Prof. Dr.-Ing. Thomas Eisenbarth

Photo of Thomas  Eisenbarth

Institutsdirektor


Ratzeburger Allee 160
23562 Lübeck
Gebäude 64, 1. OG, Raum 043

Email: thomas.eisenbarth(at)uni-luebeck.de
Phone: +49 451 3101 6600
Fax: +49 451 3101 6604

Kurzbiographie

Thomas Eisenbarth ist Professor für IT Sicherheit an der Universität zu Lübeck. Er studierte bis 2006 Elektro- und Informationstechnik an der Ruhr Universität Bochum, wo er bis 2009 am Horst Görtz Institut für IT-Sicherheit promovierte. Ab 2010 forschte er als Assistant Professor am Center for Cryptography and Information Security (CCIS) an der Florida Atlantic University. 2012 wechselte er an das Worcester Polytechnic Institute (WPI). Seit August 2017 ist er als Direktor des Instituts für IT Sicherheit an der Universität zu Lübeck.
Seit Okrober 2024 bin ich der Vorsitzende der MINT Sektionen.

Seine Forschungsinteressen umfassen:

  • Systemsicherheit , Softwaresicherheit und Code-Analyse
  • Angewandte Kryptografie
  • Sichere Vortualisierung, Mikroarchitekturen und Trusted Execution Envorinments
  • Seitenkanalangriffe, physische Sicherheit und Gegenmaßnahmen

Publikationen

2018

Samira Briongos, Gorka Irazoqui, Pedro Malagon, and Thomas Eisenbarth,
CacheShield: Detecting Cache Attacks through Self-Observation, in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018 , 2018. pp. 224--235.
DOI:10.1145/3176258.3176320
Datei: 3176258.3176320
Mehmet Sinan Inci, Thomas Eisenbarth, and Berk Sunar,
DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes, 2018.
Weblink: https://dblp.uni-trier.de/rec/journals/corr/abs-1808-01352.html?view=bibtex
Datei: 1808.01352
Okan Seker, Abraham Fernandez-Rubio, Thomas Eisenbarth, and Rainer Steinwandt,
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2018, no. 3, pp. 394-430, 2018.
DOI:10.13154/tches.v2018.i3.394-430
Datei: 7281
Elke De Mulder, Thomas Eisenbarth, and Patrick Schaumont,
Identifying and Eliminating Side-Channel Leaks in Programmable Systems, IEEE Design Test , vol. 35, no. 1, pp. 74-89, 2018.
DOI:10.1109/MDAT.2017.2766166
Marc Stelzner, and Thomas Eisenbarth,
IT Security in Lübeck - The design of a modern and future-proof security curriculum, in 2018 12th European Workshop on Microelectronics Education (EWME) , 2018. pp. 79-82.
DOI:10.1109/EWME.2018.8629494
Datei: 8629494
Gorka Irazoqui, Thomas Eisenbarth, and Berk Sunar,
MASCAT: Preventing Microarchitectural Attacks Before Distribution, in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018 , 2018. pp. 377--388.
DOI:10.1145/3176258.3176316
Datei: 3176258.3176316
Jan Wichelmann, Ahmad Moghimi, Thomas Eisenbarth, and Berk Sunar,
MicroWalk: A Framework for Finding Side Channels in Binaries, in Proceedings of the 34th Annual Computer Security Applications Conference , New York, NY, USA: ACM, 2018. pp. 161--173.
DOI:10.1145/3274694.3274741
Datei: 3274694.3274741

2017

Samira Briongos, Gorka Irazoqui, Pedro Malagon, and Thomas Eisenbarth,
CacheShield: Protecting Legacy Processes Against Cache Attacks, 09 2017.
Datei: 1709.01795v1
Michael Moukarzel, Thomas Eisenbarth, and Berk Sunar,
uLeech: A side-channel evaluation platform for IoT, in 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS) , 2017. pp. 25-28.
DOI:10.1109/MWSCAS.2017.8052851
Datei: 8052851
Berk Gulmezoglu, Andreas Zankl, Thomas Eisenbarth, and Berk Sunar,
PerfWeb: How to Violate Web Privacy with Hardware Performance Events, in Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II , 2017. pp. 80--97.
Datei: 978-3-319-66399-9_5
A. Shahverdi, M. Taha, and Thomas Eisenbarth,
Lightweight Side Channel Resistance: Threshold Implementations of Simon, IEEE Transactions on Computers , vol. 66, no. 4, pp. 661-671, 2017.
Datei: TC.2016.2614504
Mehmet Sinan Inci, Thomas Eisenbarth, and Berk Sunar,
Hit by the Bus: QoS Degradation Attack on Android, in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2017. pp. 716--727.
ISBN:978-1-4503-4944-4
Datei: 3052973.3053028
Gorka Irazoqui, Kai Cong, Xiaofei Guo, Hareesh Khattri, Arun Kanuparthi, Thomas Eisenbarth, and Berk Sunar,
Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries, CoRR , vol. abs/1709.01552, 2017.
Datei: 1709.01552
Marc Green, Leandro Rodrigues-Lima, Andreas Zankl, Gorka Irazoqui, Johann Heyszl, and Thomas Eisenbarth,
AutoLock: Why Cache Attacks on ARM Are Harder Than You Think, in 26th USENIX Security Symposium (USENIX Security 17) , Vancouver, BC: USENIX Association, 2017. pp. 1075--1091.
ISBN:978-1-931971-40-9
Datei: green
Ahmad Moghimi, Gorka Irazoqui, and Thomas Eisenbarth,
CacheZoom: How SGX Amplifies the Power of Cache Attacks, in Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings , 2017. pp. 69--90.
Datei: 978-3-319-66787-4_4
Berk Gulmezoglu, Thomas Eisenbarth, and Berk Sunar,
Cache-Based Application Detection in the Cloud Using Machine Learning, in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2017. pp. 288--300.
ISBN:978-1-4503-4944-4
Datei: 3052973.3053036

2016

Mehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth, and Berk Sunar,
Efficient, Adversarial Neighbor Discovery Using Logical Channels on Microsoft Azure, in Proceedings of the 32nd Annual Conference on Computer Security Applications , New York, NY, USA: ACM, 2016. pp. 436--447.
DOI:10.1145/2991079.2991113
ISBN:978-1-4503-4771-6
Datei: NeighborDiscoveryAzure%20ACSAC2016.pdf
A. M. Leonard, H. Cai, K. K. Venkatasubramanian, M. Ali, and Thomas Eisenbarth,
A honeypot system for wearable networks, in 2016 IEEE 37th Sarnoff Symposium , 2016. pp. 199-201.
Datei: SARNOF.2016.7846755
Cong Chen, Mehmet Sinan Inci, Mostafa Taha, and Thomas Eisenbarth,
SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs, in Smart Card Research and Advanced Applications - 15th International Conference, CARDIS 2016, Cannes, France, November 7-9, 2016, Revised Selected Papers , 2016. pp. 73--88.
DOI:10.1007/978-3-319-54669-8_5
Datei: 978-3-319-54669-8_5
A. Adam Ding, Cong Chen, and Thomas Eisenbarth,
Simpler, Faster, and More Robust T-Test Based Leakage Detection, Standaert, Francois-Xavier and Oswald, Elisabeth, Eds. Cham: Springer International Publishing, 2016, pp. 163--183.
ISBN:978-3-319-43283-0
Datei: 978-3-319-43283-0_10
Cong Chen, Thomas Eisenbarth, Ingo Maurich, and Rainer Steinwandt,
Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem, IEEE Trans. Information Forensics and Security , vol. 11, no. 6, pp. 1093--1105, 2016.
Datei: TIFS.2015.2509944
Berk Gulmezoglu, Mehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth, and Berk Sunar,
Cross-VM Cache Attacks on AES, IEEE Trans. Multi-Scale Computing Systems , vol. 2, no. 3, pp. 211--222, 2016.
Datei: TMSCS.2016.2550438
Gorka Irazoqui, Thomas Eisenbarth, and Berk Sunar,
Cross Processor Cache Attacks, in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2016. pp. 353--364.
DOI:10.1145/2897845.2897867
ISBN:978-1-4503-4233-9
Datei: 2897845.2897867
Mehmet Sinan Inci, Berk Gulmezoglu, Thomas Eisenbarth, and Berk Sunar,
Co-location Detection on the Cloud, in Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers , 2016. pp. 19--34.
Datei: 978-3-319-43283-0_2
Mehmet Sinan Inci, Berk Gulmezoglu, Gorka Irazoqui, Thomas Eisenbarth, and Berk Sunar,
Cache Attacks Enable Bulk Key Recovery on the Cloud, in Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings , 2016. pp. 368--388.
DOI:10.1007/978-3-662-53140-2_18
Datei: 978-3-662-53140-2_18