Publications
2021
-
Sebastian Berndt and Klaus Jansen and Alexandra Lassota: Tightness of Sensitivity and Proximity Bounds for Integer Programs. in SOFSEM (accepted), 2021
@inproceedings{BJL2020, author = {Sebastian Berndt and Klaus Jansen and Alexandra Lassota}, title = {Tightness of Sensitivity and Proximity Bounds for Integer Programs}, booktitle = {{SOFSEM} (accepted)}, year = {2021} }
-
Sebastian Berndt and Klaus Jansen and Kim-Manuel Klein: New Bounds for the Vertices of the Integer Hull. in SOSA@SODA, SIAM, 2021
@inproceedings{DBLP:conf/sods/BerndtInteger, author = {Sebastian Berndt and Klaus Jansen and Kim{-}Manuel Klein}, title = {New Bounds for the Vertices of the Integer Hull}, booktitle = {SOSA@SODA}, publisher = {{SIAM}}, year = {2021} }
2020
-
Sebastian Berndt and Maciej Liskiewicz: On the universal steganography of optimal rate. Inf. Comput., no. 275, pp. 104632, 2020
@article{DBLP:journals/iandc/BerndtL20, author = {Sebastian Berndt and Maciej Liskiewicz}, title = {On the universal steganography of optimal rate}, journal = {Inf. Comput.}, volume = {275}, pages = {104632}, year = {2020} }
-
Max Bannach and Berndt and Schuster and Marcel Wienöbst: PACE Solver Description: Fluid. in IPEC, no. 180, pp. 27:1-27:3, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020
@inproceedings{DBLP:conf/iwpec/BannachBSW20, author = {Max Bannach and Sebastian Berndt and Martin Schuster and Marcel Wien{\"{o}}bst}, title = {{PACE} Solver Description: Fluid}, booktitle = {{IPEC}}, series = {LIPIcs}, volume = {180}, pages = {27:1--27:3}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020} }
-
Samira Briongos and Malag`on and Manuel Moya and Thomas Eisenbarth: Microarchitectural Isolation Guarantees Through Execution Based Signatures. in XXXV Conference on Design of Circuits and Integrated Systems, DCIS 2020, Segovia, Spain, November 18-20, 2020, pp. 1-6, IEEE, 2020
@inproceedings{DBLP:conf/dcis/BriongosMM020, author = {Samira Briongos and Pedro Malag{'{o}}n and Jos{'{e}} Manuel Moya and Thomas Eisenbarth}, title = {Microarchitectural Isolation Guarantees Through Execution Based Signatures}, booktitle = {{XXXV} Conference on Design of Circuits and Integrated Systems, {DCIS} 2020, Segovia, Spain, November 18-20, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/DCIS51330.2020.9268660}, doi = {10.1109/DCIS51330.2020.9268660}, timestamp = {Tue, 08 Dec 2020 11:04:00 +0100}, biburl = {https://dblp.org/rec/conf/dcis/BriongosMM020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
-
Damien Desfontaines and Krahmer and Esfandiar Mohammadi: Passive and active attackers in noiseless privacy. CoRR, no. abs/1905.00650, 2019
@article{DBLP:journals/corr/abs-1905-00650, author = {Damien Desfontaines and Elisabeth Krahmer and Esfandiar Mohammadi}, title = {Passive and active attackers in noiseless privacy}, journal = {CoRR}, volume = {abs/1905.00650}, year = {2019}, url = {http://arxiv.org/abs/1905.00650}, archivePrefix = {arXiv}, eprint = {1905.00650}, timestamp = {Mon, 27 May 2019 13:15:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-00650.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
-
Sebastian Berndt and Wichelmann and Pott and Traving and Thomas Eisenbarth: ASAP: Algorithm Substitution Attacks on Cryptographic Protocols. IACR Cryptol. ePrint Arch., no. 2020, pp. 1452, 2020
@article{DBLP:journals/iacr/BerndtWPTE20, author = {Sebastian Berndt and Jan Wichelmann and Claudius Pott and Tim{-}Henrik Traving and Thomas Eisenbarth}, title = {{ASAP:} Algorithm Substitution Attacks on Cryptographic Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, volume = {2020}, pages = {1452}, year = {2020} }
-
Max Bannach and Berndt and Schuster and Marcel Wienöbst: PACE Solver Description: PID\^\(\star\). in IPEC, no. 180, pp. 28:1-28:4, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020
@inproceedings{DBLP:conf/iwpec/BannachBSW20a, author = {Max Bannach and Sebastian Berndt and Martin Schuster and Marcel Wien{\"{o}}bst}, title = {{PACE} Solver Description: PID{\^{}}{\(\star\)}}, booktitle = {{IPEC}}, series = {LIPIcs}, volume = {180}, pages = {28:1--28:4}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020} }
-
Okan Seker and Berndt and Wilke and Thomas Eisenbarth: SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis. in CCS, pp. 1033-1049, ACM, 2020
@inproceedings{DBLP:conf/ccs/SekerBW020, author = {Okan Seker and Sebastian Berndt and Luca Wilke and Thomas Eisenbarth}, title = {SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis}, booktitle = {{CCS}}, pages = {1033--1049}, publisher = {{ACM}}, year = {2020} }
-
Debajyoti Das and Sebastian Meiser and Esfandiar Mohammadi and Aniket Kate: Comprehensive Anonymity Trilemma: User Coordination is not enough. in Proceedings on Privacy Enhancing Technologies (PETS/PoPETS) 2020.3, Sciendo, 2020
@inproceedings{DaMeMoKa_20:user-coordination, author = {Debajyoti Das and Sebastian Meiser and Esfandiar Mohammadi and Aniket Kate}, title = {{Comprehensive Anonymity Trilemma: User Coordination is not enough}}, booktitle = {{Proceedings on Privacy Enhancing Technologies (PETS/PoPETS) 2020.3}}, url = {https://content.sciendo.com/view/journals/popets/2020/3/article-p356.xml}, year = {2020}, publisher = {Sciendo}, }
-
Daniel Moghimi, Berk Sunar, Thomas Eisenbarth, Nadia Heninger: TPM-FAIL: TPM meets Timing and Lattice Attacks. in 29th USENIX Security Symposium (USENIX Security 20), USENIX Association, Boston, MA, aug,, 2020
@inproceedings {244048, title = {TPM-FAIL: {TPM} meets Timing and Lattice Attacks}, author = {Daniel Moghimi, Berk Sunar, Thomas Eisenbarth, Nadia Heninger}, booktitle = {29th {USENIX} Security Symposium ({USENIX} Security 20)}, year = {2020}, address = {Boston, MA}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/moghimi}, url = {https://tpm.fail/}, publisher = {{USENIX} Association}, month = aug, }
-
Max Bannach and Sebastian Berndt and Marten Maack and Matthias Mnich and Alexandra Lassota and Malin Rau and Malte Skambath: Solving Packing Problems with Few Small Items Using Rainbow Matchings. in MFCS 2020,, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020
@inproceedings{BerndtMFCS2020, author = {Max Bannach and Sebastian Berndt and Marten Maack and Matthias Mnich and Alexandra Lassota and Malin Rau and Malte Skambath}, title = {Solving Packing Problems with Few Small Items Using Rainbow Matchings}, booktitle = {MFCS 2020, series = {LIPIcs}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, }
-
Weissman, Zane and Tiemann, Thore and Moghimi, Daniel and Custodio, Evan and Eisenbarth, Thomas and Sunar, Berk: JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms. IACR Transactions on Cryptographic Hardware and Embedded Systems, no. 2020, pp. 169-195, Jun., 2020
@article{Weissman_Tiemann_Moghimi_Custodio_Eisenbarth_Sunar_2020, title = {JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms}, author = {Weissman, Zane and Tiemann, Thore and Moghimi, Daniel and Custodio, Evan and Eisenbarth, Thomas and Sunar, Berk}, volume = {2020}, url = {https://tches.iacr.org/index.php/TCHES/article/view/8587}, DOI = {10.13154/tches.v2020.i3.169-195}, number = {3}, journal={IACR Transactions on Cryptographic Hardware and Embedded Systems}, year = {2020}, month = {Jun.}, pages = {169-195} }
-
Samira Briongos and Pedro Malagon and Jose M. Moya and Thomas Eisenbarth: RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks. in 29th USENIX Security Symposium (USENIX Security 20), pp. 1967-1984, USENIX Association, aug,, 2020
@inproceedings {251542, author = {Samira Briongos and Pedro Malagon and Jose M. Moya and Thomas Eisenbarth}, title = {RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks}, booktitle = {29th {USENIX} Security Symposium ({USENIX} Security 20)}, year = {2020}, isbn = {978-1-939133-17-5}, pages = {1967--1984}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/briongos}, publisher = {{USENIX} Association}, month = aug, }
-
Okan Seker and Thomas Eisenbarth and Maciej Liskiewicz: A White-Box Masking Scheme Resisting Computational and Algebraic Attacks. 2020
@misc{cryptoeprint:2020:443, author = {Okan Seker and Thomas Eisenbarth and Maciej Liskiewicz}, title = {A White-Box Masking Scheme Resisting Computational and Algebraic Attacks}, howpublished = {Cryptology ePrint Archive, Report 2020/443}, year = {2020}, note = {\url{https://eprint.iacr.org/2020/443}}, url = {https://eprint.iacr.org/2020/443}, }
-
L. Wilke and J. Wichelmann and M. Morbitzer and T. Eisenbarth: SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions. in 2020 IEEE Symposium on Security and Privacy (SP), pp. 1431-1444, IEEE Computer Society, Los Alamitos, CA, USA, may, 2020
@inproceedings{wilke2020sevurity, author = {L. Wilke and J. Wichelmann and M. Morbitzer and T. Eisenbarth}, booktitle = {2020 IEEE Symposium on Security and Privacy (SP)}, title = {SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions}, year = {2020}, volume = {}, issn = {2375-1207}, pages = {1431-1444}, keywords = {application-security;attacks-and-defenses;cloud-security;network-and-systems-security;security-architectures;trustworthy-computing}, url = {https://uzl-its.github.io/SEVurity/}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, month = {may} }
-
Tim Gellersen and Okan Seker and Thomas Eisenbarth: Differential Power Analysis of the Picnic Signature Scheme. 2020
@misc{cryptoeprint:2020:267, author = {Tim Gellersen and Okan Seker and Thomas Eisenbarth}, title = {Differential Power Analysis of the Picnic Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2020/267}, year = {2020}, url = {https://eprint.iacr.org/2020/267}, note = {\url{https://eprint.iacr.org/2020/267}}, }
-
Sebastian Berndt and Klaus Jansen and Kim-Manuel Klein: Fully dynamic bin packing revisited. Math. Program., no. 179, pp. 109-155, 2020
@article{DBLP:journals/mp/BerndtJK20, author = {Sebastian Berndt and Klaus Jansen and Kim{-}Manuel Klein}, title = {Fully dynamic bin packing revisited}, journal = {Math. Program.}, volume = {179}, number = {1}, pages = {109--155}, year = {2020} }
2019
-
Max Bannach and Sebastian Berndt: Practical Access to Dynamic Programming on Tree Decompositions. Algorithms, no. 12, pp. 172, 2019
@article{DBLP:journals/algorithms/BannachB19, author = {Max Bannach and Sebastian Berndt}, title = {Practical Access to Dynamic Programming on Tree Decompositions}, journal = {Algorithms}, volume = {12}, number = {8}, pages = {172}, year = {2019} }
-
Sebastian Berndt and Valentin Dreismann and Kilian Grage and Klaus Jansen and Ingmar Knof: Robust Online Algorithms for Certain Dynamic Packing Problems. in WAOA, no. 11926, pp. 43-59, Springer, 2019
@inproceedings{DBLP:conf/waoa/BerndtDGJK19, author = {Sebastian Berndt and Valentin Dreismann and Kilian Grage and Klaus Jansen and Ingmar Knof}, title = {Robust Online Algorithms for Certain Dynamic Packing Problems}, booktitle = {{WAOA}}, series = {Lecture Notes in Computer Science}, volume = {11926}, pages = {43--59}, publisher = {Springer}, year = {2019} }
-
Sebastian Berndt and Leah Epstein and Klaus Jansen and Asaf Levin and Marten Maack and Lars Rohwedder: Online Bin Covering with Limited Migration. in ESA, no. 144, pp. 18:1-18:14, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2019
@inproceedings{DBLP:conf/esa/BerndtEJLMR19, author = {Sebastian Berndt and Leah Epstein and Klaus Jansen and Asaf Levin and Marten Maack and Lars Rohwedder}, title = {Online Bin Covering with Limited Migration}, booktitle = {{ESA}}, series = {LIPIcs}, volume = {144}, pages = {18:1--18:14}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2019} }
-
Max Bannach and Sebastian Berndt: Positive-Instance Driven Dynamic Programming for Graph Searching. in WADS, no. 11646, pp. 43-56, Springer, 2019
@inproceedings{DBLP:conf/wads/BannachB19, author = {Max Bannach and Sebastian Berndt}, title = {Positive-Instance Driven Dynamic Programming for Graph Searching}, booktitle = {{WADS}}, series = {Lecture Notes in Computer Science}, volume = {11646}, pages = {43--56}, publisher = {Springer}, year = {2019} }
-
Gulmezoglu, B. and Moghimi, A. and Eisenbarth, T. and Sunar, B.: FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning,. arXiv e-prints, 2019
@ARTICLE{2019arXiv190703651G, author = {{Gulmezoglu}, B. and {Moghimi}, A. and {Eisenbarth}, T. and {Sunar}, B.}, title = "{FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning}", journal = {arXiv e-prints}, archivePrefix = "arXiv", eprint = {1907.03651}, primaryClass = "cs.CR", keywords = {Computer Science - Cryptography and Security, Computer Science - Machine Learning}, year = {2019}, adsurl = {https://ui.adsabs.harvard.edu/abs/2019arXiv190703651G}, url = {https://ui.adsabs.harvard.edu/abs/2019arXiv190703651G}, adsnote = {Provided by the SAO/NASA Astrophysics Data System} }
-
Gulmezoglu, Berk and Zankl, Andreas and Tol, M. Caner and Islam, Saad and Eisenbarth, Thomas and Sunar, Berk: Undermining User Privacy on Mobile Devices Using AI. in Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, pp. 214-227, ACM, New York, NY, USA, 2019
@inproceedings{Gulmezoglu:2019:UUP:3321705.3329804, author = {Gulmezoglu, Berk and Zankl, Andreas and Tol, M. Caner and Islam, Saad and Eisenbarth, Thomas and Sunar, Berk}, title = {Undermining User Privacy on Mobile Devices Using AI}, booktitle = {Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security}, series = {Asia CCS '19}, year = {2019}, isbn = {978-1-4503-6752-3}, location = {Auckland, New Zealand}, pages = {214--227}, numpages = {14}, url = {http://doi.acm.org/10.1145/3321705.3329804}, doi = {10.1145/3321705.3329804}, acmid = {3329804}, publisher = {ACM}, address = {New York, NY, USA}, keywords = {activity inference, arm, artificial intelligence, cache attack, machine learning, microarchitecture, mobile device, user privacy}, }
-
David M. Sommer and Sebastian Meiser and Esfandiar Mohammadi,: Privacy Loss Classes: The Central Limit Theorem in Differential Privacy,. Proceedings on Privacy Enhancing Technologies,, no. 2019,, pp. 245 - 269,, Sciendo,, Berlin,, 2019,
@article { PrivacyLossClassesTheCentralLimitTheoreminDifferentialPrivacy, author = "David M. Sommer and Sebastian Meiser and Esfandiar Mohammadi", title = "Privacy Loss Classes: The Central Limit Theorem in Differential Privacy", journal = "Proceedings on Privacy Enhancing Technologies", year = "2019", publisher = "Sciendo", address = "Berlin", volume = "2019", number = "2", doi = "https://doi.org/10.2478/popets-2019-0029", pages= "245 - 269", url = "https://content.sciendo.com/view/journals/popets/2019/2/article-p245.xml" }
-
Islam, Saad and Moghimi, Ahmad and Bruhns, Ida and Krebbel, Moritz and Gulmezoglu, Berk and Eisenbarth, Thomas and Sunar, Berk: SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks. in 28th USENIX Security Symposium (USENIX Security 19), USENIX Association, Santa Clara, CA, 2019
@inproceedings {236252, author = {Islam, Saad and Moghimi, Ahmad and Bruhns, Ida and Krebbel, Moritz and Gulmezoglu, Berk and Eisenbarth, Thomas and Sunar, Berk}, title = {{SPOILER}: Speculative Load Hazards Boost Rowhammer and Cache Attacks}, booktitle = {28th {USENIX} Security Symposium ({USENIX} Security 19)}, year = {2019}, address = {Santa Clara, CA}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/islam}, publisher = {{USENIX} Association}, }
-
David Sommer and Aritra Dhar and Luka Malisa and Esfandiar Mohammadi and Daniel Ronzani and Srdjan Capkun: Deniable Upload and Download via Passive Participation. in 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19), pp. 649-666, USENIX Association, Boston, MA, feb,, 2019
@inproceedings {225984, author = {David Sommer and Aritra Dhar and Luka Malisa and Esfandiar Mohammadi and Daniel Ronzani and Srdjan Capkun}, title = {Deniable Upload and Download via Passive Participation}, booktitle = {16th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 19)}, year = {2019}, isbn = {978-1-931971-49-2}, address = {Boston, MA}, pages = {649--666}, url = {https://www.usenix.org/conference/nsdi19/presentation/sommer}, publisher = {{USENIX} Association}, month = feb, }
-
M. Stelzner and T. Eisenbarth: IT Security in Lübeck – The design of a modern and future-proof security curriculum. in 2018 12th European Workshop on Microelectronics Education (EWME), pp. 79-82, Sep., 2018
@INPROCEEDINGS{8629494, author={M. {Stelzner} and T. {Eisenbarth}}, booktitle={2018 12th European Workshop on Microelectronics Education (EWME)}, title={IT Security in Lübeck – The design of a modern and future-proof security curriculum}, year={2018}, volume={}, number={}, pages={79-82}, keywords={computer science education;educational courses;further education;security of data;University of Lübeck;computer scientist training;IT security;degree program;design principle;well trained security professionals;dependable systems;digitally connected systems;future-proof security curriculum;Computer science;Education;Hardware;Computer security;Software reliability;IT Security;degree program;bachelor;master;education;security by design}, url={https://ieeexplore.ieee.org/document/8629494}, doi={10.1109/EWME.2018.8629494}, ISSN={}, month={Sep.},}
2018
-
Max Bannach and Sebastian Berndt: Practical Access to Dynamic Programming on Tree Decompositions. in ESA, no. 112, pp. 6:1-6:13, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2018
@inproceedings{DBLP:conf/esa/BannachB18, author = {Max Bannach and Sebastian Berndt}, title = {Practical Access to Dynamic Programming on Tree Decompositions}, booktitle = {{ESA}}, series = {LIPIcs}, volume = {112}, pages = {6:1--6:13}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2018} }
-
Seker, Okan and Fernandez-Rubio, Abraham and Eisenbarth, Thomas and Steinwandt, Rainer: Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks. IACR Transactions on Cryptographic Hardware and Embedded Systems, no. 2018, pp. 394-430, Aug., 2018
@article{Seker_Fernandez-Rubio_Eisenbarth_Steinwandt_2018, title={Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks}, volume={2018}, url={https://tches.iacr.org/index.php/TCHES/article/view/7281}, DOI={10.13154/tches.v2018.i3.394-430}, number={3}, journal={IACR Transactions on Cryptographic Hardware and Embedded Systems}, author={Seker, Okan and Fernandez-Rubio, Abraham and Eisenbarth, Thomas and Steinwandt, Rainer}, year={2018}, month={Aug.}, pages={394-430} }
-
Wichelmann, Jan and Moghimi, Ahmad and Eisenbarth, Thomas and Sunar, Berk: MicroWalk: A Framework for Finding Side Channels in Binaries. in Proceedings of the 34th Annual Computer Security Applications Conference, pp. 161-173, ACM, New York, NY, USA, 2018
@inproceedings{Wichelmann2018MicroWalkAF, author = {Wichelmann, Jan and Moghimi, Ahmad and Eisenbarth, Thomas and Sunar, Berk}, title = {MicroWalk: A Framework for Finding Side Channels in Binaries}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference}, series = {ACSAC '18}, year = {2018}, location = {San Juan, PR, USA}, pages = {161--173}, url = {http://doi.acm.org/10.1145/3274694.3274741}, doi = {10.1145/3274694.3274741}, publisher = {ACM}, address = {New York, NY, USA} }
-
Inci, Mehmet Sinan and Eisenbarth, Thomas and Sunar, Berk: DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes. 2018
@misc{inci2018deepcloak, title={DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes}, author={Inci, Mehmet Sinan and Eisenbarth, Thomas and Sunar, Berk}, year={2018}, eprint={1808.01352}, archivePrefix={arXiv}, primaryClass={cs.CR} url={https://arxiv.org/abs/1808.01352} }
-
Sebastian Berndt: Computing Tree Width: From Theory to Practice and Back. in CiE, no. 10936, pp. 81-88, Springer, 2018
@inproceedings{DBLP:conf/cie/Berndt18, author = {Sebastian Berndt}, title = {Computing Tree Width: From Theory to Practice and Back}, booktitle = {CiE}, series = {Lecture Notes in Computer Science}, volume = {10936}, pages = {81--88}, publisher = {Springer}, year = {2018} }
-
Sebastian Berndt and Kim-Manuel Klein: Using Structural Properties for Integer Programs. in CiE, no. 10936, pp. 89-96, Springer, 2018
@inproceedings{DBLP:conf/cie/BerndtK18, author = {Sebastian Berndt and Kim{-}Manuel Klein}, title = {Using Structural Properties for Integer Programs}, booktitle = {CiE}, series = {Lecture Notes in Computer Science}, volume = {10936}, pages = {89--96}, publisher = {Springer}, year = {2018} }
-
Dall, Fergus and Gabrielle De Micheli and Eisenbarth, Thomas and Genkin, Daniel and Heninger, Nadia and Moghimi, Ahmad and Yarom, Yuval: CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst., no. 2018, pp. 171-191, 2018
@article{DBLP:journals/tches/DallMEGHMY18, author = {Dall, Fergus and Gabrielle De Micheli and Eisenbarth, Thomas and Genkin, Daniel and Heninger, Nadia and Moghimi, Ahmad and Yarom, Yuval}, title = {CacheQuote: Efficiently Recovering Long-term Secrets of {SGX} {EPID} via Cache Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {2}, pages = {171--191}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i2.171-191}, doi = {10.13154/tches.v2018.i2.171-191}, timestamp = {Tue, 05 Jun 2018 15:05:26 +0200}, }
-
Sebastian Berndt and Maciej Liskiewicz: On the Gold Standard for Security of Universal Steganography. in EUROCRYPT (1), no. 10820, pp. 29-60, Springer, 2018
@inproceedings{DBLP:conf/eurocrypt/BerndtL18, author = {Sebastian Berndt and Maciej Liskiewicz}, title = {On the Gold Standard for Security of Universal Steganography}, booktitle = {{EUROCRYPT} {(1)}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {29--60}, publisher = {Springer}, year = {2018} }
-
Moghimi, Ahmad and Wichelmann, Jan and Eisenbarth, Thomas and Sunar, Berk: MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations. International Journal of Parallel Programming, Nov, 2018
@Article{Moghimi2018, author="Moghimi, Ahmad and Wichelmann, Jan and Eisenbarth, Thomas and Sunar, Berk", title="MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations", journal="International Journal of Parallel Programming", year="2018", month="Nov", day="09", issn="1573-7640", url="https://doi.org/10.1007/s10766-018-0611-9", }
-
Briongos, Samira and Irazoqui, Gorka and Malagon, Pedro and Eisenbarth, Thomas: CacheShield: Detecting Cache Attacks through Self-Observation. in Proceedings of the Eighth ACM Conference on Data and Application and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 224-235, 2018
@inproceedings{DBLP:conf/codaspy/BriongosIME18, author = {Briongos, Samira and Irazoqui, Gorka and Malagon, Pedro and Eisenbarth, Thomas}, title = {CacheShield: Detecting Cache Attacks through Self-Observation}, booktitle = {Proceedings of the Eighth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21, 2018}, pages = {224--235}, year = {2018}, crossref = {DBLP:conf/codaspy/2018}, url = {http://doi.acm.org/10.1145/3176258.3176320}, doi = {10.1145/3176258.3176320}, timestamp = {Thu, 15 Mar 2018 11:27:57 +0100}, }
-
Irazoqui, Gorka and Eisenbarth, Thomas and Sunar, Berk: MASCAT: Preventing Microarchitectural Attacks Before Distribution. in Proceedings of the Eighth ACM Conference on Data and Application and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 377-388, 2018
@inproceedings{DBLP:conf/codaspy/IrazoquiES18, author = {Irazoqui, Gorka and Eisenbarth, Thomas and Sunar, Berk}, title = {{MASCAT:} Preventing Microarchitectural Attacks Before Distribution}, booktitle = {Proceedings of the Eighth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21, 2018}, pages = {377--388}, year = {2018}, crossref = {DBLP:conf/codaspy/2018}, url = {http://doi.acm.org/10.1145/3176258.3176316}, doi = {10.1145/3176258.3176316}, timestamp = {Thu, 15 Mar 2018 11:27:57 +0100}, }