Prof. Dr.-Ing. Thomas Eisenbarth

Institutsdirektor
Ratzeburger Allee 160
23562 Lübeck
Building 64, 1. OG, Room 043
Email: | thomas.eisenbarth(at)uni-luebeck.de |
Phone: | +49 451 3101 6600 |
Fax: | +49 451 3101 6604 |
About Me
I am Professor for IT Security at University of Lübeck. I received my Ph.D. in ECE from Ruhr University Bochum, Germany, where I worked as a member of the Horst Goertz Institute for IT Security (HGI). From 2010 I spent two years at the Center for Cryptology and Information Security (CCIS) at Florida Atlantic University. In 2012 I joined the Electrical and Computer Engineering Department at WPI. Since August of 2017, I am the Director of the Institute for IT Security at the University of Lübeck.
My research interests are in:
- Applied Cryptology
- Systems security and secure computer architecture
- Side channel analysis, physical attacks and their prevention
- Cloud and virtualization security
Publications
2023
Thore
Tiemann,
Sebastian
Berndt,
Thomas
Eisenbarth and
Maciej
Liskiewicz,
"Act natural!": Exchanging Private Messages on Public Blockchains
in 8th IEEE European Symposium on Security and Privacy
,
IEEE,
2023.
pp. 292-308.
Jan
Wichelmann,
Christopher
Peredy,
Florian
Sieck,
Anna
Pätschke and
Thomas
Eisenbarth,
MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V
in Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) - 20th International Conference
,
Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati, Eds.
Springer,
2023.
pp. 3-23.
DOI: | 10.1007/978-3-031-35504-2_1 |
Weblink: | https://arxiv.org/abs/2305.00584 |
Jan
Wichelmann,
Anna
Pätschke,
Luca
Wilke and
Thomas
Eisenbarth,
Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software
in 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023
,
Joseph A. Calandrino and Carmela Troncoso, Eds.
USENIX Association,
2023.
DOI: | 10.48550/arXiv.2210.13124 |
File: | https://www.usenix.org/conference/usenixsecurity23/presentation/wichelmann |
Nils
Loose,
Felix
Mächtle,
Claudius
Pott,
Volodymyr
Bezsmertnyi and
Thomas
Eisenbarth,
Madvex: Instrumentation-based Adversarial Attacks on Machine Learning Malware Detection
in Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) - 20th International Conference
,
Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati, Eds.
Springer,
2023.
pp. 69-88.
DOI: | 10.1007/978-3-031-35504-2_4 |
Weblink: | https://arxiv.org/abs/2305.02559 |
Thore
Tiemann,
Zane
Weissman,
Thomas
Eisenbarth and
Berk
Sunar,
IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems
in Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security
,
Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik, Eds.
ACM,
2023.
pp. 827-840.
DOI: | 10.1145/3579856.3582838 |
Weblink: | https://arxiv.org/abs/2202.11623 |
File: | fileadmin/files/documents/slides_iotlb-sc_tiemann_asiaccs23.pdf |
2022
Mengyuan
Li,
Luca
Wilke,
Jan
Wichelmann,
Thomas
Eisenbarth,
Radu
Teodorescu and
Yinqian
Zhang,
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP
in 2022 IEEE Symposium on Security and Privacy (SP)
,
San Francisco, CA, USA:
IEEE,
2022.
pp. 337-351.
DOI: | 10.1109/SP46214.2022.9833768 |
File: | https://doi.ieeecomputersociety.org/10.1109/SP46214.2022.9833768 |
Sebastian
Berndt,
Jan
Wichelmann,
Claudius
Pott,
Tim-Henrik
Traving and
Thomas
Eisenbarth,
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols
in Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security
,
ACM,
2022.
pp. 712-726.
DOI: | 10.1145/3488932.3517387 |
ISBN: | 9781450391405 |
File: | https://dl.acm.org/doi/pdf/10.1145/3488932.3517387 |
Jan
Wichelmann,
Florian
Sieck,
Anna
Pätschke and
Thomas
Eisenbarth,
Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications
in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022
,
Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi, Eds.
ACM,
2022.
pp. 2915--2929.
DOI: | 10.1145/3548606.3560654 |
File: | https://doi.org/10.1145/3548606.3560654 |
2021
Florian
Sieck,
Sebastian
Berndt,
Jan
Wichelmann and
Thomas
Eisenbarth,
Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries
in CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security
,
Yongdae Kim and
Jong Kim and
Giovanni Vigna and
Elaine Shi, Eds.
ACM,
2021.
pp. 2456--2473.
DOI: | 10.1145/3460120.3484783 |
File: | https://doi.org/10.1145/3460120.3484783 |
Luca
Wilke,
Jan
Wichelmann,
Florian
Sieck and
Thomas
Eisenbarth,
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation
in 2021 IEEE Security and Privacy Workshops (SPW)
,
2021.
pp. 456-466.
DOI: | 10.1109/SPW53761.2021.00064 |
File: | https://uzl-its.github.io/undeserved-trust/ |
Diego F.
Aranha,
Sebastian
Berndt,
Thomas
Eisenbarth,
Okan
Seker,
Akira
Takahashi,
Luca
Wilke and
Greg
Zaverucha,
Side-Channel Protections for Picnic Signatures
,
IACR Transactions on Cryptographic Hardware and Embedded Systems
,
vol. 2021,
no. 4,
pp. 239-282,
2021.
DOI: | 10.46586/tches.v2021.i4.239-282 |
File: | https://tches.iacr.org/index.php/TCHES/article/view/9066 |
Ilia
Polian,
Frank
Altmann,
Tolga
Arul,
Christian
Boit,
Ralf
Brederlow,
Lucas
Davi,
Rolf
Drechsler,
Nan
Du,
Thomas
Eisenbarth,
Tim
Güneysu,
Sascha
Hermann,
Matthias
Hiller,
Rainer
Leupers,
Farhad
Merchant,
Thomas
Mussenbrock,
Stefan
Katzenbeisser,
Akash
Kumar,
Wolfgang
Kunz,
Thomas
Mikolajick,
Vivek
Pachauri,
Jean-Pierre
Seifert,
Frank
Sill Torres and
Jens
Trommer,
Nano Security: From Nano-Electronics to Secure Systems
in Design, Automation & Test in Europe Conference & Exhibition, DATE 2021, Grenoble, France, February 1-5, 2021
,
IEEE,
2021.
pp. 1334--1339.
DOI: | 10.23919/DATE51398.2021.9474187 |
File: | https://doi.org/10.23919/DATE51398.2021.9474187 |
Jan
Wichelmann,
Sebastian
Berndt,
Claudius
Pott and
Thomas
Eisenbarth,
Help, My Signal has Bad Device! - Breaking the Signal Messenger's
Post-Compromise Security Through a Malicious Device
in Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings
,
Leyla Bilge and
Lorenzo Cavallaro and
Giancarlo Pellegrino and
Nuno Neves, Eds.
Springer,
2021.
pp. 88--105.
DOI: | 10.1007/978-3-030-80825-9_5 |
File: | https://doi.org/10.1007/978-3-030-80825-9_5 |
Claudius
Pott,
Philipp
Jungklass,
David Jacek
Csejka,
Thomas
Eisenbarth and
Marco
Siebert,
Firmware Security Module: A Framework for Trusted Computing in Automotive Multiprocessors
,
Journal of Hardware and Systems Security
,
2021.
DOI: | 10.1007/s41635-021-00114-4 |
File: | https://doi.org/10.1007/s41635-021-00114-4 |
Tim
Gellersen,
Okan
Seker and
Thomas
Eisenbarth,
Differential Power Analysis of the Picnic Signature Scheme
in Post-Quantum Cryptography - 12th International Workshop, PQCrypto
2021, Daejeon, South Korea, July 20-22, 2021, Proceedings
,
Jung Hee Cheon and Jean-Pierre Tillich, Eds.
Springer,
2021.
pp. 177--194.
DOI: | 10.1007/978-3-030-81293-5_10 |
File: | https://doi.org/10.1007/978-3-030-81293-5_10 |
Samira
Briongos,
Ida
Bruhns,
Pedro
Malagón,
Thomas
Eisenbarth and
José Manuel
Moya,
Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged
Cache Attacks
in IEEE European Symposium on Security and Privacy, EuroS&P 2021, Vienna, Austria, September 6-10, 2021
,
IEEE,
2021.
pp. 683--700.
DOI: | 10.1109/EuroSP51992.2021.00051 |
File: | https://doi.org/10.1109/EuroSP51992.2021.00051 |
Okan
Seker,
Thomas
Eisenbarth and
Maciej
Liskiewicz,
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks
,
IACR Transactions on Cryptographic Hardware and Embedded Systems
,
vol. 2021,
no. 2,
pp. 61-105,
2021.
Cryptology ePrint Archive, Report 2020/443.
DOI: | 10.46586/tches.v2021.i2.61-105 |
File: | https://tches.iacr.org/index.php/TCHES/article/view/8788 |
Johannes
Müller,
Mohammad Rahmani
Fadiheh,
Anna Lena
Duque Antón,
Thomas
Eisenbarth,
Dominik
Stoffel and
Wolfgang
Kunz,
A Formal Approach to Confidentiality Verification in SoCs at the Register Transfer Level
in 58th ACM/IEEE Design Automation Conference, DAC 2021, San Francisco, CA, USA, December 5-9, 2021
,
IEEE,
2021.
pp. 991--996.
DOI: | 10.1109/DAC18074.2021.9586248 |
File: | https://doi.org/10.1109/DAC18074.2021.9586248 |
2020
Zane
Weissman,
Thore
Tiemann,
Daniel
Moghimi,
Evan
Custodio,
Thomas
Eisenbarth and
Berk
Sunar,
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms
,
IACR Transactions on Cryptographic Hardware and Embedded Systems
,
vol. 2020,
no. 3,
pp. 169-195,
2020.
https://tches.iacr.org/index.php/TCHES/article/view/8587
.
DOI: | 10.13154/tches.v2020.i3.169-195 |
Weblink: | https://tches.iacr.org/index.php/TCHES/article/view/8587 |
Samira
Briongos,
Pedro
Malag'on,
Jose Manuel
Moya and
Thomas
Eisenbarth,
Microarchitectural Isolation Guarantees Through Execution Based Signatures
in XXXV Conference on Design of Circuits and Integrated Systems, DCIS, 2020, Segovia, Spain, November 18-20, 2020
,
IEEE,
2020.
pp. 1--6.
DOI: | 10.1109/DCIS51330.2020.9268660 |
File: | https://doi.org/10.1109/DCIS51330.2020.9268660 |
Samira
Briongos,
Pedro
Malagon,
Jose M.
Moya and
Thomas
Eisenbarth,
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks
in 29th USENIX Security Symposium (USENIX Security 20)
,
Boston, MA:
USENIX Association,
2020.
pp. 1967--1984.
ISBN: | 978-1-939133-17-5 |
File: | https://www.usenix.org/conference/usenixsecurity20/presentation/briongos |
Luca
Wilke,
Jan
Wichelmann,
Mathias
Morbitzer and
Thomas
Eisenbarth,
SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions
in 2020 IEEE Symposium on Security and Privacy (SP)
,
Los Alamitos, CA, USA:
IEEE Computer Society,
2020.
pp. 1431-1444.
DOI: | 10.1109/SP40000.2020.00080 |
Weblink: | https://uzl-its.github.io/SEVurity/ |
Okan
Seker,
Sebastian
Berndt,
Luca
Wilke and
Thomas
Eisenbarth,
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis
in CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security
,
Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna, Eds.
ACM,
2020.
pp. 1033--1049.
DOI: | 10.1145/3372297.3417889 |
File: | https://dl.acm.org/doi/10.1145/3372297.3417889 |
Daniel
Moghimi,
Berk
Sunar,
Thomas
Eisenbarth and
Nadia
Heninger,
TPM-FAIL: TPM meets Timing and Lattice Attacks
in 29th USENIX Security Symposium (USENIX Security 20)
,
Boston, MA:
USENIX Association,
2020.
pp. 2057--2073.
ISBN: | 978-1-939133-17-5 |
Weblink: | https://tpm.fail/ |
File: | https://www.usenix.org/conference/usenixsecurity20/presentation/moghimi-tpm |
2019
Berk
Gulmezoglu,
Andreas
Zankl,
M. Caner
Tol,
Saad
Islam,
Thomas
Eisenbarth and
Berk
Sunar,
Undermining User Privacy on Mobile Devices Using AI
in Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security
,
New York, NY, USA:
ACM,
2019.
pp. 214--227.
DOI: | 10.1145/3321705.3329804 |
File: | http://doi.acm.org/10.1145/3321705.3329804 |

- Staff
- Thomas Eisenbarth
- Esfandiar Mohammadi
- Paula Arnold
- Ida Bruhns
- Finn Burmester
- Till Eifert
- Tim Gellersen
- Jonah Heller
- Moritz Kirschte
- Marven Kummerfeldt
- Johannes Liebenow
- Nils Loose
- Felix Mächtle
- Sebastian Meiser
- Anna Pätschke
- Pajam Pauls
- Thorsten Peinemann
- Christopher Peredy
- Claudius Pott
- Anja Rabich
- Jonas Sander
- Ines Schiebahn
- Yara Schütt
- Florian Sieck
- Thore Tiemann
- Alexander Treff
- Jan Wichelmann
- Luca Wilke