Prof. Dr.-Ing. Thomas Eisenbarth

Institutsdirektor
Ratzeburger Allee 160
23562 Lübeck
Building 64, 1. OG, Room 043
Email: | thomas.eisenbarth(at)uni-luebeck.de |
Phone: | +49 451 3101 6600 |
Fax: | +49 451 3101 6604 |
About Me
I am Professor for IT Security at University of Lübeck. I received my Ph.D. in ECE from Ruhr University Bochum, Germany, where I worked as a member of the Horst Goertz Institute for IT Security (HGI). From 2010 I spent two years at the Center for Cryptology and Information Security (CCIS) at Florida Atlantic University. In 2012 I joined the Electrical and Computer Engineering Department at WPI. Since August of 2017, I am the Director of the Institute for IT Security at the University of Lübeck.
My research interests are in:
- Applied Cryptology
- Systems security and secure computer architecture
- Side channel analysis, physical attacks and their prevention
- Cloud and virtualization security
Publications
2018
Ahmad
Moghimi,
Jan
Wichelmann,
Thomas
Eisenbarth and
Berk
Sunar,
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations
,
International Journal of Parallel Programming
,
2018.
File: | https://doi.org/10.1007/s10766-018-0611-9 |
Jan
Wichelmann,
Ahmad
Moghimi,
Thomas
Eisenbarth and
Berk
Sunar,
MicroWalk: A Framework for Finding Side Channels in Binaries
in Proceedings of the 34th Annual Computer Security Applications Conference
,
New York, NY, USA:
ACM,
2018.
pp. 161--173.
DOI: | 10.1145/3274694.3274741 |
File: | http://doi.acm.org/10.1145/3274694.3274741 |
Samira
Briongos,
Gorka
Irazoqui,
Pedro
Malagon and
Thomas
Eisenbarth,
CacheShield: Detecting Cache Attacks through Self-Observation
in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018
,
2018.
pp. 224--235.
DOI: | 10.1145/3176258.3176320 |
File: | http://doi.acm.org/10.1145/3176258.3176320 |
Mehmet Sinan
Inci,
Thomas
Eisenbarth and
Berk
Sunar,
DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes
,
2018.
Okan
Seker,
Abraham
Fernandez-Rubio,
Thomas
Eisenbarth and
Rainer
Steinwandt,
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks
,
IACR Transactions on Cryptographic Hardware and Embedded Systems
,
vol. 2018,
no. 3,
pp. 394-430,
2018.
DOI: | 10.13154/tches.v2018.i3.394-430 |
File: | https://tches.iacr.org/index.php/TCHES/article/view/7281 |
Elke
De Mulder,
Thomas
Eisenbarth and
Patrick
Schaumont,
Identifying and Eliminating Side-Channel Leaks in Programmable
Systems
,
IEEE Design Test
,
vol. 35,
no. 1,
pp. 74-89,
2018.
DOI: | 10.1109/MDAT.2017.2766166 |
Marc
Stelzner and
Thomas
Eisenbarth,
IT Security in Lübeck - The design of a modern and future-proof security curriculum
in 2018 12th European Workshop on Microelectronics Education (EWME)
,
2018.
pp. 79-82.
DOI: | 10.1109/EWME.2018.8629494 |
File: | https://ieeexplore.ieee.org/document/8629494 |
Gorka
Irazoqui,
Thomas
Eisenbarth and
Berk
Sunar,
MASCAT: Preventing Microarchitectural Attacks Before Distribution
in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018
,
2018.
pp. 377--388.
DOI: | 10.1145/3176258.3176316 |
File: | http://doi.acm.org/10.1145/3176258.3176316 |
Fergus
Dall,
Gabrielle De
Micheli,
Thomas
Eisenbarth,
Daniel
Genkin,
Nadia
Heninger,
Ahmad
Moghimi and
Yuval
Yarom,
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks
,
IACR Trans. Cryptogr. Hardw. Embed. Syst.
,
vol. 2018,
no. 2,
pp. 171--191,
2018.
DOI: | 10.13154/tches.v2018.i2.171-191 |
File: | https://doi.org/10.13154/tches.v2018.i2.171-191 |
2017
Samira
Briongos,
Gorka
Irazoqui,
Pedro
Malagon and
Thomas
Eisenbarth,
CacheShield: Protecting Legacy Processes Against Cache Attacks
,
09
2017.
File: | https://arxiv.org/abs/1709.01795v1 |
Mehmet Sinan
Inci,
Thomas
Eisenbarth and
Berk
Sunar,
Hit by the Bus: QoS Degradation Attack on Android
in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security
,
New York, NY, USA:
ACM,
2017.
pp. 716--727.
ISBN: | 978-1-4503-4944-4 |
File: | http://doi.acm.org/10.1145/3052973.3053028 |
Berk
Gulmezoglu,
Andreas
Zankl,
Thomas
Eisenbarth and
Berk
Sunar,
PerfWeb: How to Violate Web Privacy with Hardware Performance Events
in Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II
,
2017.
pp. 80--97.
File: | https://doi.org/10.1007/978-3-319-66399-9_5 |
A.
Shahverdi,
M.
Taha and
Thomas
Eisenbarth,
Lightweight Side Channel Resistance: Threshold Implementations of Simon
,
IEEE Transactions on Computers
,
vol. 66,
no. 4,
pp. 661-671,
2017.
File: | https://doi.org/10.1109/TC.2016.2614504 |
Berk
Gulmezoglu,
Thomas
Eisenbarth and
Berk
Sunar,
Cache-Based Application Detection in the Cloud Using Machine Learning
in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security
,
New York, NY, USA:
ACM,
2017.
pp. 288--300.
ISBN: | 978-1-4503-4944-4 |
File: | http://doi.acm.org/10.1145/3052973.3053036 |
Gorka
Irazoqui,
Kai
Cong,
Xiaofei
Guo,
Hareesh
Khattri,
Arun
Kanuparthi,
Thomas
Eisenbarth and
Berk
Sunar,
Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries
,
CoRR
,
vol. abs/1709.01552,
2017.
File: | http://arxiv.org/abs/1709.01552 |
Ahmad
Moghimi,
Gorka
Irazoqui and
Thomas
Eisenbarth,
CacheZoom: How SGX Amplifies the Power of Cache Attacks
in Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings
,
2017.
pp. 69--90.
File: | https://doi.org/10.1007/978-3-319-66787-4_4 |
Marc
Green,
Leandro
Rodrigues-Lima,
Andreas
Zankl,
Gorka
Irazoqui,
Johann
Heyszl and
Thomas
Eisenbarth,
AutoLock: Why Cache Attacks on ARM Are Harder Than You Think
in 26th USENIX Security Symposium (USENIX Security 17)
,
Vancouver, BC:
USENIX Association,
2017.
pp. 1075--1091.
ISBN: | 978-1-931971-40-9 |
File: | https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/green |
Michael
Moukarzel,
Thomas
Eisenbarth and
Berk
Sunar,
uLeech: A side-channel evaluation platform for IoT
in 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS)
,
2017.
pp. 25-28.
DOI: | 10.1109/MWSCAS.2017.8052851 |
File: | https://ieeexplore.ieee.org/abstract/document/8052851 |
2016
Berk
Gulmezoglu,
Mehmet Sinan
Inci,
Gorka
Irazoqui,
Thomas
Eisenbarth and
Berk
Sunar,
Cross-VM Cache Attacks on AES
,
IEEE Trans. Multi-Scale Computing Systems
,
vol. 2,
no. 3,
pp. 211--222,
2016.
File: | https://doi.org/10.1109/TMSCS.2016.2550438 |
A. Adam
Ding,
Cong
Chen and
Thomas
Eisenbarth,
Simpler, Faster, and More Robust T-Test Based Leakage Detection
,
Standaert, Francois-Xavier and Oswald, Elisabeth, Eds.
Cham:
Springer International Publishing,
2016,
pp. 163--183.
ISBN: | 978-3-319-43283-0 |
File: | https://doi.org/10.1007/978-3-319-43283-0_10 |
Cong
Chen,
Mehmet Sinan
Inci,
Mostafa
Taha and
Thomas
Eisenbarth,
SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs
in Smart Card Research and Advanced Applications - 15th International Conference, CARDIS 2016, Cannes, France, November 7-9, 2016, Revised Selected Papers
,
2016.
pp. 73--88.
DOI: | 10.1007/978-3-319-54669-8_5 |
File: | https://doi.org/10.1007/978-3-319-54669-8_5 |
Mehmet Sinan
Inci,
Gorka
Irazoqui,
Thomas
Eisenbarth and
Berk
Sunar,
Efficient, Adversarial Neighbor Discovery Using Logical Channels on Microsoft Azure
in Proceedings of the 32nd Annual Conference on Computer Security Applications
,
New York, NY, USA:
ACM,
2016.
pp. 436--447.
DOI: | 10.1145/2991079.2991113 |
ISBN: | 978-1-4503-4771-6 |
File: |
Cong
Chen,
Thomas
Eisenbarth,
Ingo
Maurich and
Rainer
Steinwandt,
Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem
,
IEEE Trans. Information Forensics and Security
,
vol. 11,
no. 6,
pp. 1093--1105,
2016.
File: | https://doi.org/10.1109/TIFS.2015.2509944 |
Gorka
Irazoqui,
Thomas
Eisenbarth and
Berk
Sunar,
Cross Processor Cache Attacks
in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security
,
New York, NY, USA:
ACM,
2016.
pp. 353--364.
DOI: | 10.1145/2897845.2897867 |
ISBN: | 978-1-4503-4233-9 |
File: | http://doi.acm.org/10.1145/2897845.2897867 |
A. M.
Leonard,
H.
Cai,
K. K.
Venkatasubramanian,
M.
Ali and
Thomas
Eisenbarth,
A honeypot system for wearable networks
in 2016 IEEE 37th Sarnoff Symposium
,
2016.
pp. 199-201.
File: | https://doi.org/10.1109/SARNOF.2016.7846755 |

- Staff
- Thomas Eisenbarth
- Esfandiar Mohammadi
- Paula Arnold
- Ida Bruhns
- Finn Burmester
- Jonah Heller
- Moritz Kirschte
- Marven Kummerfeldt
- Johannes Liebenow
- Nils Loose
- Felix Mächtle
- Sebastian Meiser
- Anna Pätschke
- Pajam Pauls
- Thorsten Peinemann
- Christopher Peredy
- Claudius Pott
- Anja Rabich
- Jonas Sander
- Ines Schiebahn
- Yara Schütt
- Florian Sieck
- Thore Tiemann
- Alexander Treff
- Jan Wichelmann
- Luca Wilke