Prof. Dr.-Ing. Thomas Eisenbarth

Institutsdirektor


Ratzeburger Allee 160
23562 Lübeck
Building 64, 1. OG, Room 043

Email:thomas.eisenbarth(at)uni-luebeck.de
Phone:+49 451 3101 6600
Fax:+49 451 3101 6604

About Me

I am Professor for IT Security at University of Lübeck.  I received my Ph.D. in ECE from Ruhr University Bochum, Germany, where I worked as a member of the Horst Goertz Institute for IT Security (HGI). From 2010 I  spent two years at the Center for Cryptology and Information Security (CCIS) at Florida Atlantic University. In 2012 I joined the Electrical and Computer Engineering Department at WPI. Since August of 2017, I am the Director of the Institute for IT Security at the University of Lübeck.

My research interests are in:

  • Applied Cryptology
  • Systems security and secure computer architecture
  • Side channel analysis, physical attacks and their prevention
  • Cloud and virtualization security

Publications

2018

  • Ahmad Moghimi, Jan Wichelmann, Thomas Eisenbarth and Berk Sunar,
    MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations , International Journal of Parallel Programming , 2018.
    File: https://doi.org/10.1007/s10766-018-0611-9

  • Jan Wichelmann, Ahmad Moghimi, Thomas Eisenbarth and Berk Sunar,
    MicroWalk: A Framework for Finding Side Channels in Binaries in Proceedings of the 34th Annual Computer Security Applications Conference , New York, NY, USA: ACM, 2018. pp. 161--173.
    DOI:10.1145/3274694.3274741
    File: http://doi.acm.org/10.1145/3274694.3274741

  • Samira Briongos, Gorka Irazoqui, Pedro Malagon and Thomas Eisenbarth,
    CacheShield: Detecting Cache Attacks through Self-Observation in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018 , 2018. pp. 224--235.
    DOI:10.1145/3176258.3176320
    File: http://doi.acm.org/10.1145/3176258.3176320

  • Mehmet Sinan Inci, Thomas Eisenbarth and Berk Sunar,
    DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes , 2018.

  • Okan Seker, Abraham Fernandez-Rubio, Thomas Eisenbarth and Rainer Steinwandt,
    Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks , IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2018, no. 3, pp. 394-430, 2018.
    DOI:10.13154/tches.v2018.i3.394-430
    File: https://tches.iacr.org/index.php/TCHES/article/view/7281

  • Elke De Mulder, Thomas Eisenbarth and Patrick Schaumont,
    Identifying and Eliminating Side-Channel Leaks in Programmable Systems , IEEE Design Test , vol. 35, no. 1, pp. 74-89, 2018.
    DOI:10.1109/MDAT.2017.2766166

  • Marc Stelzner and Thomas Eisenbarth,
    IT Security in Lübeck - The design of a modern and future-proof security curriculum in 2018 12th European Workshop on Microelectronics Education (EWME) , 2018. pp. 79-82.
    DOI:10.1109/EWME.2018.8629494
    File: https://ieeexplore.ieee.org/document/8629494

  • Gorka Irazoqui, Thomas Eisenbarth and Berk Sunar,
    MASCAT: Preventing Microarchitectural Attacks Before Distribution in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018 , 2018. pp. 377--388.
    DOI:10.1145/3176258.3176316
    File: http://doi.acm.org/10.1145/3176258.3176316

  • Fergus Dall, Gabrielle De Micheli, Thomas Eisenbarth, Daniel Genkin, Nadia Heninger, Ahmad Moghimi and Yuval Yarom,
    CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks , IACR Trans. Cryptogr. Hardw. Embed. Syst. , vol. 2018, no. 2, pp. 171--191, 2018.
    DOI:10.13154/tches.v2018.i2.171-191
    File: https://doi.org/10.13154/tches.v2018.i2.171-191

  • 2017

  • Samira Briongos, Gorka Irazoqui, Pedro Malagon and Thomas Eisenbarth,
    CacheShield: Protecting Legacy Processes Against Cache Attacks , 09 2017.
    File: https://arxiv.org/abs/1709.01795v1

  • Mehmet Sinan Inci, Thomas Eisenbarth and Berk Sunar,
    Hit by the Bus: QoS Degradation Attack on Android in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2017. pp. 716--727.
    ISBN:978-1-4503-4944-4
    File: http://doi.acm.org/10.1145/3052973.3053028

  • Berk Gulmezoglu, Andreas Zankl, Thomas Eisenbarth and Berk Sunar,
    PerfWeb: How to Violate Web Privacy with Hardware Performance Events in Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II , 2017. pp. 80--97.
    File: https://doi.org/10.1007/978-3-319-66399-9_5

  • A. Shahverdi, M. Taha and Thomas Eisenbarth,
    Lightweight Side Channel Resistance: Threshold Implementations of Simon , IEEE Transactions on Computers , vol. 66, no. 4, pp. 661-671, 2017.
    File: https://doi.org/10.1109/TC.2016.2614504

  • Berk Gulmezoglu, Thomas Eisenbarth and Berk Sunar,
    Cache-Based Application Detection in the Cloud Using Machine Learning in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2017. pp. 288--300.
    ISBN:978-1-4503-4944-4
    File: http://doi.acm.org/10.1145/3052973.3053036

  • Gorka Irazoqui, Kai Cong, Xiaofei Guo, Hareesh Khattri, Arun Kanuparthi, Thomas Eisenbarth and Berk Sunar,
    Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries , CoRR , vol. abs/1709.01552, 2017.
    File: http://arxiv.org/abs/1709.01552

  • Ahmad Moghimi, Gorka Irazoqui and Thomas Eisenbarth,
    CacheZoom: How SGX Amplifies the Power of Cache Attacks in Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings , 2017. pp. 69--90.
    File: https://doi.org/10.1007/978-3-319-66787-4_4

  • Marc Green, Leandro Rodrigues-Lima, Andreas Zankl, Gorka Irazoqui, Johann Heyszl and Thomas Eisenbarth,
    AutoLock: Why Cache Attacks on ARM Are Harder Than You Think in 26th USENIX Security Symposium (USENIX Security 17) , Vancouver, BC: USENIX Association, 2017. pp. 1075--1091.
    ISBN:978-1-931971-40-9
    File: https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/green

  • Michael Moukarzel, Thomas Eisenbarth and Berk Sunar,
    uLeech: A side-channel evaluation platform for IoT in 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS) , 2017. pp. 25-28.
    DOI:10.1109/MWSCAS.2017.8052851
    File: https://ieeexplore.ieee.org/abstract/document/8052851

  • 2016

  • Berk Gulmezoglu, Mehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth and Berk Sunar,
    Cross-VM Cache Attacks on AES , IEEE Trans. Multi-Scale Computing Systems , vol. 2, no. 3, pp. 211--222, 2016.
    File: https://doi.org/10.1109/TMSCS.2016.2550438

  • A. Adam Ding, Cong Chen and Thomas Eisenbarth,
    Simpler, Faster, and More Robust T-Test Based Leakage Detection , Standaert, Francois-Xavier and Oswald, Elisabeth, Eds. Cham: Springer International Publishing, 2016, pp. 163--183.
    ISBN:978-3-319-43283-0
    File: https://doi.org/10.1007/978-3-319-43283-0_10

  • Cong Chen, Mehmet Sinan Inci, Mostafa Taha and Thomas Eisenbarth,
    SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs in Smart Card Research and Advanced Applications - 15th International Conference, CARDIS 2016, Cannes, France, November 7-9, 2016, Revised Selected Papers , 2016. pp. 73--88.
    DOI:10.1007/978-3-319-54669-8_5
    File: https://doi.org/10.1007/978-3-319-54669-8_5

  • Mehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth and Berk Sunar,
    Efficient, Adversarial Neighbor Discovery Using Logical Channels on Microsoft Azure in Proceedings of the 32nd Annual Conference on Computer Security Applications , New York, NY, USA: ACM, 2016. pp. 436--447.
    DOI:10.1145/2991079.2991113
    ISBN:978-1-4503-4771-6
    File: http://users.wpi.edu/~teisenbarth/pubs/NeighborDiscoveryAzure%20ACSAC2016.pdf

  • Cong Chen, Thomas Eisenbarth, Ingo Maurich and Rainer Steinwandt,
    Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem , IEEE Trans. Information Forensics and Security , vol. 11, no. 6, pp. 1093--1105, 2016.
    File: https://doi.org/10.1109/TIFS.2015.2509944

  • Gorka Irazoqui, Thomas Eisenbarth and Berk Sunar,
    Cross Processor Cache Attacks in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2016. pp. 353--364.
    DOI:10.1145/2897845.2897867
    ISBN:978-1-4503-4233-9
    File: http://doi.acm.org/10.1145/2897845.2897867

  • A. M. Leonard, H. Cai, K. K. Venkatasubramanian, M. Ali and Thomas Eisenbarth,
    A honeypot system for wearable networks in 2016 IEEE 37th Sarnoff Symposium , 2016. pp. 199-201.
    File: https://doi.org/10.1109/SARNOF.2016.7846755