, Eds. Springer, 2021. pp. 88-105.
DOI:10.1007/978-3-030-80825-9_5
Datei: 978-3-030-80825-9_5
Claudius Pott, Philipp Jungklass, David Jacek Csejka, Thomas Eisenbarth, and Marco Siebert,
Firmware Security Module: A Framework for Trusted Computing in Automotive Multiprocessors, Journal of Hardware and Systems Security , pp. 103-113, 2021.
DOI:10.1007/s41635-021-00114-4
Datei: s41635-021-00114-4
Tim Gellersen, Okan Seker, and Thomas Eisenbarth,
Differential Power Analysis of the Picnic Signature Scheme, in Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings , Jung Hee Cheon and Jean-Pierre Tillich, Eds. Springer, 2021. pp. 177-194.
DOI:10.1007/978-3-030-81293-5_10
Datei: 978-3-030-81293-5_10
Samira Briongos, Ida Bruhns, Pedro Malagón, Thomas Eisenbarth, and José Manuel Moya,
Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged Cache Attacks, in IEEE European Symposium on Security and Privacy, EuroS&P 2021 , IEEE, 2021. pp. 683-700.
DOI:10.1109/EuroSP51992.2021.00051
Weblink: https://doi.ieeecomputersociety.org/10.1109/EuroSP51992.2021.00051
Johannes Müller, Mohammad Rahmani Fadiheh, Anna Lena Duque Antón, Thomas Eisenbarth, Dominik Stoffel, and Wolfgang Kunz,
A Formal Approach to Confidentiality Verification in SoCs at the Register Transfer Level, in 58th ACM/IEEE Design Automation Conference, DAC 2021, San Francisco, CA, USA, December 5-9, 2021 , IEEE, 2021. pp. 991-996.
DOI:10.1109/DAC18074.2021.9586248
Datei: DAC18074.2021.9586248

2020

Zane Weissman, Thore Tiemann, Daniel Moghimi, Evan Custodio, Thomas Eisenbarth, and Berk Sunar,
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2020, no. 3, pp. 169-195, 2020.
DOI:10.13154/tches.v2020.i3.169-195
Datei: Dateilink
Bibtex: BibTeX
@article{weissman2020jackhammer,
  author       = {Zane Weissman and
                  Thore Tiemann and
                  Daniel Moghimi and
                  Evan Custodio and
                  Thomas Eisenbarth and
                  Berk Sunar},
  title        = {JackHammer: Efficient Rowhammer on Heterogeneous {FPGA-CPU} Platforms},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {169--195},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.169-195},
  doi          = {10.13154/TCHES.V2020.I3.169-195}
}
Samira Briongos, Pedro Malag'on, Jose Manuel Moya, and Thomas Eisenbarth,
Microarchitectural Isolation Guarantees Through Execution Based Signatures, in XXXV Conference on Design of Circuits and Integrated Systems, DCIS, 2020, Segovia, Spain, November 18-20, 2020 , IEEE, 2020. pp. 1-6.
DOI:10.1109/DCIS51330.2020.9268660
Datei: DCIS51330.2020.9268660
Samira Briongos, Pedro Malagon, Jose M. Moya, and Thomas Eisenbarth,
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks, in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, 2020. pp. 1967-1984.
ISBN:978-1-939133-17-5
Datei: briongos
Luca Wilke, Jan Wichelmann, Mathias Morbitzer, and Thomas Eisenbarth,
SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions, in 2020 IEEE Symposium on Security and Privacy (SP) , Los Alamitos, CA, USA: IEEE Computer Society, 2020. pp. 1431-1444.
DOI:10.1109/SP40000.2020.00080
Weblink: https://uzl-its.github.io/SEVurity/
Weblink: https://doi.ieeecomputersociety.org/10.1109/SP40000.2020.00080
Okan Seker, Sebastian Berndt, Luca Wilke, and Thomas Eisenbarth,
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis, in CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security , Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna, Eds. ACM, 2020. pp. 1033-1049.
DOI:10.1145/3372297.3417889
Datei: 3372297.3417889
Daniel Moghimi, Berk Sunar, Thomas Eisenbarth, and Nadia Heninger,
TPM-FAIL: TPM meets Timing and Lattice Attacks, in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, 2020. pp. 2057-2073.
ISBN:978-1-939133-17-5
Weblink: https://tpm.fail/
Datei: moghimi-tpm

2019

Berk Gulmezoglu, Andreas Zankl, M. Caner Tol, Saad Islam, Thomas Eisenbarth, and Berk Sunar,
Undermining User Privacy on Mobile Devices Using AI, in Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2019. pp. 214-227.
DOI:10.1145/3321705.3329804
Datei: 3321705.3329804
Saad Islam, Ahmad Moghimi, Ida Bruhns, Moritz Krebbel, Berk Gulmezoglu, Thomas Eisenbarth, and Berk Sunar,
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks, in 28th USENIX Security Symposium (USENIX Security 19) , Santa Clara, CA: USENIX Association, 2019. pp. 621-637.
ISBN:978-1-939133-06-9
Datei: islam
Berk Gulmezoglu, Ahmad Moghimi, Thomas Eisenbarth, and Berk Sunar,
FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning, arXiv e-prints , 2019.
Datei: 2019arXiv190703651G

2018

Ahmad Moghimi, Jan Wichelmann, Thomas Eisenbarth, and Berk Sunar,
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations, International Journal of Parallel Programming , 2018.
Datei: s10766-018-0611-9
Fergus Dall, Gabrielle De Micheli, Thomas Eisenbarth, Daniel Genkin, Nadia Heninger, Ahmad Moghimi, and Yuval Yarom,
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks, IACR Trans. Cryptogr. Hardw. Embed. Syst. , vol. 2018, no. 2, pp. 171--191, 2018.
DOI:10.13154/tches.v2018.i2.171-191
Datei: tches.v2018.i2.171-191