Prof. Dr.-Ing. Thomas Eisenbarth

Institutsdirektor


Ratzeburger Allee 160
23562 Lübeck
Building 64, 1. OG, Room 043

Email:thomas.eisenbarth(at)uni-luebeck.de
Phone:+49 451 3101 6600
Fax:+49 451 3101 6604

About Me

I am Professor for IT Security at University of Lübeck.  I received my Ph.D. in ECE from Ruhr University Bochum, Germany, where I worked as a member of the Horst Goertz Institute for IT Security (HGI). From 2010 I  spent two years at the Center for Cryptology and Information Security (CCIS) at Florida Atlantic University. In 2012 I joined the Electrical and Computer Engineering Department at WPI. Since August of 2017, I am the Director of the Institute for IT Security at the University of Lübeck.

My research interests are in:

  • Applied Cryptology
  • Systems security and secure computer architecture
  • Side channel analysis, physical attacks and their prevention
  • Cloud and virtualization security

Publications

2023

  • Thore Tiemann, Sebastian Berndt, Thomas Eisenbarth and Maciej Liskiewicz,
    "Act natural!": Exchanging Private Messages on Public Blockchains in 8th IEEE European Symposium on Security and Privacy , IEEE, 2023. pp. 292-308.
    DOI:10.1109/EuroSP57164.2023.00026
    Weblink: https://eprint.iacr.org/2021/1073
    Weblink: https://doi.ieeecomputersociety.org/10.1109/EuroSP57164.2023.00026
    File: fileadmin/files/documents/slides_act-natural_tiemann_eurosp23.pdf

  • Jan Wichelmann, Christopher Peredy, Florian Sieck, Anna Pätschke and Thomas Eisenbarth,
    MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V in Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) - 20th International Conference , Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati, Eds. Springer, 2023. pp. 3-23.
    DOI:10.1007/978-3-031-35504-2_1
    Weblink: https://arxiv.org/abs/2305.00584

  • Jan Wichelmann, Anna Pätschke, Luca Wilke and Thomas Eisenbarth,
    Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software in 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023 , Joseph A. Calandrino and Carmela Troncoso, Eds. USENIX Association, 2023.
    DOI:10.48550/arXiv.2210.13124
    File: https://www.usenix.org/conference/usenixsecurity23/presentation/wichelmann

  • Nils Loose, Felix Mächtle, Claudius Pott, Volodymyr Bezsmertnyi and Thomas Eisenbarth,
    Madvex: Instrumentation-based Adversarial Attacks on Machine Learning Malware Detection in Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) - 20th International Conference , Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati, Eds. Springer, 2023. pp. 69-88.
    DOI:10.1007/978-3-031-35504-2_4
    Weblink: https://arxiv.org/abs/2305.02559

  • Thore Tiemann, Zane Weissman, Thomas Eisenbarth and Berk Sunar,
    IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems in Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security , Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik, Eds. ACM, 2023. pp. 827-840.
    DOI:10.1145/3579856.3582838
    Weblink: https://arxiv.org/abs/2202.11623
    File: fileadmin/files/documents/slides_iotlb-sc_tiemann_asiaccs23.pdf

  • 2022

  • Mengyuan Li, Luca Wilke, Jan Wichelmann, Thomas Eisenbarth, Radu Teodorescu and Yinqian Zhang,
    A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP in 2022 IEEE Symposium on Security and Privacy (SP) , San Francisco, CA, USA: IEEE, 2022. pp. 337-351.
    DOI:10.1109/SP46214.2022.9833768
    File: https://doi.ieeecomputersociety.org/10.1109/SP46214.2022.9833768

  • Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving and Thomas Eisenbarth,
    ASAP: Algorithm Substitution Attacks on Cryptographic Protocols in Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security , ACM, 2022. pp. 712-726.
    DOI:10.1145/3488932.3517387
    ISBN:9781450391405
    File: https://dl.acm.org/doi/pdf/10.1145/3488932.3517387

  • Jan Wichelmann, Florian Sieck, Anna Pätschke and Thomas Eisenbarth,
    Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022 , Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi, Eds. ACM, 2022. pp. 2915--2929.
    DOI:10.1145/3548606.3560654
    File: https://doi.org/10.1145/3548606.3560654

  • 2021

  • Florian Sieck, Sebastian Berndt, Jan Wichelmann and Thomas Eisenbarth,
    Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries in CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security , Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi, Eds. ACM, 2021. pp. 2456--2473.
    DOI:10.1145/3460120.3484783
    File: https://doi.org/10.1145/3460120.3484783

  • Luca Wilke, Jan Wichelmann, Florian Sieck and Thomas Eisenbarth,
    undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation in 2021 IEEE Security and Privacy Workshops (SPW) , 2021. pp. 456-466.
    DOI:10.1109/SPW53761.2021.00064
    File: https://uzl-its.github.io/undeserved-trust/

  • Diego F. Aranha, Sebastian Berndt, Thomas Eisenbarth, Okan Seker, Akira Takahashi, Luca Wilke and Greg Zaverucha,
    Side-Channel Protections for Picnic Signatures , IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 4, pp. 239-282, 2021.
    DOI:10.46586/tches.v2021.i4.239-282
    File: https://tches.iacr.org/index.php/TCHES/article/view/9066

  • Ilia Polian, Frank Altmann, Tolga Arul, Christian Boit, Ralf Brederlow, Lucas Davi, Rolf Drechsler, Nan Du, Thomas Eisenbarth, Tim Güneysu, Sascha Hermann, Matthias Hiller, Rainer Leupers, Farhad Merchant, Thomas Mussenbrock, Stefan Katzenbeisser, Akash Kumar, Wolfgang Kunz, Thomas Mikolajick, Vivek Pachauri, Jean-Pierre Seifert, Frank Sill Torres and Jens Trommer,
    Nano Security: From Nano-Electronics to Secure Systems in Design, Automation & Test in Europe Conference & Exhibition, DATE 2021, Grenoble, France, February 1-5, 2021 , IEEE, 2021. pp. 1334--1339.
    DOI:10.23919/DATE51398.2021.9474187
    File: https://doi.org/10.23919/DATE51398.2021.9474187

  • Jan Wichelmann, Sebastian Berndt, Claudius Pott and Thomas Eisenbarth,
    Help, My Signal has Bad Device! - Breaking the Signal Messenger's Post-Compromise Security Through a Malicious Device in Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings , Leyla Bilge and Lorenzo Cavallaro and Giancarlo Pellegrino and Nuno Neves, Eds. Springer, 2021. pp. 88--105.
    DOI:10.1007/978-3-030-80825-9_5
    File: https://doi.org/10.1007/978-3-030-80825-9_5

  • Claudius Pott, Philipp Jungklass, David Jacek Csejka, Thomas Eisenbarth and Marco Siebert,
    Firmware Security Module: A Framework for Trusted Computing in Automotive Multiprocessors , Journal of Hardware and Systems Security , 2021.
    DOI:10.1007/s41635-021-00114-4
    File: https://doi.org/10.1007/s41635-021-00114-4

  • Tim Gellersen, Okan Seker and Thomas Eisenbarth,
    Differential Power Analysis of the Picnic Signature Scheme in Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings , Jung Hee Cheon and Jean-Pierre Tillich, Eds. Springer, 2021. pp. 177--194.
    DOI:10.1007/978-3-030-81293-5_10
    File: https://doi.org/10.1007/978-3-030-81293-5_10

  • Samira Briongos, Ida Bruhns, Pedro Malagón, Thomas Eisenbarth and José Manuel Moya,
    Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged Cache Attacks in IEEE European Symposium on Security and Privacy, EuroS&P 2021, Vienna, Austria, September 6-10, 2021 , IEEE, 2021. pp. 683--700.
    DOI:10.1109/EuroSP51992.2021.00051
    File: https://doi.org/10.1109/EuroSP51992.2021.00051

  • Okan Seker, Thomas Eisenbarth and Maciej Liskiewicz,
    A White-Box Masking Scheme Resisting Computational and Algebraic Attacks , IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 2, pp. 61-105, 2021. Cryptology ePrint Archive, Report 2020/443.
    DOI:10.46586/tches.v2021.i2.61-105
    File: https://tches.iacr.org/index.php/TCHES/article/view/8788

  • Johannes Müller, Mohammad Rahmani Fadiheh, Anna Lena Duque Antón, Thomas Eisenbarth, Dominik Stoffel and Wolfgang Kunz,
    A Formal Approach to Confidentiality Verification in SoCs at the Register Transfer Level in 58th ACM/IEEE Design Automation Conference, DAC 2021, San Francisco, CA, USA, December 5-9, 2021 , IEEE, 2021. pp. 991--996.
    DOI:10.1109/DAC18074.2021.9586248
    File: https://doi.org/10.1109/DAC18074.2021.9586248

  • 2020

  • Zane Weissman, Thore Tiemann, Daniel Moghimi, Evan Custodio, Thomas Eisenbarth and Berk Sunar,
    JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms , IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2020, no. 3, pp. 169-195, 2020. https://tches.iacr.org/index.php/TCHES/article/view/8587 .
    DOI:10.13154/tches.v2020.i3.169-195
    Weblink: https://tches.iacr.org/index.php/TCHES/article/view/8587

  • Samira Briongos, Pedro Malag'on, Jose Manuel Moya and Thomas Eisenbarth,
    Microarchitectural Isolation Guarantees Through Execution Based Signatures in XXXV Conference on Design of Circuits and Integrated Systems, DCIS, 2020, Segovia, Spain, November 18-20, 2020 , IEEE, 2020. pp. 1--6.
    DOI:10.1109/DCIS51330.2020.9268660
    File: https://doi.org/10.1109/DCIS51330.2020.9268660

  • Samira Briongos, Pedro Malagon, Jose M. Moya and Thomas Eisenbarth,
    RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, 2020. pp. 1967--1984.
    ISBN:978-1-939133-17-5
    File: https://www.usenix.org/conference/usenixsecurity20/presentation/briongos

  • Luca Wilke, Jan Wichelmann, Mathias Morbitzer and Thomas Eisenbarth,
    SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions in 2020 IEEE Symposium on Security and Privacy (SP) , Los Alamitos, CA, USA: IEEE Computer Society, 2020. pp. 1431-1444.
    DOI:10.1109/SP40000.2020.00080
    Weblink: https://uzl-its.github.io/SEVurity/

  • Okan Seker, Sebastian Berndt, Luca Wilke and Thomas Eisenbarth,
    SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis in CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security , Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna, Eds. ACM, 2020. pp. 1033--1049.
    DOI:10.1145/3372297.3417889
    File: https://dl.acm.org/doi/10.1145/3372297.3417889

  • Daniel Moghimi, Berk Sunar, Thomas Eisenbarth and Nadia Heninger,
    TPM-FAIL: TPM meets Timing and Lattice Attacks in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, 2020. pp. 2057--2073.
    ISBN:978-1-939133-17-5
    Weblink: https://tpm.fail/
    File: https://www.usenix.org/conference/usenixsecurity20/presentation/moghimi-tpm

  • 2019

  • Berk Gulmezoglu, Andreas Zankl, M. Caner Tol, Saad Islam, Thomas Eisenbarth and Berk Sunar,
    Undermining User Privacy on Mobile Devices Using AI in Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2019. pp. 214--227.
    DOI:10.1145/3321705.3329804
    File: http://doi.acm.org/10.1145/3321705.3329804