Publications
2025
        
    
    
    
        
        
        
            
            
                    Thorsten
                    Peinemann,
                
        
    
        
        
        
            
            
                    Paula
                    Arnold,
                
        
    
        
        
        
            
            
                    Sebastian
                    Berndt,
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth, and
                
        
    
        
        
        
            
            
                    Esfandiar
                    Mohammadi,
                
        
    
Non-omniscient backdoor injection with a single poison sample: Proving the one-poison hypothesis for linear regression and linear classification, arXiv , Aug. 2025.
Non-omniscient backdoor injection with a single poison sample: Proving the one-poison hypothesis for linear regression and linear classification, arXiv , Aug. 2025.
| DOI: | 10.48550/arXiv.2508.05600 | 
| File: | 2508.05600 | 
        
    
    
    
        
        
        
            
            
                    Christian
                    Ewert,
                
        
    
        
        
        
            
            
                    Andrija
                    Neskovic,
                
        
    
        
        
        
            
            
                    Carsten
                    Heinz,
                
        
    
        
        
        
            
            
                    Felix
                    Muuss,
                
        
    
        
        
        
            
            
                    Alexander
                    Treff,
                
        
    
        
        
        
            
            
                    Marc
                    Gourjon,
                
        
    
        
        
        
            
            
                    Rainer
                    Buchty,
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth,
                
        
    
        
        
        
            
            
                    Andreas
                    Koch,
                
        
    
        
        
        
            
            
                    Mladen
                    Berekovic, and
                
        
    
        
        
        
            
            
                    Saleh
                    Mulhem,
                
        
    
Lightweight Authenticated Integration and In-Field Secure Operation of System-in-Package, ACM Trans. Des. Autom. Electron. Syst. , Jun. 2025. Association for Computing Machinery.
Lightweight Authenticated Integration and In-Field Secure Operation of System-in-Package, ACM Trans. Des. Autom. Electron. Syst. , Jun. 2025. Association for Computing Machinery.
| DOI: | 10.1145/3745780 | 
| File: | 3745780 | 
        
    
    
    
    
        
        
        
            
            
                    Felix
                    Mächtle,
                
        
    
        
        
        
            
            
                    Nils
                    Loose,
                
        
    
        
        
        
            
            
                    Jan-Niclas
                    Serr,
                
        
    
        
        
        
            
            
                    Jonas
                    Sander, and
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth,
                
        
    
AutoStub: Genetic Programming-Based Stub Creation for Symbolic Execution, in Proceedings of the 18th ACM/IEEE International Workshop on Search-Based and Fuzz Testing, SBFT 2025 , 2025.
AutoStub: Genetic Programming-Based Stub Creation for Symbolic Execution, in Proceedings of the 18th ACM/IEEE International Workshop on Search-Based and Fuzz Testing, SBFT 2025 , 2025.
        
    
    
    
        
        
        
            
            
                    Jonas
                    Sander,
                
        
    
        
        
        
            
            
                    Sebastian
                    Berndt,
                
        
    
        
        
        
            
            
                    Ida
                    Bruhns, and
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth,
                
        
    
Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2025, pp. 420-449, 2025. IACR.
Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2025, pp. 420-449, 2025. IACR.
| DOI: | 10.46586/tches.v2025.i1.420-449 | 
        
    
    
    
        
        
        
            
            
                    Johannes
                    Liebenow,
                
        
    
        
        
        
            
            
                    Thorsten
                    Peinemann, and
                
        
    
        
        
        
            
            
                    Esfandiar
                    Mohammadi,
                
        
    
DP-HYPE: Distributed Differentially Private Hyperparameter Search, arXiv preprint arXiv:2510.04902 , 2025.
DP-HYPE: Distributed Differentially Private Hyperparameter Search, arXiv preprint arXiv:2510.04902 , 2025.
| Weblink: | https://arxiv.org/abs/2510.04902 | 
        
    
    
    
    
        
        
        
            
            
                    Zane
                    Weissman,
                
        
    
        
        
        
            
            
                    Thore
                    Tiemann,
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth, and
                
        
    
        
        
        
            
            
                    Berk
                    Sunar,
                
        
    
Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms, in Information Systems Security , Patil, Vishwas T. and Krishnan, Ram and Shyamasundar, Rudrapatna K., Eds. Springer Nature Switzerland, 2025. pp. 3-24.
Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms, in Information Systems Security , Patil, Vishwas T. and Krishnan, Ram and Shyamasundar, Rudrapatna K., Eds. Springer Nature Switzerland, 2025. pp. 3-24.
| DOI: | 10.1007/978-3-031-80020-7_1 | 
| ISBN: | 978-3-031-80020-7 | 
| Weblink: | https://doi.org/10.48550/arXiv.2311.15999 | 
| Bibtex: | @inproceedings{weissman2025firecracker,
  author    = {Weissman, Zane and
               Tiemann, Thore and
               Eisenbarth, Thomas and
               Sunar, Berk},
  title     = {Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms},
  booktitle = {Information Systems Security},
  editor    = {Patil, Vishwas T. and
               Krishnan, Ram and
               Shyamasundar, Rudrapatna K.},
  year      = {2025},
  pages     = {3--24},
  publisher = {Springer Nature Switzerland},
  isbn      = {978-3-031-80020-7},
  doi       = {10.1007/978-3-031-80020-7_1},
} | 
        
    
    
    
    
        
        
        
            
            
                    Sebastian
                    Meiser,
                
        
    
        
        
        
            
            
                    Debajyoti
                    Das,
                
        
    
        
        
        
            
            
                    Moritz
                    Kirschte,
                
        
    
        
        
        
            
            
                    Esfandiar
                    Mohammadi, and
                
        
    
        
        
        
            
            
                    Aniket
                    Kate,
                
        
    
Mixnets on a tightrope: Quantifying the leakage of mix networks using a provably optimal heuristic adversary, in 2025 IEEE Symposium on Security and Privacy (SP) , Los Alamitos, CA, USA: IEEE Computer Society, 2025. pp. 4457-4475.
Mixnets on a tightrope: Quantifying the leakage of mix networks using a provably optimal heuristic adversary, in 2025 IEEE Symposium on Security and Privacy (SP) , Los Alamitos, CA, USA: IEEE Computer Society, 2025. pp. 4457-4475.
| File: | SP61157.2025.00233 | 
        
    
    
    
    
        
        
        
            
            
                    Felix
                    Mächtle,
                
        
    
        
        
        
            
            
                    Jan-Niclas
                    Serr,
                
        
    
        
        
        
            
            
                    Nils
                    Loose,
                
        
    
        
        
        
            
            
                    Jonas
                    Sander, and
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth,
                
        
    
OCEAN: Open-World Contrastive Authorship Identification, in Applied Cryptography and Network Security (ACNS) 2025 , 2025.
OCEAN: Open-World Contrastive Authorship Identification, in Applied Cryptography and Network Security (ACNS) 2025 , 2025.
| Weblink: | https://arxiv.org/abs/2412.05049 | 
| Bibtex: | @misc{maechtle2024oceanopenworldcontrastiveauthorship,
      title={OCEAN: Open-World Contrastive Authorship Identification}, 
      author={Felix Mächtle and Jan-Niclas Serr and Nils Loose and Jonas Sander and Thomas Eisenbarth},
      year={2024},
      eprint={2412.05049},
      archivePrefix={arXiv},
      primaryClass={cs.AI},
      url={https://arxiv.org/abs/2412.05049}, 
} | 
        
    
    
    
    
        
        
        
            
            
                    Philipp
                    Schmitz,
                
        
    
        
        
        
            
            
                    Tobias
                    Jauch,
                
        
    
        
        
        
            
            
                    Alex
                    Wezel,
                
        
    
        
        
        
            
            
                    Mohammad R.
                    Fadiheh,
                
        
    
        
        
        
            
            
                    Thore
                    Tiemann,
                
        
    
        
        
        
            
            
                    Jonah
                    Heller,
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth,
                
        
    
        
        
        
            
            
                    Dominik
                    Stoffel, and
                
        
    
        
        
        
            
            
                    Wolfgang
                    Kunz,
                
        
    
Okapi: A Lightweight Architecture for Secure Speculation Exploiting Locality of Memory Accesses, in Proceedings of the 20th ACM Asia Conference on Computer and Communications Security (to appear) , ACM, 2025. pp. 1203–1218.
Okapi: A Lightweight Architecture for Secure Speculation Exploiting Locality of Memory Accesses, in Proceedings of the 20th ACM Asia Conference on Computer and Communications Security (to appear) , ACM, 2025. pp. 1203–1218.
| DOI: | 10.1145/3708821.3733869 | 
| Weblink: | https://arxiv.org/abs/2312.08156 | 
| Bibtex: | @inproceedings{schmitz2025okapi,
  author        = {Philipp Schmitz and
                   Tobias Jauch and
                   Alex Wezel and
                   Mohammad R. Fadiheh and
                   Thore Tiemann and
                   Jonah Heller and
                   Thomas Eisenbarth and
                   Dominik Stoffel and
                   Wolfgang Kunz},
  title         = {Okapi: A Lightweight Architecture for Secure
                   Speculation Exploiting Locality of Memory Accesses}, 
  booktitle     = {to appear in Proceedings of the 20th {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2025, Ha Noi, August 25-29, 2025},
  publisher     = {{ACM}},
  year          = {2025},
  doi           = {10.1145/3708821.3733869}
} | 
        
    
    
    
        
        
        
            
            
                    Jeremy
                    Boy,
                
        
    
        
        
        
            
            
                    Antoon
                    Purnal,
                
        
    
        
        
        
            
            
                    Anna
                    Pätschke,
                
        
    
        
        
        
            
            
                    Luca
                    Wilke, and
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth,
                
        
    
SLasH-DSA: Breaking SLH-DSA Using an Extensible End-To-End Rowhammer Framework, arXiv preprint arXiv:2509.13048 , 2025.
SLasH-DSA: Breaking SLH-DSA Using an Extensible End-To-End Rowhammer Framework, arXiv preprint arXiv:2509.13048 , 2025.
| File: | 2509.13048 | 
        
    
    
    
    
        
        
        
            
            
                    Anna
                    Pätschke,
                
        
    
        
        
        
            
            
                    Jan
                    Wichelmann, and
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth,
                
        
    
Zebrafix: Mitigating Memory-Centric Side-Channel Leakage via Interleaving, in 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2025) , IEEE, 2025.
Zebrafix: Mitigating Memory-Centric Side-Channel Leakage via Interleaving, in 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2025) , IEEE, 2025.
| File: | 2502.09139 | 
2024
        
    
    
    
    
        
        
        
            
            
                    Luca
                    Wilke,
                
        
    
        
        
        
            
            
                    Florian
                    Sieck, and
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth,
                
        
    
TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security , ACM, Oct.2024.
TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security , ACM, Oct.2024.
| DOI: | 10.1145/3658644.3690230 | 
| Weblink: | https://uzl-its.github.io/tdxdown/ | 
| Bibtex: | @INPROCEEDINGS{tdxdownCCS24,
  author    = {Luca Wilke and Florian Sieck and Thomas Eisenbarth},
  booktitle = {Proceedings of the 2024 ACM SIGSAC Conference
                on Computer and Communications Security, {CCS} 2024,
                Salt Lake City, UT, USA, October 14--18, 2024},
  title     = {{TDXdown}: Single-Stepping and Instruction Counting Attacks
                against Intel {TDX}},
  year      = {2024},
  doi       = {10.1145/3658644.3690230}
}
 | 
        
    
    
    
    
        
        
        
            
            
                    Max
                    Schulze,
                
        
    
        
        
        
            
            
                    Yorck
                    Zisgen,
                
        
    
        
        
        
            
            
                    Moritz
                    Kirschte,
                
        
    
        
        
        
            
            
                    Esfandiar
                    Mohammadi, and
                
        
    
        
        
        
            
            
                    Agnes
                    Koschmider,
                
        
    
Differentially Private Inductive Miner, in 2024 6th International Conference on Process Mining (ICPM) , Curran Associates, Sep.2024. pp. 89-96.
Differentially Private Inductive Miner, in 2024 6th International Conference on Process Mining (ICPM) , Curran Associates, Sep.2024. pp. 89-96.
| DOI: | 10.1109/ICPM63005.2024.10680684 | 
| ISBN: | 979-8-3503-6503-0 | 
| File: | 10680684 | 
        
    
    
    
    
        
        
        
            
            
                    Jan
                    Wichelmann,
                
        
    
        
        
        
            
            
                    Anja
                    Rabich,
                
        
    
        
        
        
            
            
                    Anna
                    Pätschke, and
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth,
                
        
    
Obelix: Mitigating Side-Channels Through Dynamic Obfuscation, in 2024 IEEE Symposium on Security and Privacy (S&P) , San Francisco, CA, USA: IEEE, May2024. pp. 4182-4199.
Obelix: Mitigating Side-Channels Through Dynamic Obfuscation, in 2024 IEEE Symposium on Security and Privacy (S&P) , San Francisco, CA, USA: IEEE, May2024. pp. 4182-4199.
| DOI: | 10.1109/SP54263.2024.00261 | 
| Weblink: | https://doi.ieeecomputersociety.org/10.1109/SP54263.2024.00261 | 
        
    
    
    
    
        
        
        
            
            
                    Johannes
                    Liebenow,
                
        
    
        
        
        
            
            
                    Yara
                    Schütt,
                
        
    
        
        
        
            
            
                    Tanya
                    Braun,
                
        
    
        
        
        
            
            
                    Marcel
                    Gehrke,
                
        
    
        
        
        
            
            
                    Florian
                    Thaeter, and
                
        
    
        
        
        
            
            
                    Esfandiar
                    Mohammadi,
                
        
    
DPM: Clustering Sensitive Data through Separation, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, CCS 2024 , ACM, 2024.
DPM: Clustering Sensitive Data through Separation, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, CCS 2024 , ACM, 2024.
| DOI: | 10.48550/arXiv.2307.02969 | 
| File: | arXiv.2307.02969 | 
        
    
    
    
    
        
        
        
            
            
                    Volodymyr
                    Bezsmertnyi,
                
        
    
        
        
        
            
            
                    Jean Michel
                    Cioranesco, and
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth,
                
        
    
Duplication-Based Fault Tolerance for RISC-V Embedded Software, in Computer Security - ESORICS 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part IV , Joaquin Garcia Alfaro, Rafal Kozik, Michal Choras, Sokratis K. Katsikas, Eds. Springer, 2024. pp. 86--104.
Duplication-Based Fault Tolerance for RISC-V Embedded Software, in Computer Security - ESORICS 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part IV , Joaquin Garcia Alfaro, Rafal Kozik, Michal Choras, Sokratis K. Katsikas, Eds. Springer, 2024. pp. 86--104.
| DOI: | 10.1007/978-3-031-70903-6\_5 | 
| Weblink: | https://dblp.org/rec/conf/esorics/BezsmertnyiCE24.html | 
| Weblink: | https://link.springer.com/chapter/10.1007/978-3-031-70903-6_5 | 
| File: | 978-3-031-70903-6\_5 | 
        
    
    
    
    
        
        
        
            
            
                    Debopriya Roy
                    Dipta,
                
        
    
        
        
        
            
            
                    Thore
                    Tiemann,
                
        
    
        
        
        
            
            
                    Berk
                    Gulmezoglu,
                
        
    
        
        
        
            
            
                    Eduard
                    Marin, and
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth,
                
        
    
Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments, in 9th IEEE European Symposium on Security and Privacy, EuroS&P 2024 , IEEE, 2024. pp. 327-344.
Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments, in 9th IEEE European Symposium on Security and Privacy, EuroS&P 2024 , IEEE, 2024. pp. 327-344.
| DOI: | 10.1109/EUROSP60621.2024.00025 | 
| Weblink: | https://doi.ieeecomputersociety.org/10.1109/EuroSP60621.2024.00025 | 
| Weblink: | https://doi.org/10.48550/arXiv.2404.10715 | 
| Bibtex: | @inproceedings{DBLP:conf/eurosp/DiptaTGME24,
  author       = {Debopriya Roy Dipta and
                  Thore Tiemann and
                  Berk G{\"{u}}lmezoglu and
                  Eduard Marin and
                  Thomas Eisenbarth},
  title        = {Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox
                  Environments},
  booktitle    = {9th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2024, Vienna, Austria, July 8-12, 2024},
  pages        = {327--344},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/EuroSP60621.2024.00025},
  doi          = {10.1109/EUROSP60621.2024.00025}
} | 
        
    
    
    
        
        
        
            
            
                    Roland
                    Stenger,
                
        
    
        
        
        
            
            
                    Steffen
                    Busse,
                
        
    
        
        
        
            
            
                    Jonas
                    Sander,
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth, and
                
        
    
        
        
        
            
            
                    Sebastian
                    Fudickar,
                
        
    
Evaluating the Impact of Face Anonymization Methods on Computer Vision Tasks: A Trade-off Between Privacy and Utility, IEEE Access , pp. 1-1, 2024.
Evaluating the Impact of Face Anonymization Methods on Computer Vision Tasks: A Trade-off Between Privacy and Utility, IEEE Access , pp. 1-1, 2024.
| DOI: | 10.1109/ACCESS.2024.3519441 | 
| Weblink: | https://ieeexplore.ieee.org/document/10804775 | 
| File: | ACCESS.2024.3519441 | 
        
    
    
    
        
        
        
            
            
                    Marcel
                    Gehrke,
                
        
    
        
        
        
            
            
                    Johannes
                    Liebenow,
                
        
    
        
        
        
            
            
                    Esfandiar
                    Mohammadi, and
                
        
    
        
        
        
            
            
                    Tanya
                    Braun,
                
        
    
Lifting in Support of Privacy-Preserving Probabilistic Inference, KI - Künstliche Intelligenz , vol. 38, pp. 225-241, 2024.
Lifting in Support of Privacy-Preserving Probabilistic Inference, KI - Künstliche Intelligenz , vol. 38, pp. 225-241, 2024.
| DOI: | 10.1007/s13218-024-00851-y | 
| File: | s13218-024-00851-y | 
        
    
    
    
        
        
        
            
            
                    Thore
                    Tiemann,
                
        
    
        
        
        
            
            
                    Zane
                    Weissman,
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth, and
                
        
    
        
        
        
            
            
                    Berk
                    Sunar,
                
        
    
Microarchitectural Vulnerabilities Introduced, Exploited, and Accelerated by Heterogeneous FPGA-CPU Platforms, in Security of FPGA-Accelerated Cloud Computing Environments , Szefer, Jakub and Tessier, Russell, Eds. Cham: Springer International Publishing, 2024, pp. 203-237.
Microarchitectural Vulnerabilities Introduced, Exploited, and Accelerated by Heterogeneous FPGA-CPU Platforms, in Security of FPGA-Accelerated Cloud Computing Environments , Szefer, Jakub and Tessier, Russell, Eds. Cham: Springer International Publishing, 2024, pp. 203-237.
| DOI: | 10.1007/978-3-031-45395-3_8 | 
| ISBN: | 978-3-031-45395-3 | 
| Bibtex: | @inbook{tiemann2024fpgaplatform,
  author      = {Tiemann, Thore
                  and Weissman, Zane
                  and Eisenbarth, Thomas
                  and Sunar, Berk},
  editor      = {Szefer, Jakub
                  and Tessier, Russell},
  title       = {Microarchitectural Vulnerabilities Introduced, 
                  Exploited, and Accelerated by Heterogeneous 
                  {FPGA-CPU} Platforms},
  bookTitle   = {Security of FPGA-Accelerated Cloud Computing 
                  Environments},
  year        = {2024},
  publisher   = {Springer International Publishing},
  pages       = {203--237},
  isbn        = {978-3-031-45395-3},
  doi         = {10.1007/978-3-031-45395-3_8},
  url         = {https://doi.org/10.1007/978-3-031-45395-3_8},
} | 
        
    
    
    
        
        
        
            
            
                    Paula
                    Arnold,
                
        
    
        
        
        
            
            
                    Sebastian
                    Berndt,
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth, and
                
        
    
        
        
        
            
            
                    Maximilian
                    Orlt,
                
        
    
Polynomial sharings on two secrets: Buy one, get one free, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 671-706.
Polynomial sharings on two secrets: Buy one, get one free, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 671-706.
| DOI: | 10.46586/tches.v2024.i3.671-706 | 
| File: | 11691 | 
        
    
    
    
        
        
        
            
            
                    Johannes
                    Liebenow,
                
        
    
        
        
        
            
            
                    Timothy
                    Imort,
                
        
    
        
        
        
            
            
                    Yannick
                    Fuchs,
                
        
    
        
        
        
            
            
                    Marcel
                    Heisel,
                
        
    
        
        
        
            
            
                    Nadja
                    Käding,
                
        
    
        
        
        
            
            
                    Jan
                    Rupp, and
                
        
    
        
        
        
            
            
                    Esfandiar
                    Mohammadi,
                
        
    
PrivAgE: A Toolchain for Privacy-Preserving Distributed Aggregation on Edge-Devices, KI - Künstliche Intelligenz , vol. 38, pp. 183-188, 2024.
PrivAgE: A Toolchain for Privacy-Preserving Distributed Aggregation on Edge-Devices, KI - Künstliche Intelligenz , vol. 38, pp. 183-188, 2024.
| DOI: | 10.1007/s13218-023-00823-8 | 
| File: | s13218-023-00823-8 | 
        
    
    
    
    
        
        
        
            
            
                    Thorsten
                    Peinemann,
                
        
    
        
        
        
            
            
                    Moritz
                    Kirschte,
                
        
    
        
        
        
            
            
                    Joshua
                    Stock,
                
        
    
        
        
        
            
            
                    Carlos
                    Cotrini, and
                
        
    
        
        
        
            
            
                    Esfandiar
                    Mohammadi,
                
        
    
S-BDT: Distributed Differentially Private Boosted Decision Trees, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS '24) , New York, NY, USA: Association for Computing Machinery, 2024. pp. 288–302.
S-BDT: Distributed Differentially Private Boosted Decision Trees, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS '24) , New York, NY, USA: Association for Computing Machinery, 2024. pp. 288–302.
| DOI: | 10.1145/3658644.3690301 | 
| ISBN: | 9798400706363 | 
| File: | 2309.12041 | 
        
    
    
    
        
        
        
            
            
                    Luca
                    Wilke,
                
        
    
        
        
        
            
            
                    Jan
                    Wichelmann,
                
        
    
        
        
        
            
            
                    Anja
                    Rabich, and
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth,
                
        
    
SEV-Step: A Single-Stepping Framework for AMD-SEV, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 180-206.
SEV-Step: A Single-Stepping Framework for AMD-SEV, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 180-206.
| DOI: | 10.46586/tches.v2024.i1.180-206 | 
| File: | 10792 | 
        
    
    
    
        
        
        
            
            
                    Ida
                    Bruhns,
                
        
    
        
        
        
            
            
                    Sebastian
                    Berndt,
                
        
    
        
        
        
            
            
                    Jonas
                    Sander, and
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth,
                
        
    
Slalom at the Carnival: Privacy-preserving Inference with Masks from Public Knowledge, IACR Commun. Cryptol. , vol. 1, no. 3, pp. 40, 2024.
Slalom at the Carnival: Privacy-preserving Inference with Masks from Public Knowledge, IACR Commun. Cryptol. , vol. 1, no. 3, pp. 40, 2024.
| DOI: | 10.62056/AKP-49QGXQ | 
| File: | akp-49qgxq | 

- Research
 - Publications
 - PhD Theses
 - Tools
 - Seminar
 - Projects
 
