Publications
2021
Sebastian
Berndt,
Klaus
Jansen, and
Alexandra
Lassota,
Tightness of Sensitivity and Proximity Bounds for Integer Linear Programs, in {SOFSEM} 2021: Theory and Practice of Computer Science - 47th International Conference on Current Trends in Theory and Practice of Computer Science, {SOFSEM} 2021, Bolzano-Bozen, Italy, January 25-29, 2021, Proceedings , Tom{\'{a}}s Bures and Riccardo Dondi and Johann Gamper and Giovanna Guerrini and Tomasz Jurdzinski and Claus Pahl and Florian Sikora and Prudence W. H. Wong, Eds. Springer, 2021. pp. 349--360.
Tightness of Sensitivity and Proximity Bounds for Integer Linear Programs, in {SOFSEM} 2021: Theory and Practice of Computer Science - 47th International Conference on Current Trends in Theory and Practice of Computer Science, {SOFSEM} 2021, Bolzano-Bozen, Italy, January 25-29, 2021, Proceedings , Tom{\'{a}}s Bures and Riccardo Dondi and Johann Gamper and Giovanna Guerrini and Tomasz Jurdzinski and Claus Pahl and Florian Sikora and Prudence W. H. Wong, Eds. Springer, 2021. pp. 349--360.
DOI: | 10.1007/978-3-030-67731-2_25 |
File: | 978-3-030-67731-2_25 |
Luca
Wilke,
Jan
Wichelmann,
Florian
Sieck, and
Thomas
Eisenbarth,
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation, in 2021 IEEE Security and Privacy Workshops (SPW) , 2021. pp. 456-466.
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation, in 2021 IEEE Security and Privacy Workshops (SPW) , 2021. pp. 456-466.
DOI: | 10.1109/SPW53761.2021.00064 |
Weblink: | https://doi.ieeecomputersociety.org/10.1109/SPW53761.2021.00064 |
File: |
Florian
Sieck,
Sebastian
Berndt,
Jan
Wichelmann, and
Thomas
Eisenbarth,
Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries, in CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security , Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi, Eds. ACM, 2021. pp. 2456-2473.
Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries, in CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security , Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi, Eds. ACM, 2021. pp. 2456-2473.
DOI: | 10.1145/3460120.3484783 |
File: | 3460120.3484783 |
2020
Samira
Briongos,
Pedro
Malagon,
Jose M.
Moya, and
Thomas
Eisenbarth,
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks, in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, Aug.2020. pp. 1967-1984.
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks, in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, Aug.2020. pp. 1967-1984.
ISBN: | 978-1-939133-17-5 |
File: | briongos |
Daniel
Moghimi,
Berk
Sunar,
Thomas
Eisenbarth, and
Nadia
Heninger,
TPM-FAIL: TPM meets Timing and Lattice Attacks, in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, Aug.2020. pp. 2057-2073.
TPM-FAIL: TPM meets Timing and Lattice Attacks, in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, Aug.2020. pp. 2057-2073.
ISBN: | 978-1-939133-17-5 |
Weblink: | https://tpm.fail/ |
File: | moghimi-tpm |
Zane
Weissman,
Thore
Tiemann,
Daniel
Moghimi,
Evan
Custodio,
Thomas
Eisenbarth, and
Berk
Sunar,
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2020, no. 3, pp. 169-195, Jun. 2020.
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2020, no. 3, pp. 169-195, Jun. 2020.
DOI: | 10.13154/tches.v2020.i3.169-195 |
File: | Dateilink |
Bibtex: | ![]() @article{weissman2020jackhammer, author = {Zane Weissman and Thore Tiemann and Daniel Moghimi and Evan Custodio and Thomas Eisenbarth and Berk Sunar}, title = {JackHammer: Efficient Rowhammer on Heterogeneous {FPGA-CPU} Platforms}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {169--195}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.169-195}, doi = {10.13154/TCHES.V2020.I3.169-195} } |
Luca
Wilke,
Jan
Wichelmann,
Mathias
Morbitzer, and
Thomas
Eisenbarth,
SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions, in 2020 IEEE Symposium on Security and Privacy (SP) , Los Alamitos, CA, USA: IEEE Computer Society, May2020. pp. 1431-1444.
SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions, in 2020 IEEE Symposium on Security and Privacy (SP) , Los Alamitos, CA, USA: IEEE Computer Society, May2020. pp. 1431-1444.
DOI: | 10.1109/SP40000.2020.00080 |
Weblink: | https://uzl-its.github.io/SEVurity/ |
Weblink: | https://doi.ieeecomputersociety.org/10.1109/SP40000.2020.00080 |
Debajyoti
Das,
Sebastian
Meiser,
Esfandiar
Mohammadi, and
Aniket
Kate,
Comprehensive Anonymity Trilemma: User Coordination is not enough, in Proceedings on Privacy Enhancing Technologies (PETS/PoPETS) 2020.3 , Sciendo, 2020.
Comprehensive Anonymity Trilemma: User Coordination is not enough, in Proceedings on Privacy Enhancing Technologies (PETS/PoPETS) 2020.3 , Sciendo, 2020.
DOI: | 10.2478/popets-2020-0056 |
File: | article-p356.xml |
Samira
Briongos,
Pedro
Malag'on,
Jose Manuel
Moya, and
Thomas
Eisenbarth,
Microarchitectural Isolation Guarantees Through Execution Based Signatures, in XXXV Conference on Design of Circuits and Integrated Systems, DCIS, 2020, Segovia, Spain, November 18-20, 2020 , IEEE, 2020. pp. 1-6.
Microarchitectural Isolation Guarantees Through Execution Based Signatures, in XXXV Conference on Design of Circuits and Integrated Systems, DCIS, 2020, Segovia, Spain, November 18-20, 2020 , IEEE, 2020. pp. 1-6.
DOI: | 10.1109/DCIS51330.2020.9268660 |
File: | DCIS51330.2020.9268660 |
Sebastian
Berndt, and
Maciej
Liskiewicz,
On the universal steganography of optimal rate, Inf. Comput. , vol. 275, pp. 104632, 2020.
On the universal steganography of optimal rate, Inf. Comput. , vol. 275, pp. 104632, 2020.
Max
Bannach,
Sebastian
Berndt,
Martin
Schuster, and
Marcel
Wienöbst,
PACE Solver Description: Fluid, in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 27:1--27:3.
PACE Solver Description: Fluid, in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 27:1--27:3.
Max
Bannach,
Sebastian
Berndt,
Martin
Schuster, and
Marcel
Wienöbst,
PACE Solver Description: PID (star), in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 28:1--28:4.
PACE Solver Description: PID (star), in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 28:1--28:4.
Okan
Seker,
Sebastian
Berndt,
Luca
Wilke, and
Thomas
Eisenbarth,
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis, in CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security , Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna, Eds. ACM, 2020. pp. 1033-1049.
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis, in CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security , Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna, Eds. ACM, 2020. pp. 1033-1049.
DOI: | 10.1145/3372297.3417889 |
File: | 3372297.3417889 |
Max
Bannach,
Sebastian
Berndt,
Marten
Maack,
Matthias
Mnich,
Alexandra
Lassota,
Malin
Rau, and
Malte
Skambath,
Solving Packing Problems with Few Small Items Using Rainbow Matchings, in MFCS 2020 , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020.
Solving Packing Problems with Few Small Items Using Rainbow Matchings, in MFCS 2020 , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020.
2019
David
Sommer,
Aritra
Dhar,
Luka
Malisa,
Esfandiar
Mohammadi,
Daniel
Ronzani, and
Srdjan
Capkun,
Deniable Upload and Download via Passive Participation, in 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) , Boston, MA: USENIX Association, Feb.2019. pp. 649--666.
Deniable Upload and Download via Passive Participation, in 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) , Boston, MA: USENIX Association, Feb.2019. pp. 649--666.
ISBN: | 978-1-931971-49-2 |
File: | sommer |
Berk
Gulmezoglu,
Ahmad
Moghimi,
Thomas
Eisenbarth, and
Berk
Sunar,
FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning, arXiv e-prints , 2019.
FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning, arXiv e-prints , 2019.
File: | 2019arXiv190703651G |
Damien
Desfontaines,
Elisabeth
Krahmer, and
Esfandiar
Mohammadi,
Passive and active attackers in noiseless privacy, CoRR , vol. abs/1905.00650, 2019.
Passive and active attackers in noiseless privacy, CoRR , vol. abs/1905.00650, 2019.
File: | 1905.00650 |
David
Sommer,
Sebastian
Meiser, and
Esfandiar
Mohammadi,
Privacy Loss Classes: The Central Limit Theorem in Differential Privacy, Proceedings on Privacy Enhancing Technologies , vol. 2019, no. 2, pp. 245 - 269, 2019. Sciendo.
Privacy Loss Classes: The Central Limit Theorem in Differential Privacy, Proceedings on Privacy Enhancing Technologies , vol. 2019, no. 2, pp. 245 - 269, 2019. Sciendo.
DOI: | https://doi.org/10.2478/popets-2019-0029 |
File: | article-p245.xml |
Saad
Islam,
Ahmad
Moghimi,
Ida
Bruhns,
Moritz
Krebbel,
Berk
Gulmezoglu,
Thomas
Eisenbarth, and
Berk
Sunar,
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks, in 28th USENIX Security Symposium (USENIX Security 19) , Santa Clara, CA: USENIX Association, 2019. pp. 621-637.
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks, in 28th USENIX Security Symposium (USENIX Security 19) , Santa Clara, CA: USENIX Association, 2019. pp. 621-637.
ISBN: | 978-1-939133-06-9 |
File: | islam |
Berk
Gulmezoglu,
Andreas
Zankl,
M. Caner
Tol,
Saad
Islam,
Thomas
Eisenbarth, and
Berk
Sunar,
Undermining User Privacy on Mobile Devices Using AI, in Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2019. pp. 214-227.
Undermining User Privacy on Mobile Devices Using AI, in Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2019. pp. 214-227.
DOI: | 10.1145/3321705.3329804 |
File: | 3321705.3329804 |
2018
Ahmad
Moghimi,
Jan
Wichelmann,
Thomas
Eisenbarth, and
Berk
Sunar,
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations, International Journal of Parallel Programming , Nov. 2018.
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations, International Journal of Parallel Programming , Nov. 2018.
File: | s10766-018-0611-9 |
Marc
Stelzner, and
Thomas
Eisenbarth,
IT Security in Lübeck - The design of a modern and future-proof security curriculum, in 2018 12th European Workshop on Microelectronics Education (EWME) , Sep.2018. pp. 79-82.
IT Security in Lübeck - The design of a modern and future-proof security curriculum, in 2018 12th European Workshop on Microelectronics Education (EWME) , Sep.2018. pp. 79-82.
DOI: | 10.1109/EWME.2018.8629494 |
File: | 8629494 |
Okan
Seker,
Abraham
Fernandez-Rubio,
Thomas
Eisenbarth, and
Rainer
Steinwandt,
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2018, no. 3, pp. 394-430, Aug. 2018.
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2018, no. 3, pp. 394-430, Aug. 2018.
DOI: | 10.13154/tches.v2018.i3.394-430 |
File: | 7281 |
Elke
De Mulder,
Thomas
Eisenbarth, and
Patrick
Schaumont,
Identifying and Eliminating Side-Channel Leaks in Programmable Systems, IEEE Design Test , vol. 35, no. 1, pp. 74-89, Feb. 2018.
Identifying and Eliminating Side-Channel Leaks in Programmable Systems, IEEE Design Test , vol. 35, no. 1, pp. 74-89, Feb. 2018.
DOI: | 10.1109/MDAT.2017.2766166 |
Fergus
Dall,
Gabrielle De
Micheli,
Thomas
Eisenbarth,
Daniel
Genkin,
Nadia
Heninger,
Ahmad
Moghimi, and
Yuval
Yarom,
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks, IACR Trans. Cryptogr. Hardw. Embed. Syst. , vol. 2018, no. 2, pp. 171--191, 2018.
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks, IACR Trans. Cryptogr. Hardw. Embed. Syst. , vol. 2018, no. 2, pp. 171--191, 2018.
DOI: | 10.13154/tches.v2018.i2.171-191 |
File: | tches.v2018.i2.171-191 |

- Research
- Publications
- PhD Theses
- Tools
- Seminar
- Projects