Prof. Dr.-Ing. Thomas Eisenbarth

Institutsdirektor


Ratzeburger Allee 160
23562 Lübeck
Building 64, 1. OG, Room 043

Email:thomas.eisenbarth(at)uni-luebeck.de
Phone:+49 451 3101 6600
Fax:+49 451 3101 6604

About Me

I am Professor for IT Security at University of Lübeck.  I received my Ph.D. in ECE from Ruhr University Bochum, Germany, where I worked as a member of the Horst Goertz Institute for IT Security (HGI). From 2010 I  spent two years at the Center for Cryptology and Information Security (CCIS) at Florida Atlantic University. In 2012 I joined the Electrical and Computer Engineering Department at WPI. Since August of 2017, I am the Director of the Institute for IT Security at the University of Lübeck.

My research interests are in:

  • Applied Cryptology
  • Systems security and secure computer architecture
  • Side channel analysis, physical attacks and their prevention
  • Cloud and virtualization security

Publications

2021

  • Okan Seker, Thomas Eisenbarth and Maciej Liskiewicz,
    A White-Box Masking Scheme Resisting Computational and Algebraic Attacks , IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 2, pp. 61-105, 2021. Cryptology ePrint Archive, Report 2020/443.
    DOI:10.46586/tches.v2021.i2.61-105
    File: https://tches.iacr.org/index.php/TCHES/article/view/8788

  • Tim Gellersen, Okan Seker and Thomas Eisenbarth,
    Differential Power Analysis of the Picnic Signature Scheme in Post-Quantum Cryptography , Cheon, Jung Hee and Tillich, Jean-Pierre, Eds. Cham: Springer International Publishing, 2021. pp. 177--194.
    ISBN:978-3-030-81293-5

  • Claudius Pott, Philipp Jungklass, David Jacek Csejka, Thomas Eisenbarth and Marco Siebert,
    Firmware Security Module: A Framework for Trusted Computing in Automotive Multiprocessors , Journal of Hardware and Systems Security , 2021.
    DOI:10.1007/s41635-021-00114-4
    File: https://doi.org/10.1007/s41635-021-00114-4

  • Jan Wichelmann, Sebastian Berndt, Claudius Pott and Thomas Eisenbarth,
    Help, my Signal has bad Device! Breaking the Signal Messenger's Post-CompromiseSecurity through a Malicious Device in DIMVA , 2021.

  • Diego F. Aranha, Sebastian Berndt, Thomas Eisenbarth, Okan Seker, Akira Takahashi, Luca Wilke and Greg Zaverucha,
    Side-Channel Protections for Picnic Signatures , IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 4, pp. 239-282, 2021.
    DOI:10.46586/tches.v2021.i4.239-282
    File: https://tches.iacr.org/index.php/TCHES/article/view/9066

  • Luca Wilke, Jan Wichelmann, Florian Sieck and Thomas Eisenbarth,
    undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation in 2021 IEEE Security and Privacy Workshops (SPW) , 2021. pp. 456-466.
    DOI:10.1109/SPW53761.2021.00064
    File: https://uzl-its.github.io/undeserved-trust/

  • Florian Sieck, Sebastian Berndt, Jan Wichelmann and Thomas Eisenbarth,
    Util::Lookup: Exploiting key decoding in cryptographic libraries in CCS , 2021.

  • Samira Briongos, Ida Bruhns, Pedro Malagon, Thomas Eisenbarth and José Moya,
    Aim, Wait, Shoot: How the CACHESNIPER Technique Improves Unprivileged Cache Attacks in {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021 , {IEEE}, 2021.

  • 2020

  • Luca Wilke, Jan Wichelmann, Mathias Morbitzer and Thomas Eisenbarth,
    SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions in 2020 IEEE Symposium on Security and Privacy (SP) , Los Alamitos, CA, USA: IEEE Computer Society, 2020. pp. 1431-1444.
    File: https://uzl-its.github.io/SEVurity/

  • Daniel Moghimi, Berk Sunar, Thomas Eisenbarth and Nadia Heninger,
    TPM-FAIL: TPM meets Timing and Lattice Attacks in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, 2020.
    File: https://tpm.fail/

  • Okan Seker, Sebastian Berndt, Luca Wilke and Thomas Eisenbarth,
    SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis in CCS , ACM, 2020. pp. 1033--1049.
    DOI:10.1145/3372297.3417889
    File: https://dl.acm.org/doi/10.1145/3372297.3417889

  • Samira Briongos, Pedro Malag'on, Jose Manuel Moya and Thomas Eisenbarth,
    Microarchitectural Isolation Guarantees Through Execution Based Signatures in XXXV Conference on Design of Circuits and Integrated Systems, DCIS, 2020, Segovia, Spain, November 18-20, 2020 , IEEE, 2020. pp. 1--6.
    DOI:10.1109/DCIS51330.2020.9268660
    File: https://doi.org/10.1109/DCIS51330.2020.9268660

  • Samira Briongos, Pedro Malagon, Jose M. Moya and Thomas Eisenbarth,
    RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks in 29th USENIX Security Symposium (USENIX Security 20) , USENIX Association, 2020. pp. 1967--1984.
    ISBN:978-1-939133-17-5
    File: https://www.usenix.org/conference/usenixsecurity20/presentation/briongos

  • Zane Weissman, Thore Tiemann, Daniel Moghimi, Evan Custodio, Thomas Eisenbarth and Berk Sunar,
    JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms , IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2020, no. 3, pp. 169-195, 2020.
    DOI:10.13154/tches.v2020.i3.169-195
    File: https://tches.iacr.org/index.php/TCHES/article/view/8587

  • Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving and Thomas Eisenbarth,
    ASAP: Algorithm Substitution Attacks on Cryptographic Protocols , IACR Cryptol. ePrint Arch. , vol. 2020, pp. 1452, 2020.
    File: https://eprint.iacr.org/2020/1452

  • 2019

  • Berk Gulmezoglu, Ahmad Moghimi, Thomas Eisenbarth and Berk Sunar,
    FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning , arXiv e-prints , 2019.
    File: https://ui.adsabs.harvard.edu/abs/2019arXiv190703651G

  • Saad Islam, Ahmad Moghimi, Ida Bruhns, Moritz Krebbel, Berk Gulmezoglu, Thomas Eisenbarth and Berk Sunar,
    SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks in 28th USENIX Security Symposium (USENIX Security 19) , Santa Clara, CA: USENIX Association, 2019.
    File: https://www.usenix.org/conference/usenixsecurity19/presentation/islam

  • Berk Gulmezoglu, Andreas Zankl, M. Caner Tol, Saad Islam, Thomas Eisenbarth and Berk Sunar,
    Undermining User Privacy on Mobile Devices Using AI in Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2019. pp. 214--227.
    DOI:10.1145/3321705.3329804
    ISBN:978-1-4503-6752-3
    File: http://doi.acm.org/10.1145/3321705.3329804

  • 2018

  • Ahmad Moghimi, Jan Wichelmann, Thomas Eisenbarth and Berk Sunar,
    MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations , International Journal of Parallel Programming , 2018.
    File: https://doi.org/10.1007/s10766-018-0611-9

  • Marc Stelzner and Thomas Eisenbarth,
    IT Security in Lübeck - The design of a modern and future-proof security curriculum in 2018 12th European Workshop on Microelectronics Education (EWME) , 2018. pp. 79-82.
    DOI:10.1109/EWME.2018.8629494
    File: https://ieeexplore.ieee.org/document/8629494

  • Gorka Irazoqui, Thomas Eisenbarth and Berk Sunar,
    MASCAT: Preventing Microarchitectural Attacks Before Distribution in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018 , 2018. pp. 377--388.
    DOI:10.1145/3176258.3176316
    File: http://doi.acm.org/10.1145/3176258.3176316

  • Jan Wichelmann, Ahmad Moghimi, Thomas Eisenbarth and Berk Sunar,
    MicroWalk: A Framework for Finding Side Channels in Binaries in Proceedings of the 34th Annual Computer Security Applications Conference , New York, NY, USA: ACM, 2018. pp. 161--173.
    DOI:10.1145/3274694.3274741
    File: http://doi.acm.org/10.1145/3274694.3274741

  • Elke De Mulder, Thomas Eisenbarth and Patrick Schaumont,
    Identifying and Eliminating Side-Channel Leaks in Programmable Systems , IEEE Design Test , vol. 35, no. 1, pp. 74-89, 2018.
    DOI:10.1109/MDAT.2017.2766166

  • Mehmet Sinan Inci, Thomas Eisenbarth and Berk Sunar,
    DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes , 2018.

  • Samira Briongos, Gorka Irazoqui, Pedro Malagon and Thomas Eisenbarth,
    CacheShield: Detecting Cache Attacks through Self-Observation in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018 , 2018. pp. 224--235.
    DOI:10.1145/3176258.3176320
    File: http://doi.acm.org/10.1145/3176258.3176320