Presentations and Talks

Presentations and talks are arranged on our Youtube channel.

Publications

2023

Andrija Neskovic, Saleh Mulhem, Alexander Treff, Rainer Buchty, Thomas Eisenbarth, and Mladen Berekovic,
SystemC Model of Power Side-Channel Attacks Against AI Accelerators: Superstition or not?, in ICCAD '23: Proceedings of the 42nd IEEE/ACM International Conference on Computer-Aided Design , IEEE/ACM, Nov.2023.
DOI:10.48550/arXiv.2311.13387
Weblink: https://arxiv.org/abs/2311.13387
Moritz Kirschte, Thorsten Peinemann, Joshua Stock, Carlos Cotrini, and Esfandiar Mohammadi,
S-GBDT: Frugal Differentially Private Gradient Boosting Decision Trees, arXiv , Sep. 2023.
DOI:10.48550/arXiv.2309.12041
File: 2309.12041
Claudius Pott, Berk Gulmezoglu, and Thomas Eisenbarth,
Overcoming the Pitfalls of HPC-based Cryptojacking Detection in Presence of GPUs, in Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2023, Charlotte, NC, USA, April 24-26, 2023 , Mohamed Shehab and Maribel Fernandez and Ninghui Li, Eds. {ACM}, 2023. pp. 177--188.
DOI:10.1145/3577923.3583655
File: 3577923.3583655
Johannes Liebenow, Timothy Imort, Yannick Fuchs, Marcel Heisel, Nadja Käding, Jan Rupp, and Esfandiar Mohammadi,
A Toolchain for Privacy-Preserving Distributed Aggregation on Edge-Devices, CoRR , vol. abs/2309.12483, 2023.
DOI:10.48550/arXiv.2309.12483
File: arXiv.2309.12483
Pascal Bemmann, Sebastian Berndt, Denis Diemert, Thomas Eisenbarth, and Tibor Jager,
Subversion-Resilient Authenticated Encryption Without Random Oracles, in Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part II , Mehdi Tibouchi and Xiaofeng Wang, Eds. Springer, 2023. pp. 460--483.
DOI:10.1007/978-3-031-33491-7\_17
File: 978-3-031-33491-7\_17
Luca Wilke, Anja Rabich, and Thomas Eisenbarth,
SEV-Step: A Single-Stepping Framework for AMD-SEV, CoRR , vol. abs/2307.14757, 2023.
DOI:10.48550/ARXIV.2307.14757
File: arXiv.2307.14757
Thore Tiemann, Sebastian Berndt, Thomas Eisenbarth, and Maciej Liskiewicz,
"Act natural!": Exchanging Private Messages on Public Blockchains, in 8th IEEE European Symposium on Security and Privacy , IEEE, 2023. pp. 292-308.
DOI:10.1109/EuroSP57164.2023.00026
Weblink: https://eprint.iacr.org/2021/1073
Weblink: https://doi.ieeecomputersociety.org/10.1109/EuroSP57164.2023.00026
File: Dateilink
Jan Wichelmann, Christopher Peredy, Florian Sieck, Anna Pätschke, and Thomas Eisenbarth,
MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V, in Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) - 20th International Conference , Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati, Eds. Springer, 2023. pp. 3-23.
DOI:10.1007/978-3-031-35504-2_1
Weblink: https://arxiv.org/abs/2305.00584
Nils Loose, Felix Mächtle, Claudius Pott, Volodymyr Bezsmertnyi, and Thomas Eisenbarth,
Madvex: Instrumentation-based Adversarial Attacks on Machine Learning Malware Detection, in Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) - 20th International Conference , Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati, Eds. Springer, 2023. pp. 69-88.
DOI:10.1007/978-3-031-35504-2_4
Weblink: https://arxiv.org/abs/2305.02559
Thore Tiemann, Zane Weissman, Thomas Eisenbarth, and Berk Sunar,
IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems, in Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security , Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik, Eds. ACM, 2023. pp. 827-840.
DOI:10.1145/3579856.3582838
Weblink: https://arxiv.org/abs/2202.11623
File: Dateilink
Yara Schütt, Johannes Liebenow, Tanya Braun, Marcel Gehrke, Florian Thaeter, and Esfandiar Mohammadi,
DPM: Clustering Sensitive Data through Separation, CoRR , vol. abs/2307.02969, 2023.
DOI:10.48550/arXiv.2307.02969
File: arXiv.2307.02969
Sebastian Berndt, Thomas Eisenbarth, Sebastian Faust, Marc Gourjon, Maximilian Orlt, and Okan Seker,
Combined Fault and Leakage Resilience: Composability, Constructions and Compiler, in Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part III , Helena Handschuh and Anna Lysyanskaya, Eds. Cham: Springer, 2023. pp. 377--409.
DOI:10.1007/978-3-031-38548-3\_13
ISBN:978-3-031-38548-3
File: 978-3-031-38548-3\_13
Jan Wichelmann, Anna Pätschke, Luca Wilke, and Thomas Eisenbarth,
Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software, in 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023 , Joseph A. Calandrino and Carmela Troncoso, Eds. USENIX Association, 2023.
DOI:10.48550/arXiv.2210.13124
File: wichelmann

2022

Moritz Kirschte, Sebastian Meiser, Saman Ardalan, and Esfandiar Mohammadi,
Single SMPC Invocation DPHelmet: Differentially Private Distributed Learning on a Large Scale, arXiv , Nov. 2022.
DOI:10.48550/arXiv.2211.02003
File: 2211.02003
Jan Wichelmann, Florian Sieck, Anna Pätschke, and Thomas Eisenbarth,
Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications, in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022 , Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi, Eds. ACM, 2022. pp. 2915--2929.
DOI:10.1145/3548606.3560654
File: 3548606.3560654
Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving, and Thomas Eisenbarth,
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols, in Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security , ACM, 2022. pp. 712-726.
DOI:10.1145/3488932.3517387
ISBN:9781450391405
File: 3488932.3517387
Mengyuan Li, Luca Wilke, Jan Wichelmann, Thomas Eisenbarth, Radu Teodorescu, and Yinqian Zhang,
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP, in 2022 IEEE Symposium on Security and Privacy (SP) , San Francisco, CA, USA: IEEE, 2022. pp. 337-351.
DOI:10.1109/SP46214.2022.9833768
File: SP46214.2022.9833768

2021

Ilia Polian, Frank Altmann, Tolga Arul, Christian Boit, Ralf Brederlow, Lucas Davi, Rolf Drechsler, Nan Du, Thomas Eisenbarth, Tim Güneysu, Sascha Hermann, Matthias Hiller, Rainer Leupers, Farhad Merchant, Thomas Mussenbrock, Stefan Katzenbeisser, Akash Kumar, Wolfgang Kunz, Thomas Mikolajick, Vivek Pachauri, Jean-Pierre Seifert, Frank Sill Torres, and Jens Trommer,
Nano Security: From Nano-Electronics to Secure Systems, in Design, Automation & Test in Europe Conference & Exhibition, DATE 2021, Grenoble, France, February 1-5, 2021 , IEEE, 2021. pp. 1334--1339.
DOI:10.23919/DATE51398.2021.9474187
File: DATE51398.2021.9474187
Luca Wilke, Jan Wichelmann, Florian Sieck, and Thomas Eisenbarth,
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation, in 2021 IEEE Security and Privacy Workshops (SPW) , 2021. pp. 456-466.
DOI:10.1109/SPW53761.2021.00064
File:
Sebastian Berndt, Klaus Jansen, and Alexandra Lassota,
Tightness of Sensitivity and Proximity Bounds for Integer Linear Programs, in {SOFSEM} 2021: Theory and Practice of Computer Science - 47th International Conference on Current Trends in Theory and Practice of Computer Science, {SOFSEM} 2021, Bolzano-Bozen, Italy, January 25-29, 2021, Proceedings , Tom{\'{a}}s Bures and Riccardo Dondi and Johann Gamper and Giovanna Guerrini and Tomasz Jurdzinski and Claus Pahl and Florian Sikora and Prudence W. H. Wong, Eds. Springer, 2021. pp. 349--360.
DOI:10.1007/978-3-030-67731-2_25
File: 978-3-030-67731-2_25
Diego F. Aranha, Sebastian Berndt, Thomas Eisenbarth, Okan Seker, Akira Takahashi, Luca Wilke, and Greg Zaverucha,
Side-Channel Protections for Picnic Signatures, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 4, pp. 239-282, 2021.
DOI:10.46586/tches.v2021.i4.239-282
File: 9066
Sebastian Berndt, Kilian Grage, Klaus Jansen, Lukas Johannsen, and Maria Kosche,
Robust Online Algorithms for Dynamic Choosing Problems, in Connecting with Computability - 17th Conference on Computability in Europe, CiE 2021, Virtual Event, Ghent, July 5-9, 2021, Proceedings , Liesbeth De Mol and Andreas Weiermann and Florin Manea and David Fern{\'{a}}ndez{-}Duque, Eds. Springer, 2021. pp. 38--49.
DOI:10.1007/978-3-030-80049-9_4
File: 978-3-030-80049-9_4
Eike Petersen, Yannik Potdevin, Esfandiar Mohammadi, Stephan Zidowitz, Sabrina Breyer, Dirk Nowotka, Sandra Henn, Ludwig Pechmann, Martin Leucker, Philipp Rostalski, and Christian Herzog,
Responsible and Regulatory Conform Machine Learning for Medicine: A Survey of Technical Challenges and Solutions, CoRR , vol. abs/2107.09546, 2021.
File: 2107.09546
Sebastian Berndt, Klaus Jansen, and Kim{-}Manuel Klein,
New Bounds for the Vertices of the Integer Hull, in 4th Symposium on Simplicity in Algorithms, {SOSA} 2021, Virtual Conference, January 11-12, 2021 , Hung Viet Le and Valerie King, Eds. {SIAM}, 2021. pp. 25--36.
DOI:10.1137/1.9781611976496.3
File: 1.9781611976496.3
Florian Sieck, Sebastian Berndt, Jan Wichelmann, and Thomas Eisenbarth,
Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries, in CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security , Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi, Eds. ACM, 2021. pp. 2456--2473.
DOI:10.1145/3460120.3484783
File: 3460120.3484783