Prof. Dr.-Ing. Thomas Eisenbarth

Institutsdirektor


Ratzeburger Allee 160
23562 Lübeck
Building 64, 1. OG, Room 043

Email:thomas.eisenbarth(at)uni-luebeck.de
Phone:+49 451 3101 6600
Fax:+49 451 3101 6604

About Me

I am Professor for IT Security at University of Lübeck.  I received my Ph.D. in ECE from Ruhr University Bochum, Germany, where I worked as a member of the Horst Goertz Institute for IT Security (HGI). From 2010 I  spent two years at the Center for Cryptology and Information Security (CCIS) at Florida Atlantic University. In 2012 I joined the Electrical and Computer Engineering Department at WPI. Since August of 2017, I am the Director of the Institute for IT Security at the University of Lübeck.

My research interests are in:

  • Applied Cryptology
  • Systems security and secure computer architecture
  • Side channel analysis, physical attacks and their prevention
  • Cloud and virtualization security

Publications

2017

  • Mehmet Sinan Inci, Thomas Eisenbarth and Berk Sunar,
    Hit by the Bus: QoS Degradation Attack on Android in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2017. pp. 716--727.
    ISBN:978-1-4503-4944-4
    File: http://doi.acm.org/10.1145/3052973.3053028

  • A. Shahverdi, M. Taha and T. Eisenbarth,
    Lightweight Side Channel Resistance: Threshold Implementations of Simon , IEEE Transactions on Computers , vol. 66, no. 4, pp. 661-671, 2017.
    File: https://doi.org/10.1109/TC.2016.2614504

  • Berk Gulmezoglu, Andreas Zankl, Thomas Eisenbarth and Berk Sunar,
    PerfWeb: How to Violate Web Privacy with Hardware Performance Events in Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II , 2017. pp. 80--97.
    File: https://doi.org/10.1007/978-3-319-66399-9_5

  • Michael Moukarzel, Thomas Eisenbarth and Berk Sunar,
    uLeech: A side-channel evaluation platform for IoT in 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS) , 2017. pp. 25-28.
    DOI:10.1109/MWSCAS.2017.8052851
    File: https://ieeexplore.ieee.org/abstract/document/8052851

  • Marc Green, Leandro Rodrigues-Lima, Andreas Zankl, Gorka Irazoqui, Johann Heyszl and Thomas Eisenbarth,
    AutoLock: Why Cache Attacks on ARM Are Harder Than You Think in 26th USENIX Security Symposium (USENIX Security 17) , Vancouver, BC: USENIX Association, 2017. pp. 1075--1091.
    ISBN:978-1-931971-40-9
    File: https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/green

  • 2016

  • Mehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth and Berk Sunar,
    Efficient, Adversarial Neighbor Discovery Using Logical Channels on Microsoft Azure in Proceedings of the 32nd Annual Conference on Computer Security Applications , New York, NY, USA: ACM, 2016. pp. 436--447.
    DOI:10.1145/2991079.2991113
    ISBN:978-1-4503-4771-6
    File: http://users.wpi.edu/~teisenbarth/pubs/NeighborDiscoveryAzure%20ACSAC2016.pdf

  • Cong Chen, Mehmet Sinan Inci, Mostafa Taha and Thomas Eisenbarth,
    SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs in Smart Card Research and Advanced Applications - 15th International Conference, CARDIS 2016, Cannes, France, November 7-9, 2016, Revised Selected Papers , 2016. pp. 73--88.
    DOI:10.1007/978-3-319-54669-8_5
    File: https://doi.org/10.1007/978-3-319-54669-8_5

  • A. Adam Ding, Cong Chen and Thomas Eisenbarth,
    Simpler, Faster, and More Robust T-Test Based Leakage Detection , Standaert, Francois-Xavier and Oswald, Elisabeth, Eds. Cham: Springer International Publishing, 2016, pp. 163--183.
    ISBN:978-3-319-43283-0
    File: https://doi.org/10.1007/978-3-319-43283-0_10

  • Cong Chen, Thomas Eisenbarth, Ingo Maurich and Rainer Steinwandt,
    Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem , IEEE Trans. Information Forensics and Security , vol. 11, no. 6, pp. 1093--1105, 2016.
    File: https://doi.org/10.1109/TIFS.2015.2509944

  • Gorka Irazoqui, Thomas Eisenbarth and Berk Sunar,
    Cross Processor Cache Attacks in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2016. pp. 353--364.
    DOI:10.1145/2897845.2897867
    ISBN:978-1-4503-4233-9
    File: http://doi.acm.org/10.1145/2897845.2897867

  • Berk Gulmezoglu, Mehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth and Berk Sunar,
    Cross-VM Cache Attacks on AES , IEEE Trans. Multi-Scale Computing Systems , vol. 2, no. 3, pp. 211--222, 2016.
    File: https://doi.org/10.1109/TMSCS.2016.2550438

  • Mehmet Sinan Inci, Berk Gulmezoglu, Thomas Eisenbarth and Berk Sunar,
    Co-location Detection on the Cloud in Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers , 2016. pp. 19--34.
    File: https://doi.org/10.1007/978-3-319-43283-0_2

  • Mehmet Sinan Inci, Berk Gulmezoglu, Gorka Irazoqui, Thomas Eisenbarth and Berk Sunar,
    Cache Attacks Enable Bulk Key Recovery on the Cloud in Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings , 2016. pp. 368--388.
    DOI:10.1007/978-3-662-53140-2_18
    File: https://doi.org/10.1007/978-3-662-53140-2_18

  • Cong Chen, Mohammad Farmani and Thomas Eisenbarth,
    A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile---and Why It Is Not , Cheon, Jung Hee and Takagi, Tsuyoshi, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016, pp. 819--843.
    ISBN:978-3-662-53887-6
    File: https://link.springer.com/chapter/10.1007%2F978-3-662-53887-6_30

  • A. M. Leonard, H. Cai, K. K. Venkatasubramanian, M. Ali and T. Eisenbarth,
    A honeypot system for wearable networks in 2016 IEEE 37th Sarnoff Symposium , 2016. pp. 199-201.
    File: https://doi.org/10.1109/SARNOF.2016.7846755

  • 2015

  • Baris Ege, Thomas Eisenbarth and Lejla Batina,
    Near Collision Side Channel Attacks in Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers , 2015. pp. 277--292.
    File: https://doi.org/10.1007/978-3-319-31301-6_17

  • Gorka Irazoqui, Thomas Eisenbarth and Berk Sunar,
    Systematic Reverse Engineering of Cache Slice Selection in Intel Processors in 2015 Euromicro Conference on Digital System Design, DSD 2015, Madeira, Portugal, August 26-28, 2015 , 2015. pp. 629--636.
    File: https://doi.org/10.1109/DSD.2015.56

  • Gorka Irazoqui, Thomas Eisenbarth and Berk Sunar,
    SSA: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES in 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015 , 2015. pp. 591--604.
    File: https://doi.org/10.1109/SP.2015.42

  • Aria Shahverdi, Mostafa Taha and Thomas Eisenbarth,
    Silent Simon: A threshold implementation under 100 slices in IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015 , 2015. pp. 1--6.
    File: https://doi.org/10.1109/HST.2015.7140227

  • Zachary N. Goddard, Nicholas LaJeunesse and Thomas Eisenbarth,
    Power analysis of the t-private logic style for FPGAs in IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015 , 2015. pp. 68--71.
    File: https://doi.org/10.1109/HST.2015.7140239

  • Thomas Eisenbarth, Aaron Meyerowitz and Rainer Steinwandt,
    On the security margin of MAC striping , Inf. Process. Lett. , vol. 115, no. 11, pp. 899--902, 2015.
    File: https://doi.org/10.1016/j.ipl.2015.05.009

  • Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth and Berk Sunar,
    Know Thy Neighbor: Crypto Library Detection in Cloud , PoPETs , vol. 2015, no. 1, pp. 25--40, 2015.
    File: http://www.degruyter.com/view/j/popets.2015.1.issue-1/popets-2015-0003/popets-2015-0003.xml

  • Cong Chen, Thomas Eisenbarth, Ingo Maurich and Rainer Steinwandt,
    Masking Large Keys in Hardware: A Masked Implementation of McEliece in Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers , 2015. pp. 293--309.
    File: https://doi.org/10.1007/978-3-319-31301-6_18

  • Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth and Berk Sunar,
    Lucky 13 Strikes Back in Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015 , 2015. pp. 85--96.
    File: http://doi.acm.org/10.1145/2714576.2714625

  • Thomas Eisenbarth, Yunsi Fei and Dimitrios Serpanos,
    Guest Editorial: Special Section on Embedded System Security , IEEE Embedded Systems Letters , vol. 7, no. 1, pp. 1-2, 2015.
    File: https://doi.org/10.1109/LES.2015.2404940