Prof. Dr.-Ing. Thomas Eisenbarth

Institutsdirektor
Ratzeburger Allee 160
23562 Lübeck
Building 64, 1. OG, Room 043
Email: | thomas.eisenbarth(at)uni-luebeck.de |
Phone: | +49 451 3101 6600 |
Fax: | +49 451 3101 6604 |
About Me
I am Professor for IT Security at University of Lübeck. I received my Ph.D. in ECE from Ruhr University Bochum, Germany, where I worked as a member of the Horst Goertz Institute for IT Security (HGI). From 2010 I spent two years at the Center for Cryptology and Information Security (CCIS) at Florida Atlantic University. In 2012 I joined the Electrical and Computer Engineering Department at WPI. Since August of 2017, I am the Director of the Institute for IT Security at the University of Lübeck.
My research interests are in:
- Applied Cryptology
- Systems security and secure computer architecture
- Side channel analysis, physical attacks and their prevention
- Cloud and virtualization security
Publications
2016
Gorka
Irazoqui,
Thomas
Eisenbarth and
Berk
Sunar,
Cross Processor Cache Attacks
in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security
,
New York, NY, USA:
ACM,
2016.
pp. 353--364.
DOI: | 10.1145/2897845.2897867 |
ISBN: | 978-1-4503-4233-9 |
File: | http://doi.acm.org/10.1145/2897845.2897867 |
A. M.
Leonard,
H.
Cai,
K. K.
Venkatasubramanian,
M.
Ali and
Thomas
Eisenbarth,
A honeypot system for wearable networks
in 2016 IEEE 37th Sarnoff Symposium
,
2016.
pp. 199-201.
File: | https://doi.org/10.1109/SARNOF.2016.7846755 |
Mehmet Sinan
Inci,
Berk
Gulmezoglu,
Thomas
Eisenbarth and
Berk
Sunar,
Co-location Detection on the Cloud
in Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers
,
2016.
pp. 19--34.
File: | https://doi.org/10.1007/978-3-319-43283-0_2 |
Cong
Chen,
Mohammad
Farmani and
Thomas
Eisenbarth,
A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile---and Why It Is Not
,
Cheon, Jung Hee and Takagi, Tsuyoshi, Eds.
Berlin, Heidelberg:
Springer Berlin Heidelberg,
2016,
pp. 819--843.
ISBN: | 978-3-662-53887-6 |
File: | https://link.springer.com/chapter/10.1007%2F978-3-662-53887-6_30 |
Mehmet Sinan
Inci,
Berk
Gulmezoglu,
Gorka
Irazoqui,
Thomas
Eisenbarth and
Berk
Sunar,
Cache Attacks Enable Bulk Key Recovery on the Cloud
in Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings
,
2016.
pp. 368--388.
DOI: | 10.1007/978-3-662-53140-2_18 |
File: | https://doi.org/10.1007/978-3-662-53140-2_18 |
2015
Cong
Chen,
Thomas
Eisenbarth,
Ingo
Maurich and
Rainer
Steinwandt,
Masking Large Keys in Hardware: A Masked Implementation of McEliece
in Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers
,
2015.
pp. 293--309.
File: | https://doi.org/10.1007/978-3-319-31301-6_18 |
Gorka
Irazoqui,
Thomas
Eisenbarth and
Berk
Sunar,
Systematic Reverse Engineering of Cache Slice Selection in Intel Processors
in 2015 Euromicro Conference on Digital System Design, DSD 2015, Madeira, Portugal, August 26-28, 2015
,
2015.
pp. 629--636.
File: | https://doi.org/10.1109/DSD.2015.56 |
Gorka
Irazoqui,
Thomas
Eisenbarth and
Berk
Sunar,
SSA: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES
in 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015
,
2015.
pp. 591--604.
File: | https://doi.org/10.1109/SP.2015.42 |
Zachary N.
Goddard,
Nicholas
LaJeunesse and
Thomas
Eisenbarth,
Power analysis of the t-private logic style for FPGAs
in IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015
,
2015.
pp. 68--71.
File: | https://doi.org/10.1109/HST.2015.7140239 |
Baris
Ege,
Thomas
Eisenbarth and
Lejla
Batina,
Near Collision Side Channel Attacks
in Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers
,
2015.
pp. 277--292.
File: | https://doi.org/10.1007/978-3-319-31301-6_17 |
Aria
Shahverdi,
Mostafa
Taha and
Thomas
Eisenbarth,
Silent Simon: A threshold implementation under 100 slices
in IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015
,
2015.
pp. 1--6.
File: | https://doi.org/10.1109/HST.2015.7140227 |
Gorka
Irazoqui,
Mehmet Sinan
Inci,
Thomas
Eisenbarth and
Berk
Sunar,
Lucky 13 Strikes Back
in Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015
,
2015.
pp. 85--96.
File: | http://doi.acm.org/10.1145/2714576.2714625 |
Gorka
Irazoqui,
Mehmet Sinan
Inci,
Thomas
Eisenbarth and
Berk
Sunar,
Know Thy Neighbor: Crypto Library Detection in Cloud
,
PoPETs
,
vol. 2015,
no. 1,
pp. 25--40,
2015.
File: | http://www.degruyter.com/view/j/popets.2015.1.issue-1/popets-2015-0003/popets-2015-0003.xml |
Thomas
Eisenbarth,
Yunsi
Fei and
Dimitrios
Serpanos,
Guest Editorial: Special Section on Embedded System Security
,
IEEE Embedded Systems Letters
,
vol. 7,
no. 1,
pp. 1-2,
2015.
File: | https://doi.org/10.1109/LES.2015.2404940 |
Xin
Ye,
Mostafa
Taha,
Cong
Chen and
Thomas
Eisenbarth,
Faster Leakage Detection and Exploitation
in Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015
,
2015.
pp. 21--29.
DOI: | 10.1145/2808414.2808419 |
File: | https://www.researchgate.net/publication/301419853_Faster_Leakage_Detection_and_Exploitation |
Cong
Chen,
Thomas
Eisenbarth,
Ingo
Maurich and
Rainer
Steinwandt,
Differential Power Analysis of a McEliece Cryptosystem
in Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers
,
2015.
pp. 538--556.
DOI: | 10.1007/978-3-319-28166-7_26 |
File: | http://eprint.iacr.org/2014/534 |
Berk
Gulmezoglu,
Mehmet Sinan
Inci,
Gorka
Irazoqui,
Thomas
Eisenbarth and
Berk
Sunar,
A Faster and More Realistic Flush+Reload Attack on AES
in Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers
,
2015.
pp. 111--126.
File: | https://doi.org/10.1007/978-3-319-21476-4_8 |
Thomas
Eisenbarth,
Aaron
Meyerowitz and
Rainer
Steinwandt,
On the security margin of MAC striping
,
Inf. Process. Lett.
,
vol. 115,
no. 11,
pp. 899--902,
2015.
File: | https://doi.org/10.1016/j.ipl.2015.05.009 |
2014
Cong
Cong Chen,
Thomas
Eisenbarth,
Aria
Shahverdi and
Xin
Ye,
Balanced Encoding to Mitigate Power Analysis: A Case Study
,
IACR Cryptology ePrint Archive
,
vol. 2014,
pp. 952,
2014.
File: | http://eprint.iacr.org/2014/952 |
Xin
Ye,
Thomas
Eisenbarth and
William
Martin,
Bounded, yet Sufficient? How to Determine Whether Limited Side Channel Information Enables Key Recovery
in Smart Card Research and Advanced Applications - 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers
,
2014.
pp. 215--232.
File: | https://doi.org/10.1007/978-3-319-16763-3_13 |
Gorka
Irazoqui,
Mehmet Sinan
Inci,
Thomas
Eisenbarth and
Berk
Sunar,
Fine Grain Cross-VM Attacks on Xen and VMware
in 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, BDCloud 2014, Sydney, Australia, December 3-5, 2014
,
2014.
pp. 737--744.
DOI: | 10.1109/BDCloud.2014.102 |
File: | http://eprint.iacr.org/2014/248 |
Xin
Ye,
Cong
Chen and
Thomas
Eisenbarth,
Non-Linear Collision Analysis
in Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers
,
2014.
pp. 198--214.
File: | https://doi.org/10.1007/978-3-319-13066-8_13 |
Yarkin
Doröz,
Aria
Shahverdi,
Thomas
Eisenbarth and
Berk
Sunar,
Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince
in Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers
,
2014.
pp. 208--220.
File: | https://doi.org/10.1007/978-3-662-44774-1_17 |
Gorka
Irazoqui,
Mehmet Sinan
Inci,
Thomas
Eisenbarth and
Berk
Sunar,
Wait a minute! A fast, Cross-VM attack on AES
,
IACR Cryptology ePrint Archive
,
vol. 2014,
pp. 435,
2014.
File: | http://eprint.iacr.org/2014/435 |
2013
Thomas
Eisenbarth,
Ingo
Maurich,
Christof
Paar and
Xin
Ye,
A Performance Boost for Hash-Based Signatures
in Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday
,
2013.
pp. 166--182.
File: | https://doi.org/10.1007/978-3-642-42001-6_13 |

- Staff
- Thomas Eisenbarth
- Esfandiar Mohammadi
- Paula Arnold
- Ida Bruhns
- Finn Burmester
- Till Eifert
- Tim Gellersen
- Jonah Heller
- Moritz Kirschte
- Marven Kummerfeldt
- Johannes Liebenow
- Nils Loose
- Felix Mächtle
- Sebastian Meiser
- Anna Pätschke
- Pajam Pauls
- Thorsten Peinemann
- Christopher Peredy
- Claudius Pott
- Anja Rabich
- Jonas Sander
- Ines Schiebahn
- Yara Schütt
- Florian Sieck
- Thore Tiemann
- Alexander Treff
- Jan Wichelmann
- Luca Wilke