M. Sc. Jan Wichelmann

Wissenschaftlicher Mitarbeiter

Ratzeburger Allee 160
23562 Lübeck
Building 64, 1. OG, Room 044

Phone:+49 451 3101 6606
Fax:+49 451 3101 6604



  • Jan Wichelmann, Sebastian Berndt, Claudius Pott and Thomas Eisenbarth,
    Help, my Signal has bad Device! Breaking the Signal Messenger's Post-CompromiseSecurity through a Malicious Device in DIMVA , 2021.

  • Luca Wilke, Jan Wichelmann, Florian Sieck and Thomas Eisenbarth,
    undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation in 2021 IEEE Security and Privacy Workshops (SPW) , 2021. pp. 456-466.
    File: https://uzl-its.github.io/undeserved-trust/

  • Florian Sieck, Sebastian Berndt, Jan Wichelmann and Thomas Eisenbarth,
    Util::Lookup: Exploiting key decoding in cryptographic libraries in CCS , 2021.

  • 2020

  • Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving and Thomas Eisenbarth,
    ASAP: Algorithm Substitution Attacks on Cryptographic Protocols , IACR Cryptol. ePrint Arch. , vol. 2020, pp. 1452, 2020.
    File: https://eprint.iacr.org/2020/1452

  • Luca Wilke, Jan Wichelmann, Mathias Morbitzer and Thomas Eisenbarth,
    SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions in 2020 IEEE Symposium on Security and Privacy (SP) , Los Alamitos, CA, USA: IEEE Computer Society, 2020. pp. 1431-1444.
    File: https://uzl-its.github.io/SEVurity/

  • 2018

  • Ahmad Moghimi, Jan Wichelmann, Thomas Eisenbarth and Berk Sunar,
    MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations , International Journal of Parallel Programming , 2018.
    File: https://doi.org/10.1007/s10766-018-0611-9

  • Jan Wichelmann, Ahmad Moghimi, Thomas Eisenbarth and Berk Sunar,
    MicroWalk: A Framework for Finding Side Channels in Binaries in Proceedings of the 34th Annual Computer Security Applications Conference , New York, NY, USA: ACM, 2018. pp. 161--173.
    File: http://doi.acm.org/10.1145/3274694.3274741