Publications

2021

  • Sebastian Berndt and Klaus Jansen and Alexandra Lassota: Tightness of Sensitivity and Proximity Bounds for Integer Programs. in SOFSEM (accepted), 2021
    BibTeX
    @inproceedings{BJL2020,
    author = {Sebastian Berndt and Klaus Jansen and Alexandra Lassota},
    title = {Tightness of Sensitivity and Proximity Bounds for Integer Programs},
    booktitle = {{SOFSEM} (accepted)},
    year = {2021}
    }
  • Sebastian Berndt and Klaus Jansen and Kim-Manuel Klein: New Bounds for the Vertices of the Integer Hull. in SOSA@SODA, SIAM, 2021
    BibTeX
    @inproceedings{DBLP:conf/sods/BerndtInteger,
      author    = {Sebastian Berndt and Klaus Jansen and Kim{-}Manuel Klein},
      title     = {New Bounds for the Vertices of the Integer Hull},
      booktitle = {SOSA@SODA},
      publisher = {{SIAM}},
      year      = {2021}
    }
    

2020

  • Sebastian Berndt and Maciej Liskiewicz: On the universal steganography of optimal rate. Inf. Comput., no. 275, pp. 104632, 2020
    BibTeX
    @article{DBLP:journals/iandc/BerndtL20,
      author    = {Sebastian Berndt and
                   Maciej Liskiewicz},
      title     = {On the universal steganography of optimal rate},
      journal   = {Inf. Comput.},
      volume    = {275},
      pages     = {104632},
      year      = {2020}
    }
  • Max Bannach and Berndt and Schuster and Marcel Wienöbst: PACE Solver Description: Fluid. in IPEC, no. 180, pp. 27:1-27:3, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020
    BibTeX
    @inproceedings{DBLP:conf/iwpec/BannachBSW20,
      author    = {Max Bannach and Sebastian Berndt and Martin Schuster and Marcel Wien{\"{o}}bst},
      title     = {{PACE} Solver Description: Fluid},
      booktitle = {{IPEC}},
      series    = {LIPIcs},
      volume    = {180},
      pages     = {27:1--27:3},
      publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
      year      = {2020}
    }
  • Samira Briongos and Malag`on and Manuel Moya and Thomas Eisenbarth: Microarchitectural Isolation Guarantees Through Execution Based Signatures. in XXXV Conference on Design of Circuits and Integrated Systems, DCIS 2020, Segovia, Spain, November 18-20, 2020, pp. 1-6, IEEE, 2020
    BibTeX Link
    @inproceedings{DBLP:conf/dcis/BriongosMM020,
    author = {Samira Briongos and
    Pedro Malag{'{o}}n and
    Jos{'{e}} Manuel Moya and
    Thomas Eisenbarth},
    title = {Microarchitectural Isolation Guarantees Through Execution Based Signatures},
    booktitle = {{XXXV} Conference on Design of Circuits and Integrated Systems, {DCIS}
    2020, Segovia, Spain, November 18-20, 2020},
    pages = {1--6},
    publisher = {{IEEE}},
    year = {2020},
    url = {https://doi.org/10.1109/DCIS51330.2020.9268660},
    doi = {10.1109/DCIS51330.2020.9268660},
    timestamp = {Tue, 08 Dec 2020 11:04:00 +0100},
    biburl = {https://dblp.org/rec/conf/dcis/BriongosMM020.bib},
    bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
  • Damien Desfontaines and Krahmer and Esfandiar Mohammadi: Passive and active attackers in noiseless privacy. CoRR, no. abs/1905.00650, 2019
    BibTeX Link
    @article{DBLP:journals/corr/abs-1905-00650,
      author    = {Damien Desfontaines and
                   Elisabeth Krahmer and
                   Esfandiar Mohammadi},
      title     = {Passive and active attackers in noiseless privacy},
      journal   = {CoRR},
      volume    = {abs/1905.00650},
      year      = {2019},
      url       = {http://arxiv.org/abs/1905.00650},
      archivePrefix = {arXiv},
      eprint    = {1905.00650},
      timestamp = {Mon, 27 May 2019 13:15:00 +0200},
      biburl    = {https://dblp.org/rec/journals/corr/abs-1905-00650.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
  • Sebastian Berndt and Wichelmann and Pott and Traving and Thomas Eisenbarth: ASAP: Algorithm Substitution Attacks on Cryptographic Protocols. IACR Cryptol. ePrint Arch., no. 2020, pp. 1452, 2020
    BibTeX
    @article{DBLP:journals/iacr/BerndtWPTE20,
      author    = {Sebastian Berndt and Jan Wichelmann and Claudius Pott and Tim{-}Henrik Traving and Thomas Eisenbarth},
      title     = {{ASAP:} Algorithm Substitution Attacks on Cryptographic Protocols},
      journal   = {{IACR} Cryptol. ePrint Arch.},
      volume    = {2020},
      pages     = {1452},
      year      = {2020}
    }
  • Max Bannach and Berndt and Schuster and Marcel Wienöbst: PACE Solver Description: PID\^\(\star\). in IPEC, no. 180, pp. 28:1-28:4, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020
    BibTeX
    @inproceedings{DBLP:conf/iwpec/BannachBSW20a,
      author    = {Max Bannach and
                   Sebastian Berndt and
                   Martin Schuster and
                   Marcel Wien{\"{o}}bst},
      title     = {{PACE} Solver Description: PID{\^{}}{\(\star\)}},
      booktitle = {{IPEC}},
      series    = {LIPIcs},
      volume    = {180},
      pages     = {28:1--28:4},
      publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
      year      = {2020}
    }
  • Okan Seker and Berndt and Wilke and Thomas Eisenbarth: SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis. in CCS, pp. 1033-1049, ACM, 2020
    BibTeX
    @inproceedings{DBLP:conf/ccs/SekerBW020,
      author    = {Okan Seker and
                   Sebastian Berndt and
                   Luca Wilke and
                   Thomas Eisenbarth},
      title     = {SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel
                   Analysis},
      booktitle = {{CCS}},
      pages     = {1033--1049},
      publisher = {{ACM}},
      year      = {2020}
    }
  • Debajyoti Das and Sebastian Meiser and Esfandiar Mohammadi and Aniket Kate: Comprehensive Anonymity Trilemma: User Coordination is not enough. in Proceedings on Privacy Enhancing Technologies (PETS/PoPETS) 2020.3, Sciendo, 2020
    BibTeX Link
    @inproceedings{DaMeMoKa_20:user-coordination,
      author        = {Debajyoti Das and Sebastian Meiser and Esfandiar Mohammadi and Aniket Kate},
      title         = {{Comprehensive Anonymity Trilemma: User Coordination is not enough}},
      booktitle     = {{Proceedings on Privacy Enhancing Technologies (PETS/PoPETS) 2020.3}},
      url     = {https://content.sciendo.com/view/journals/popets/2020/3/article-p356.xml},
      year          = {2020},
      publisher     = {Sciendo},
    }
    
  • Daniel Moghimi, Berk Sunar, Thomas Eisenbarth, Nadia Heninger: TPM-FAIL: TPM meets Timing and Lattice Attacks. in 29th USENIX Security Symposium (USENIX Security 20), USENIX Association, Boston, MA, aug,, 2020
    BibTeX Link
    @inproceedings {244048,
    title = {TPM-FAIL: {TPM} meets Timing and Lattice Attacks},
    author = {Daniel Moghimi, Berk Sunar, Thomas Eisenbarth, Nadia Heninger},
    booktitle = {29th {USENIX} Security Symposium ({USENIX} Security 20)},
    year = {2020},
    address = {Boston, MA},
    url = {https://www.usenix.org/conference/usenixsecurity20/presentation/moghimi},
    url = {https://tpm.fail/},
    publisher = {{USENIX} Association},
    month = aug,
    }
  • Max Bannach and Sebastian Berndt and Marten Maack and Matthias Mnich and Alexandra Lassota and Malin Rau and Malte Skambath: Solving Packing Problems with Few Small Items Using Rainbow Matchings. in MFCS 2020,, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020
    BibTeX
    @inproceedings{BerndtMFCS2020,
      author    = {Max Bannach and Sebastian Berndt and Marten Maack and  Matthias Mnich and Alexandra Lassota and Malin Rau and  Malte Skambath},
      title     = {Solving Packing Problems with Few Small Items Using Rainbow Matchings},
      booktitle = {MFCS 2020,
      series    = {LIPIcs},
      publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
      year      = {2020},
    }
    
  • Weissman, Zane and Tiemann, Thore and Moghimi, Daniel and Custodio, Evan and Eisenbarth, Thomas and Sunar, Berk: JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms. IACR Transactions on Cryptographic Hardware and Embedded Systems, no. 2020, pp. 169-195, Jun., 2020
    BibTeX Link
    @article{Weissman_Tiemann_Moghimi_Custodio_Eisenbarth_Sunar_2020,
    title = {JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms},
    author = {Weissman, Zane and Tiemann, Thore and Moghimi, Daniel and Custodio, Evan and Eisenbarth, Thomas and Sunar, Berk},
    volume = {2020},
    url = {https://tches.iacr.org/index.php/TCHES/article/view/8587},
    DOI = {10.13154/tches.v2020.i3.169-195},
    number = {3},
    journal={IACR Transactions on Cryptographic Hardware and Embedded Systems}, 
    year = {2020},
    month = {Jun.},
    pages = {169-195}
    }
    
  • Samira Briongos and Pedro Malagon and Jose M. Moya and Thomas Eisenbarth: RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks. in 29th USENIX Security Symposium (USENIX Security 20), pp. 1967-1984, USENIX Association, aug,, 2020
    BibTeX Link
    @inproceedings {251542,
    author = {Samira Briongos and Pedro Malagon and Jose M. Moya and Thomas Eisenbarth},
    title = {RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks},
    booktitle = {29th {USENIX} Security Symposium ({USENIX} Security 20)},
    year = {2020},
    isbn = {978-1-939133-17-5},
    pages = {1967--1984},
    url = {https://www.usenix.org/conference/usenixsecurity20/presentation/briongos},
    publisher = {{USENIX} Association},
    month = aug,
    }
    
    
  • Okan Seker and Thomas Eisenbarth and Maciej Liskiewicz: A White-Box Masking Scheme Resisting Computational and Algebraic Attacks. 2020
    BibTeX Link
    @misc{cryptoeprint:2020:443,
    author = {Okan Seker and Thomas Eisenbarth and Maciej Liskiewicz},
    title = {A White-Box Masking Scheme Resisting Computational and Algebraic Attacks},
    howpublished = {Cryptology ePrint Archive, Report 2020/443},
    year = {2020},
    note = {\url{https://eprint.iacr.org/2020/443}},
    url = {https://eprint.iacr.org/2020/443},
    }
    
  • L. Wilke and J. Wichelmann and M. Morbitzer and T. Eisenbarth: SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions. in 2020 IEEE Symposium on Security and Privacy (SP), pp. 1431-1444, IEEE Computer Society, Los Alamitos, CA, USA, may, 2020
    BibTeX Link
    @inproceedings{wilke2020sevurity,
    author = {L. Wilke and J. Wichelmann and M. Morbitzer and T. Eisenbarth},
    booktitle = {2020 IEEE Symposium on Security and Privacy (SP)},
    title = {SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions},
    year = {2020},
    volume = {},
    issn = {2375-1207},
    pages = {1431-1444},
    keywords = {application-security;attacks-and-defenses;cloud-security;network-and-systems-security;security-architectures;trustworthy-computing},
    url = {https://uzl-its.github.io/SEVurity/},
    publisher = {IEEE Computer Society},
    address = {Los Alamitos, CA, USA},
    month = {may}
    }
  • Tim Gellersen and Okan Seker and Thomas Eisenbarth: Differential Power Analysis of the Picnic Signature Scheme. 2020
    BibTeX Link
    @misc{cryptoeprint:2020:267,
        author = {Tim Gellersen and Okan Seker and Thomas Eisenbarth},
        title = {Differential Power Analysis of the Picnic Signature Scheme},
        howpublished = {Cryptology ePrint Archive, Report 2020/267},
        year = {2020},
        url = {https://eprint.iacr.org/2020/267},
        note = {\url{https://eprint.iacr.org/2020/267}},
    }
  • Sebastian Berndt and Klaus Jansen and Kim-Manuel Klein: Fully dynamic bin packing revisited. Math. Program., no. 179, pp. 109-155, 2020
    BibTeX
    @article{DBLP:journals/mp/BerndtJK20,
      author    = {Sebastian Berndt and Klaus Jansen and Kim{-}Manuel Klein},
      title     = {Fully dynamic bin packing revisited},
      journal   = {Math. Program.},
      volume    = {179},
      number    = {1},
      pages     = {109--155},
      year      = {2020}
    }

2019

  • Max Bannach and Sebastian Berndt: Practical Access to Dynamic Programming on Tree Decompositions. Algorithms, no. 12, pp. 172, 2019
    BibTeX
    @article{DBLP:journals/algorithms/BannachB19,
      author    = {Max Bannach and Sebastian Berndt},
      title     = {Practical Access to Dynamic Programming on Tree Decompositions},
      journal   = {Algorithms},
      volume    = {12},
      number    = {8},
      pages     = {172},
      year      = {2019}
    }
  • Sebastian Berndt and Valentin Dreismann and Kilian Grage and Klaus Jansen and Ingmar Knof: Robust Online Algorithms for Certain Dynamic Packing Problems. in WAOA, no. 11926, pp. 43-59, Springer, 2019
    BibTeX
    @inproceedings{DBLP:conf/waoa/BerndtDGJK19,
      author    = {Sebastian Berndt and Valentin Dreismann and Kilian Grage and Klaus Jansen and Ingmar Knof},
      title     = {Robust Online Algorithms for Certain Dynamic Packing Problems},
      booktitle = {{WAOA}},
      series    = {Lecture Notes in Computer Science},
      volume    = {11926},
      pages     = {43--59},
      publisher = {Springer},
      year      = {2019}
    }
  • Sebastian Berndt and Leah Epstein and Klaus Jansen and Asaf Levin and Marten Maack and Lars Rohwedder: Online Bin Covering with Limited Migration. in ESA, no. 144, pp. 18:1-18:14, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2019
    BibTeX
    @inproceedings{DBLP:conf/esa/BerndtEJLMR19,
      author    = {Sebastian Berndt and Leah Epstein and Klaus Jansen and Asaf Levin and Marten Maack and Lars Rohwedder},
      title     = {Online Bin Covering with Limited Migration},
      booktitle = {{ESA}},
      series    = {LIPIcs},
      volume    = {144},
      pages     = {18:1--18:14},
      publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
      year      = {2019}
    }
  • Max Bannach and Sebastian Berndt: Positive-Instance Driven Dynamic Programming for Graph Searching. in WADS, no. 11646, pp. 43-56, Springer, 2019
    BibTeX
    @inproceedings{DBLP:conf/wads/BannachB19,
      author    = {Max Bannach and Sebastian Berndt},
      title     = {Positive-Instance Driven Dynamic Programming for Graph Searching},
      booktitle = {{WADS}},
      series    = {Lecture Notes in Computer Science},
      volume    = {11646},
      pages     = {43--56},
      publisher = {Springer},
      year      = {2019}
    }
  • Gulmezoglu, B. and Moghimi, A. and Eisenbarth, T. and Sunar, B.: FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning,. arXiv e-prints, 2019
    BibTeX Link
    @ARTICLE{2019arXiv190703651G,
       author = {{Gulmezoglu}, B. and {Moghimi}, A. and {Eisenbarth}, T. and {Sunar}, B.},
        title = "{FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning}",
      journal = {arXiv e-prints},
    archivePrefix = "arXiv",
       eprint = {1907.03651},
     primaryClass = "cs.CR",
     keywords = {Computer Science - Cryptography and Security, Computer Science - Machine Learning},
         year = {2019},
       adsurl = {https://ui.adsabs.harvard.edu/abs/2019arXiv190703651G},
     url = {https://ui.adsabs.harvard.edu/abs/2019arXiv190703651G},
      adsnote = {Provided by the SAO/NASA Astrophysics Data System}
    }
  • Gulmezoglu, Berk and Zankl, Andreas and Tol, M. Caner and Islam, Saad and Eisenbarth, Thomas and Sunar, Berk: Undermining User Privacy on Mobile Devices Using AI. in Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, pp. 214-227, ACM, New York, NY, USA, 2019
    BibTeX Link
    @inproceedings{Gulmezoglu:2019:UUP:3321705.3329804,
     author = {Gulmezoglu, Berk and Zankl, Andreas and Tol, M. Caner and Islam, Saad and Eisenbarth, Thomas and Sunar, Berk},
     title = {Undermining User Privacy on Mobile Devices Using AI},
     booktitle = {Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security},
     series = {Asia CCS '19},
     year = {2019},
     isbn = {978-1-4503-6752-3},
     location = {Auckland, New Zealand},
     pages = {214--227},
     numpages = {14},
     url = {http://doi.acm.org/10.1145/3321705.3329804},
     doi = {10.1145/3321705.3329804},
     acmid = {3329804},
     publisher = {ACM},
     address = {New York, NY, USA},
     keywords = {activity inference, arm, artificial intelligence, cache attack, machine learning, microarchitecture, mobile device, user privacy},
    } 
  • David M. Sommer and Sebastian Meiser and Esfandiar Mohammadi,: Privacy Loss Classes: The Central Limit Theorem in Differential Privacy,. Proceedings on Privacy Enhancing Technologies,, no. 2019,, pp. 245 - 269,, Sciendo,, Berlin,, 2019,
    BibTeX Link
    @article { PrivacyLossClassesTheCentralLimitTheoreminDifferentialPrivacy,
          author = "David M. Sommer and Sebastian Meiser and Esfandiar Mohammadi",
          title = "Privacy Loss Classes: The Central Limit Theorem in Differential Privacy",
          journal = "Proceedings on Privacy Enhancing Technologies",
          year = "2019",
          publisher = "Sciendo",
          address = "Berlin",
          volume = "2019",
          number = "2",
          doi = "https://doi.org/10.2478/popets-2019-0029",
          pages=      "245 - 269",
          url = "https://content.sciendo.com/view/journals/popets/2019/2/article-p245.xml"
    }
  • Islam, Saad and Moghimi, Ahmad and Bruhns, Ida and Krebbel, Moritz and Gulmezoglu, Berk and Eisenbarth, Thomas and Sunar, Berk: SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks. in 28th USENIX Security Symposium (USENIX Security 19), USENIX Association, Santa Clara, CA, 2019
    BibTeX Link
    @inproceedings {236252,
    author = {Islam, Saad and Moghimi, Ahmad and Bruhns, Ida and Krebbel, Moritz and Gulmezoglu, Berk and Eisenbarth, Thomas and Sunar, Berk},
    title = {{SPOILER}: Speculative Load Hazards Boost Rowhammer and Cache
    Attacks},
    booktitle = {28th {USENIX} Security Symposium ({USENIX} Security 19)},
    year = {2019},
    address = {Santa Clara, CA},
    url = {https://www.usenix.org/conference/usenixsecurity19/presentation/islam},
    publisher = {{USENIX} Association},
    }
    
  • David Sommer and Aritra Dhar and Luka Malisa and Esfandiar Mohammadi and Daniel Ronzani and Srdjan Capkun: Deniable Upload and Download via Passive Participation. in 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19), pp. 649-666, USENIX Association, Boston, MA, feb,, 2019
    BibTeX Link
    @inproceedings {225984,
    author = {David Sommer and Aritra Dhar and Luka Malisa and Esfandiar Mohammadi and Daniel Ronzani and Srdjan Capkun},
    title = {Deniable Upload and Download via Passive Participation},
    booktitle = {16th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 19)},
    year = {2019},
    isbn = {978-1-931971-49-2},
    address = {Boston, MA},
    pages = {649--666},
    url = {https://www.usenix.org/conference/nsdi19/presentation/sommer},
    publisher = {{USENIX} Association},
    month = feb,
    }
  • M. Stelzner and T. Eisenbarth: IT Security in Lübeck – The design of a modern and future-proof security curriculum. in 2018 12th European Workshop on Microelectronics Education (EWME), pp. 79-82, Sep., 2018
    BibTeX Link
    @INPROCEEDINGS{8629494,
    author={M. {Stelzner} and T. {Eisenbarth}},
    booktitle={2018 12th European Workshop on Microelectronics Education (EWME)},
    title={IT Security in Lübeck – The design of a modern and future-proof security curriculum},
    year={2018},
    volume={},
    number={},
    pages={79-82},
    keywords={computer science education;educational courses;further education;security of data;University of Lübeck;computer scientist training;IT security;degree program;design principle;well trained security professionals;dependable systems;digitally connected systems;future-proof security curriculum;Computer science;Education;Hardware;Computer security;Software reliability;IT Security;degree program;bachelor;master;education;security by design},
    url={https://ieeexplore.ieee.org/document/8629494},
    doi={10.1109/EWME.2018.8629494},
    ISSN={},
    month={Sep.},}

2018

  • Max Bannach and Sebastian Berndt: Practical Access to Dynamic Programming on Tree Decompositions. in ESA, no. 112, pp. 6:1-6:13, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2018
    BibTeX
    @inproceedings{DBLP:conf/esa/BannachB18,
      author    = {Max Bannach and Sebastian Berndt},
      title     = {Practical Access to Dynamic Programming on Tree Decompositions},
      booktitle = {{ESA}},
      series    = {LIPIcs},
      volume    = {112},
      pages     = {6:1--6:13},
      publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
      year      = {2018}
    }
  • Seker, Okan and Fernandez-Rubio, Abraham and Eisenbarth, Thomas and Steinwandt, Rainer: Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks. IACR Transactions on Cryptographic Hardware and Embedded Systems, no. 2018, pp. 394-430, Aug., 2018
    BibTeX Link
    @article{Seker_Fernandez-Rubio_Eisenbarth_Steinwandt_2018,
     title={Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks},
     volume={2018},
     url={https://tches.iacr.org/index.php/TCHES/article/view/7281},
     DOI={10.13154/tches.v2018.i3.394-430},
     number={3},
     journal={IACR Transactions on Cryptographic Hardware and Embedded Systems},
     author={Seker, Okan and Fernandez-Rubio, Abraham and Eisenbarth, Thomas and Steinwandt, Rainer},
     year={2018},
     month={Aug.},
     pages={394-430}
    }
  • Wichelmann, Jan and Moghimi, Ahmad and Eisenbarth, Thomas and Sunar, Berk: MicroWalk: A Framework for Finding Side Channels in Binaries. in Proceedings of the 34th Annual Computer Security Applications Conference, pp. 161-173, ACM, New York, NY, USA, 2018
    BibTeX Link
    @inproceedings{Wichelmann2018MicroWalkAF,
     author = {Wichelmann, Jan and Moghimi, Ahmad and Eisenbarth, Thomas and Sunar, Berk},
     title = {MicroWalk: A Framework for Finding Side Channels in Binaries},
     booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference},
     series = {ACSAC '18},
     year = {2018},
     location = {San Juan, PR, USA},
     pages = {161--173},
     url = {http://doi.acm.org/10.1145/3274694.3274741},
     doi = {10.1145/3274694.3274741},
     publisher = {ACM},
     address = {New York, NY, USA}
    } 
    
    
  • Inci, Mehmet Sinan and Eisenbarth, Thomas and Sunar, Berk: DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes. 2018
    BibTeX Link
    @misc{inci2018deepcloak,
        title={DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes},
        author={Inci, Mehmet Sinan and Eisenbarth, Thomas and Sunar, Berk},
        year={2018},
        eprint={1808.01352},
        archivePrefix={arXiv},
        primaryClass={cs.CR}
        url={https://arxiv.org/abs/1808.01352}
    }
  • Sebastian Berndt: Computing Tree Width: From Theory to Practice and Back. in CiE, no. 10936, pp. 81-88, Springer, 2018
    BibTeX
    @inproceedings{DBLP:conf/cie/Berndt18,
      author    = {Sebastian Berndt},
      title     = {Computing Tree Width: From Theory to Practice and Back},
      booktitle = {CiE},
      series    = {Lecture Notes in Computer Science},
      volume    = {10936},
      pages     = {81--88},
      publisher = {Springer},
      year      = {2018}
    }
  • Sebastian Berndt and Kim-Manuel Klein: Using Structural Properties for Integer Programs. in CiE, no. 10936, pp. 89-96, Springer, 2018
    BibTeX
    @inproceedings{DBLP:conf/cie/BerndtK18,
      author    = {Sebastian Berndt and Kim{-}Manuel Klein},
      title     = {Using Structural Properties for Integer Programs},
      booktitle = {CiE},
      series    = {Lecture Notes in Computer Science},
      volume    = {10936},
      pages     = {89--96},
      publisher = {Springer},
      year      = {2018}
    }
  • Dall, Fergus and Gabrielle De Micheli and Eisenbarth, Thomas and Genkin, Daniel and Heninger, Nadia and Moghimi, Ahmad and Yarom, Yuval: CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst., no. 2018, pp. 171-191, 2018
    BibTeX Link
    @article{DBLP:journals/tches/DallMEGHMY18,
      author    = {Dall, Fergus and
                   Gabrielle De Micheli and Eisenbarth, Thomas and Genkin, Daniel and Heninger, Nadia and Moghimi, Ahmad and Yarom, Yuval},
      title     = {CacheQuote: Efficiently Recovering Long-term Secrets of {SGX} {EPID}
                   via Cache Attacks},
      journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
      volume    = {2018},
      number    = {2},
      pages     = {171--191},
      year      = {2018},
      url       = {https://doi.org/10.13154/tches.v2018.i2.171-191},
      doi       = {10.13154/tches.v2018.i2.171-191},
      timestamp = {Tue, 05 Jun 2018 15:05:26 +0200},
    
    }
  • Sebastian Berndt and Maciej Liskiewicz: On the Gold Standard for Security of Universal Steganography. in EUROCRYPT (1), no. 10820, pp. 29-60, Springer, 2018
    BibTeX
    @inproceedings{DBLP:conf/eurocrypt/BerndtL18,
      author    = {Sebastian Berndt and Maciej Liskiewicz},
      title     = {On the Gold Standard for Security of Universal Steganography},
      booktitle = {{EUROCRYPT} {(1)}},
      series    = {Lecture Notes in Computer Science},
      volume    = {10820},
      pages     = {29--60},
      publisher = {Springer},
      year      = {2018}
    }
  • Moghimi, Ahmad and Wichelmann, Jan and Eisenbarth, Thomas and Sunar, Berk: MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations. International Journal of Parallel Programming, Nov, 2018
    BibTeX Link
    @Article{Moghimi2018,
      author="Moghimi, Ahmad and Wichelmann, Jan and Eisenbarth, Thomas and Sunar, Berk",
      title="MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations",
      journal="International Journal of Parallel Programming",
      year="2018",
      month="Nov",
      day="09",
      issn="1573-7640",
      url="https://doi.org/10.1007/s10766-018-0611-9",
    }
  • Briongos, Samira and Irazoqui, Gorka and Malagon, Pedro and Eisenbarth, Thomas: CacheShield: Detecting Cache Attacks through Self-Observation. in Proceedings of the Eighth ACM Conference on Data and Application and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 224-235, 2018
    BibTeX Link
    @inproceedings{DBLP:conf/codaspy/BriongosIME18,
      author    = {Briongos, Samira and Irazoqui, Gorka and Malagon, Pedro and Eisenbarth, Thomas},
      title     = {CacheShield: Detecting Cache Attacks through Self-Observation},
      booktitle = {Proceedings of the Eighth {ACM} Conference on Data and Application
                   Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21,
                   2018},
      pages     = {224--235},
      year      = {2018},
      crossref  = {DBLP:conf/codaspy/2018},
      url       = {http://doi.acm.org/10.1145/3176258.3176320},
      doi       = {10.1145/3176258.3176320},
      timestamp = {Thu, 15 Mar 2018 11:27:57 +0100},
    }
    
    
    
  • Irazoqui, Gorka and Eisenbarth, Thomas and Sunar, Berk: MASCAT: Preventing Microarchitectural Attacks Before Distribution. in Proceedings of the Eighth ACM Conference on Data and Application and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 377-388, 2018
    BibTeX Link
    @inproceedings{DBLP:conf/codaspy/IrazoquiES18,
      author    = {Irazoqui, Gorka and Eisenbarth, Thomas and Sunar, Berk},
      title     = {{MASCAT:} Preventing Microarchitectural Attacks Before Distribution},
      booktitle = {Proceedings of the Eighth {ACM} Conference on Data and Application
                   Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21,
                   2018},
      pages     = {377--388},
      year      = {2018},
      crossref  = {DBLP:conf/codaspy/2018},
      url       = {http://doi.acm.org/10.1145/3176258.3176316},
      doi       = {10.1145/3176258.3176316},
      timestamp = {Thu, 15 Mar 2018 11:27:57 +0100},
    }