Publications
2019
Berk
Gulmezoglu,
Andreas
Zankl,
M. Caner
Tol,
Saad
Islam,
Thomas
Eisenbarth, and
Berk
Sunar,
Undermining User Privacy on Mobile Devices Using AI, in Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2019. pp. 214-227.
Undermining User Privacy on Mobile Devices Using AI, in Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2019. pp. 214-227.
| DOI: | 10.1145/3321705.3329804 |
| File: | 3321705.3329804 |
2018
Ahmad
Moghimi,
Jan
Wichelmann,
Thomas
Eisenbarth, and
Berk
Sunar,
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations, International Journal of Parallel Programming , Nov. 2018.
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations, International Journal of Parallel Programming , Nov. 2018.
| File: | s10766-018-0611-9 |
Marc
Stelzner, and
Thomas
Eisenbarth,
IT Security in Lübeck - The design of a modern and future-proof security curriculum, in 2018 12th European Workshop on Microelectronics Education (EWME) , Sep.2018. pp. 79-82.
IT Security in Lübeck - The design of a modern and future-proof security curriculum, in 2018 12th European Workshop on Microelectronics Education (EWME) , Sep.2018. pp. 79-82.
| DOI: | 10.1109/EWME.2018.8629494 |
| File: | 8629494 |
Okan
Seker,
Abraham
Fernandez-Rubio,
Thomas
Eisenbarth, and
Rainer
Steinwandt,
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2018, no. 3, pp. 394-430, Aug. 2018.
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2018, no. 3, pp. 394-430, Aug. 2018.
| DOI: | 10.13154/tches.v2018.i3.394-430 |
| File: | 7281 |
Elke
De Mulder,
Thomas
Eisenbarth, and
Patrick
Schaumont,
Identifying and Eliminating Side-Channel Leaks in Programmable Systems, IEEE Design Test , vol. 35, no. 1, pp. 74-89, Feb. 2018.
Identifying and Eliminating Side-Channel Leaks in Programmable Systems, IEEE Design Test , vol. 35, no. 1, pp. 74-89, Feb. 2018.
| DOI: | 10.1109/MDAT.2017.2766166 |
Fergus
Dall,
Gabrielle De
Micheli,
Thomas
Eisenbarth,
Daniel
Genkin,
Nadia
Heninger,
Ahmad
Moghimi, and
Yuval
Yarom,
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks, IACR Trans. Cryptogr. Hardw. Embed. Syst. , vol. 2018, no. 2, pp. 171--191, 2018.
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks, IACR Trans. Cryptogr. Hardw. Embed. Syst. , vol. 2018, no. 2, pp. 171--191, 2018.
| DOI: | 10.13154/tches.v2018.i2.171-191 |
| File: | tches.v2018.i2.171-191 |
Samira
Briongos,
Gorka
Irazoqui,
Pedro
Malagon, and
Thomas
Eisenbarth,
CacheShield: Detecting Cache Attacks through Self-Observation, in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018 , 2018. pp. 224--235.
CacheShield: Detecting Cache Attacks through Self-Observation, in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018 , 2018. pp. 224--235.
| DOI: | 10.1145/3176258.3176320 |
| File: | 3176258.3176320 |
Mehmet Sinan
Inci,
Thomas
Eisenbarth, and
Berk
Sunar,
DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes, 2018.
DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes, 2018.
| Weblink: | https://dblp.uni-trier.de/rec/journals/corr/abs-1808-01352.html?view=bibtex |
| File: | 1808.01352 |
Gorka
Irazoqui,
Thomas
Eisenbarth, and
Berk
Sunar,
MASCAT: Preventing Microarchitectural Attacks Before Distribution, in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018 , 2018. pp. 377--388.
MASCAT: Preventing Microarchitectural Attacks Before Distribution, in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018 , 2018. pp. 377--388.
| DOI: | 10.1145/3176258.3176316 |
| File: | 3176258.3176316 |
Jan
Wichelmann,
Ahmad
Moghimi,
Thomas
Eisenbarth, and
Berk
Sunar,
MicroWalk: A Framework for Finding Side Channels in Binaries, in Proceedings of the 34th Annual Computer Security Applications Conference , New York, NY, USA: ACM, 2018. pp. 161--173.
MicroWalk: A Framework for Finding Side Channels in Binaries, in Proceedings of the 34th Annual Computer Security Applications Conference , New York, NY, USA: ACM, 2018. pp. 161--173.
| DOI: | 10.1145/3274694.3274741 |
| File: | 3274694.3274741 |
2017
Samira
Briongos,
Gorka
Irazoqui,
Pedro
Malagon, and
Thomas
Eisenbarth,
CacheShield: Protecting Legacy Processes Against Cache Attacks, Sep. 2017.
CacheShield: Protecting Legacy Processes Against Cache Attacks, Sep. 2017.
| File: | 1709.01795v1 |
Michael
Moukarzel,
Thomas
Eisenbarth, and
Berk
Sunar,
uLeech: A side-channel evaluation platform for IoT, in 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS) , Aug.2017. pp. 25-28.
uLeech: A side-channel evaluation platform for IoT, in 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS) , Aug.2017. pp. 25-28.
| DOI: | 10.1109/MWSCAS.2017.8052851 |
| File: | 8052851 |
Berk
Gulmezoglu,
Thomas
Eisenbarth, and
Berk
Sunar,
Cache-Based Application Detection in the Cloud Using Machine Learning, in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2017. pp. 288--300.
Cache-Based Application Detection in the Cloud Using Machine Learning, in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2017. pp. 288--300.
| ISBN: | 978-1-4503-4944-4 |
| File: | 3052973.3053036 |
Ahmad
Moghimi,
Gorka
Irazoqui, and
Thomas
Eisenbarth,
CacheZoom: How SGX Amplifies the Power of Cache Attacks, in Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings , 2017. pp. 69--90.
CacheZoom: How SGX Amplifies the Power of Cache Attacks, in Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings , 2017. pp. 69--90.
| File: | 978-3-319-66787-4_4 |
Gorka
Irazoqui,
Kai
Cong,
Xiaofei
Guo,
Hareesh
Khattri,
Arun
Kanuparthi,
Thomas
Eisenbarth, and
Berk
Sunar,
Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries, CoRR , vol. abs/1709.01552, 2017.
Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries, CoRR , vol. abs/1709.01552, 2017.
| File: | 1709.01552 |
Berk
Gulmezoglu,
Andreas
Zankl,
Thomas
Eisenbarth, and
Berk
Sunar,
PerfWeb: How to Violate Web Privacy with Hardware Performance Events, in Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II , 2017. pp. 80--97.
PerfWeb: How to Violate Web Privacy with Hardware Performance Events, in Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II , 2017. pp. 80--97.
| File: | 978-3-319-66399-9_5 |

- Research
- Publications
- PhD Theses
- Tools
- Seminar
- Projects
