Presentations and Talks

Presentations and talks are arranged on our Youtube channel.

Publications

2023

  • Thore Tiemann, Sebastian Berndt, Thomas Eisenbarth and Maciej Liskiewicz,
    "Act natural!": Exchanging Private Messages on Public Blockchains in 8th IEEE European Symposium on Security and Privacy , IEEE, 2023.
    Weblink: https://eprint.iacr.org/2021/1073

  • Jan Wichelmann, Anna Pätschke, Luca Wilke and Thomas Eisenbarth,
    Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software , to appear at USENIX Security Symposium 2023 , 2023. https://arxiv.org/abs/2210.13124 .
    DOI:https://doi.org/10.48550/arXiv.2210.13124
    Weblink: https://arxiv.org/abs/2210.13124

  • Thore Tiemann, Zane Weissman, Thomas Eisenbarth and Berk Sunar,
    IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems in Proceedings of the 2023 ACM ASIA Conference on Computer and Communications Security , ACM, 2023.
    DOI:10.1145/3579856.3582838
    Weblink: https://arxiv.org/abs/2202.11623

  • Nils Loose, Felix Mächtle, Claudius Pott, Volodymyr Bezsmertnyi and Thomas Eisenbarth,
    Madvex: Instrumentation-based Adversarial Attacks on Machine Learning Malware Detection , to appear at 20th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) 2023 , 2023. https://arxiv.org/abs/2305.02559 .
    DOI:https://doi.org/10.48550/arXiv.2305.02559
    Weblink: https://arxiv.org/abs/2305.02559

  • Jan Wichelmann, Christopher Peredy, Florian Sieck, Anna Pätschke and Thomas Eisenbarth,
    MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V , to appear at 20th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) 2023 , 2023. https://arxiv.org/abs/2305.00584 .
    DOI:https://doi.org/10.48550/arXiv.2305.00584
    Weblink: https://arxiv.org/abs/2305.00584

  • 2022

  • Moritz Kirschte, Sebastian Meiser, Saman Ardalan and Esfandiar Mohammadi,
    Single SMPC Invocation DPHelmet: Differentially Private Distributed Learning on a Large Scale , arXiv , Nov. 2022.
    DOI:10.48550/ARXIV.2211.02003
    File: https://arxiv.org/abs/2211.02003

  • Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving and Thomas Eisenbarth,
    ASAP: Algorithm Substitution Attacks on Cryptographic Protocols in Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security , ACM, 2022. pp. 712-726.
    DOI:10.1145/3488932.3517387
    ISBN:9781450391405
    File: https://dl.acm.org/doi/pdf/10.1145/3488932.3517387

  • Jan Wichelmann, Florian Sieck, Anna Pätschke and Thomas Eisenbarth,
    Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022 , Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi, Eds. ACM, 2022. pp. 2915--2929.
    DOI:10.1145/3548606.3560654
    File: https://doi.org/10.1145/3548606.3560654

  • Mengyuan Li, Luca Wilke, Jan Wichelmann, Thomas Eisenbarth, Radu Teodorescu and Yinqian Zhang,
    A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP in 2022 IEEE Symposium on Security and Privacy (SP) , San Francisco, CA, USA: IEEE, 2022. pp. 337-351.
    DOI:10.1109/SP46214.2022.9833768
    File: https://doi.ieeecomputersociety.org/10.1109/SP46214.2022.9833768

  • 2021

  • Ilia Polian, Frank Altmann, Tolga Arul, Christian Boit, Ralf Brederlow, Lucas Davi, Rolf Drechsler, Nan Du, Thomas Eisenbarth, Tim Güneysu, Sascha Hermann, Matthias Hiller, Rainer Leupers, Farhad Merchant, Thomas Mussenbrock, Stefan Katzenbeisser, Akash Kumar, Wolfgang Kunz, Thomas Mikolajick, Vivek Pachauri, Jean-Pierre Seifert, Frank Sill Torres and Jens Trommer,
    Nano Security: From Nano-Electronics to Secure Systems in Design, Automation & Test in Europe Conference & Exhibition, DATE 2021, Grenoble, France, February 1-5, 2021 , IEEE, 2021. pp. 1334--1339.
    DOI:10.23919/DATE51398.2021.9474187
    File: https://doi.org/10.23919/DATE51398.2021.9474187

  • Florian Sieck, Sebastian Berndt, Jan Wichelmann and Thomas Eisenbarth,
    Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries in CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security , Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi, Eds. ACM, 2021. pp. 2456--2473.
    DOI:10.1145/3460120.3484783
    File: https://doi.org/10.1145/3460120.3484783

  • Luca Wilke, Jan Wichelmann, Florian Sieck and Thomas Eisenbarth,
    undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation in 2021 IEEE Security and Privacy Workshops (SPW) , 2021. pp. 456-466.
    DOI:10.1109/SPW53761.2021.00064
    File: https://uzl-its.github.io/undeserved-trust/

  • Sebastian Berndt, Klaus Jansen and Alexandra Lassota,
    Tightness of Sensitivity and Proximity Bounds for Integer Linear Programs in {SOFSEM} 2021: Theory and Practice of Computer Science - 47th International Conference on Current Trends in Theory and Practice of Computer Science, {SOFSEM} 2021, Bolzano-Bozen, Italy, January 25-29, 2021, Proceedings , Tom{\'{a}}s Bures and Riccardo Dondi and Johann Gamper and Giovanna Guerrini and Tomasz Jurdzinski and Claus Pahl and Florian Sikora and Prudence W. H. Wong, Eds. Springer, 2021. pp. 349--360.
    DOI:10.1007/978-3-030-67731-2_25
    File: https://doi.org/10.1007/978-3-030-67731-2_25

  • Diego F. Aranha, Sebastian Berndt, Thomas Eisenbarth, Okan Seker, Akira Takahashi, Luca Wilke and Greg Zaverucha,
    Side-Channel Protections for Picnic Signatures , IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 4, pp. 239-282, 2021.
    DOI:10.46586/tches.v2021.i4.239-282
    File: https://tches.iacr.org/index.php/TCHES/article/view/9066

  • Sebastian Berndt, Kilian Grage, Klaus Jansen, Lukas Johannsen and Maria Kosche,
    Robust Online Algorithms for Dynamic Choosing Problems in Connecting with Computability - 17th Conference on Computability in Europe, CiE 2021, Virtual Event, Ghent, July 5-9, 2021, Proceedings , Liesbeth De Mol and Andreas Weiermann and Florin Manea and David Fern{\'{a}}ndez{-}Duque, Eds. Springer, 2021. pp. 38--49.
    DOI:10.1007/978-3-030-80049-9_4
    File: https://doi.org/10.1007/978-3-030-80049-9_4

  • Eike Petersen, Yannik Potdevin, Esfandiar Mohammadi, Stephan Zidowitz, Sabrina Breyer, Dirk Nowotka, Sandra Henn, Ludwig Pechmann, Martin Leucker, Philipp Rostalski and Christian Herzog,
    Responsible and Regulatory Conform Machine Learning for Medicine: A Survey of Technical Challenges and Solutions , CoRR , vol. abs/2107.09546, 2021.
    File: https://arxiv.org/abs/2107.09546

  • Sebastian Berndt, Klaus Jansen and Kim{-}Manuel Klein,
    New Bounds for the Vertices of the Integer Hull in 4th Symposium on Simplicity in Algorithms, {SOSA} 2021, Virtual Conference, January 11-12, 2021 , Hung Viet Le and Valerie King, Eds. {SIAM}, 2021. pp. 25--36.
    DOI:10.1137/1.9781611976496.3
    File: https://doi.org/10.1137/1.9781611976496.3

  • Jan Wichelmann, Sebastian Berndt, Claudius Pott and Thomas Eisenbarth,
    Help, My Signal has Bad Device! - Breaking the Signal Messenger's Post-Compromise Security Through a Malicious Device in Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings , Leyla Bilge and Lorenzo Cavallaro and Giancarlo Pellegrino and Nuno Neves, Eds. Springer, 2021. pp. 88--105.
    DOI:10.1007/978-3-030-80825-9_5
    File: https://doi.org/10.1007/978-3-030-80825-9_5

  • Sebastian Berndt, Max A. Deppert, Klaus Jansen and Lars Rohwedder,
    Load Balancing: The Long Road from Theory to Practice , CoRR , vol. abs/2107.13638, 2021.
    File: https://arxiv.org/abs/2107.13638

  • David M. Sommer, Lukas Abfalterer, Sheila Zingg and Esfandiar Mohammadi,
    Learning Numeric Optimal Differentially Private Truncated Additive Mechanisms , CoRR , vol. abs/2107.12957, 2021.
    File: https://arxiv.org/abs/2107.12957

  • Claudius Pott, Philipp Jungklass, David Jacek Csejka, Thomas Eisenbarth and Marco Siebert,
    Firmware Security Module: A Framework for Trusted Computing in Automotive Multiprocessors , Journal of Hardware and Systems Security , 2021.
    DOI:10.1007/s41635-021-00114-4
    File: https://doi.org/10.1007/s41635-021-00114-4

  • Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi and Aniket Kate,
    Divide and Funnel: a Scaling Technique for Mix-Networks , IACR Cryptol. ePrint Arch. , pp. 1685, 2021.
    File: https://eprint.iacr.org/2021/1685

  • Tim Gellersen, Okan Seker and Thomas Eisenbarth,
    Differential Power Analysis of the Picnic Signature Scheme in Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings , Jung Hee Cheon and Jean-Pierre Tillich, Eds. Springer, 2021. pp. 177--194.
    DOI:10.1007/978-3-030-81293-5_10
    File: https://doi.org/10.1007/978-3-030-81293-5_10

  • Samira Briongos, Ida Bruhns, Pedro Malagón, Thomas Eisenbarth and José Manuel Moya,
    Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged Cache Attacks in IEEE European Symposium on Security and Privacy, EuroS&P 2021, Vienna, Austria, September 6-10, 2021 , IEEE, 2021. pp. 683--700.
    DOI:10.1109/EuroSP51992.2021.00051
    File: https://doi.org/10.1109/EuroSP51992.2021.00051

  • Okan Seker, Thomas Eisenbarth and Maciej Liskiewicz,
    A White-Box Masking Scheme Resisting Computational and Algebraic Attacks , IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 2, pp. 61-105, 2021. Cryptology ePrint Archive, Report 2020/443.
    DOI:10.46586/tches.v2021.i2.61-105
    File: https://tches.iacr.org/index.php/TCHES/article/view/8788