Presentations and Talks

Presentations and talks are arranged on our Youtube channel.

Publications

2021

  • Okan Seker, Thomas Eisenbarth and Maciej Liskiewicz,
    A White-Box Masking Scheme Resisting Computational and Algebraic Attacks , IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 2, pp. 61-105, 2021. Cryptology ePrint Archive, Report 2020/443.
    DOI:10.46586/tches.v2021.i2.61-105
    File: https://tches.iacr.org/index.php/TCHES/article/view/8788

  • Sebastian Berndt, Klaus Jansen and Alexandra Lassota,
    Tightness of Sensitivity and Proximity Bounds for Integer Programs in SOFSEM , 2021.

  • Luca Wilke, Jan Wichelmann, Florian Sieck and Thomas Eisenbarth,
    undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation in 2021 IEEE Security and Privacy Workshops (SPW) , 2021. pp. 456-466.
    DOI:10.1109/SPW53761.2021.00064
    File: https://uzl-its.github.io/undeserved-trust/

  • Tim Gellersen, Okan Seker and Thomas Eisenbarth,
    Differential Power Analysis of the Picnic Signature Scheme in Post-Quantum Cryptography , Cheon, Jung Hee and Tillich, Jean-Pierre, Eds. Cham: Springer International Publishing, 2021. pp. 177--194.
    ISBN:978-3-030-81293-5

  • Diego F. Aranha, Sebastian Berndt, Thomas Eisenbarth, Okan Seker, Akira Takahashi, Luca Wilke and Greg Zaverucha,
    Side-Channel Protections for Picnic Signatures , IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 4, pp. 239-282, 2021.
    DOI:10.46586/tches.v2021.i4.239-282
    File: https://tches.iacr.org/index.php/TCHES/article/view/9066

  • Sebastian Berndt, Klaus Jansen and Kim-Manuel Klein,
    New Bounds for the Vertices of the Integer Hull in SOSA@SODA , SIAM, 2021.

  • 2020

  • Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving and Thomas Eisenbarth,
    ASAP: Algorithm Substitution Attacks on Cryptographic Protocols , IACR Cryptol. ePrint Arch. , vol. 2020, pp. 1452, 2020.
    File: https://eprint.iacr.org/2020/1452

  • Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi and Aniket Kate,
    Comprehensive Anonymity Trilemma: User Coordination is not enough in Proceedings on Privacy Enhancing Technologies (PETS/PoPETS) 2020.3 , Sciendo, 2020.
    File: https://content.sciendo.com/view/journals/popets/2020/3/article-p356.xml

  • Zane Weissman, Thore Tiemann, Daniel Moghimi, Evan Custodio, Thomas Eisenbarth and Berk Sunar,
    JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms , IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2020, no. 3, pp. 169-195, 2020.
    DOI:10.13154/tches.v2020.i3.169-195
    File: https://tches.iacr.org/index.php/TCHES/article/view/8587

  • Samira Briongos, Pedro Malag'on, Jose Manuel Moya and Thomas Eisenbarth,
    Microarchitectural Isolation Guarantees Through Execution Based Signatures in XXXV Conference on Design of Circuits and Integrated Systems, DCIS, 2020, Segovia, Spain, November 18-20, 2020 , IEEE, 2020. pp. 1--6.
    DOI:10.1109/DCIS51330.2020.9268660
    File: https://doi.org/10.1109/DCIS51330.2020.9268660

  • Max Bannach, Sebastian Berndt, Martin Schuster and Marcel Wienöbst,
    PACE Solver Description: Fluid in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 27:1--27:3.

  • Max Bannach, Sebastian Berndt, Martin Schuster and Marcel Wienöbst,
    PACE Solver Description: PID (star) in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 28:1--28:4.

  • Samira Briongos, Pedro Malagon, Jose M. Moya and Thomas Eisenbarth,
    RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks in 29th USENIX Security Symposium (USENIX Security 20) , USENIX Association, 2020. pp. 1967--1984.
    ISBN:978-1-939133-17-5
    File: https://www.usenix.org/conference/usenixsecurity20/presentation/briongos

  • Luca Wilke, Jan Wichelmann, Mathias Morbitzer and Thomas Eisenbarth,
    SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions in 2020 IEEE Symposium on Security and Privacy (SP) , Los Alamitos, CA, USA: IEEE Computer Society, 2020. pp. 1431-1444.
    File: https://uzl-its.github.io/SEVurity/

  • Okan Seker, Sebastian Berndt, Luca Wilke and Thomas Eisenbarth,
    SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis in CCS , ACM, 2020. pp. 1033--1049.
    DOI:10.1145/3372297.3417889
    File: https://dl.acm.org/doi/10.1145/3372297.3417889

  • Max Bannach, Sebastian Berndt, Marten Maack, Matthias Mnich, Alexandra Lassota, Malin Rau and Malte Skambath,
    Solving Packing Problems with Few Small Items Using Rainbow Matchings in MFCS 2020 , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020.

  • Daniel Moghimi, Berk Sunar, Thomas Eisenbarth and Nadia Heninger,
    TPM-FAIL: TPM meets Timing and Lattice Attacks in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, 2020.
    File: https://tpm.fail/

  • Sebastian Berndt and Maciej Liskiewicz,
    On the universal steganography of optimal rate , Inf. Comput. , vol. 275, pp. 104632, 2020.

  • 2019

  • Saad Islam, Ahmad Moghimi, Ida Bruhns, Moritz Krebbel, Berk Gulmezoglu, Thomas Eisenbarth and Berk Sunar,
    SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks in 28th USENIX Security Symposium (USENIX Security 19) , Santa Clara, CA: USENIX Association, 2019.
    File: https://www.usenix.org/conference/usenixsecurity19/presentation/islam

  • Berk Gulmezoglu, Andreas Zankl, M. Caner Tol, Saad Islam, Thomas Eisenbarth and Berk Sunar,
    Undermining User Privacy on Mobile Devices Using AI in Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2019. pp. 214--227.
    DOI:10.1145/3321705.3329804
    ISBN:978-1-4503-6752-3
    File: http://doi.acm.org/10.1145/3321705.3329804

  • Berk Gulmezoglu, Ahmad Moghimi, Thomas Eisenbarth and Berk Sunar,
    FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning , arXiv e-prints , 2019.
    File: https://ui.adsabs.harvard.edu/abs/2019arXiv190703651G

  • David Sommer, Sebastian Meiser and Esfandiar Mohammadi,
    Privacy Loss Classes: The Central Limit Theorem in Differential Privacy , Proceedings on Privacy Enhancing Technologies , vol. 2019, no. 2, pp. 245 - 269, 2019. Sciendo.
    DOI:https://doi.org/10.2478/popets-2019-0029
    File: https://content.sciendo.com/view/journals/popets/2019/2/article-p245.xml

  • David Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani and Srdjan Capkun,
    Deniable Upload and Download via Passive Participation in 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) , Boston, MA: USENIX Association, 2019. pp. 649--666.
    ISBN:978-1-931971-49-2
    File: https://www.usenix.org/conference/nsdi19/presentation/sommer

  • Damien Desfontaines, Elisabeth Krahmer and Esfandiar Mohammadi,
    Passive and active attackers in noiseless privacy , CoRR , vol. abs/1905.00650, 2019.
    File: http://arxiv.org/abs/1905.00650

  • 2018

  • Ahmad Moghimi, Jan Wichelmann, Thomas Eisenbarth and Berk Sunar,
    MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations , International Journal of Parallel Programming , 2018.
    File: https://doi.org/10.1007/s10766-018-0611-9