Prof. Dr.-Ing. Thomas Eisenbarth
                
            
    
        Institutsdirektor
        Ratzeburger Allee 160
        
        23562 Lübeck
        Gebäude 64, 1. OG,
         Raum 043
    
| Email: | thomas.eisenbarth(at)uni-luebeck.de | 
| Phone: | +49 451 3101 6600 | 
| Fax: | +49 451 3101 6604 | 
About Me
I am a Professor of IT Security at the University of Lübeck.  I received my Ph.D. in ECE from Ruhr-Universität Bochum, Germany, where I was a member of the Horst Goertz Institute for IT Security (HGI). Starting in 2010, I spent two years at the Center for Cryptology and Information Security (CCIS) at Florida Atlantic University. In 2012, I joined the Department of Electrical and Computer Engineering at WPI. Since August 2017 I am the Director of the Institute of IT Security at the University of Lübeck.
Since October 2024, I am the head of the STEM sections (the non-medical departments) of University of Lübeck.
My research interests are in:
- Systems security, software security and code analysis
 - Applied Cryptology
 - Secure virtualization, computer architecture and trusted execution environments
 - Side channel analysis, physical attacks and their prevention
 
Conference and Workshop Organization
- CHES 2022 Program Co-Chair
 - CARDIS 2021 General Chair
 - CARDIS 2020 General Chair
 - SPACE 2017 TPC Co-chair
 - CARDIS 2017 TPC Co-chair
 - LightSEC 2014 TPC Co-chair
 - CHES 2013 General Co-Chair
 - WESS 2013 TPC Co-chair
 
Program Committee Memberships
- 2025: EuroS&P, CHES, ACM CCS, USENIX Security
 - 2024: SysTEX, ACM CCS, USENIX Security
 - 2023: ACM CCS, USENIX Security, CRYPTO
 - 2022: USENIX Security, IEEE Security & Privacy, RWC
 - 2021: EuroCRYPT, USENIX Security
 - 2020: CRYPTO, EuroCRYPT
 - 2019: CARDIS, CHES, PQCrypto, DATE
 - 2018: Kangacrypt, CHES, PQCrypto
 - 2017: AsiaCRYPT, CHES, VLSISoC, COSADE, SEMS
 - 2016: RFIDsec, AsiaCRYPT, CARDIS, TrustED, COSADE, TRUDEVICE
 - 2015: CARDIS, CHES, Latincrypt, RFIDsec, COSADE, TrustED
 - 2014: CHES, ReConFig, CARDIS, M2MSec, WESS, RFIDsec
 - 2013: RFIDsec, ICICS
 - 2012: CHES
 - 2010: ISC
 
Publications
2016
Cross Processor Cache Attacks, in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2016. pp. 353--364.
| DOI: | 10.1145/2897845.2897867 | 
| ISBN: | 978-1-4503-4233-9 | 
| File: | 2897845.2897867 | 
Cross-VM Cache Attacks on AES, IEEE Trans. Multi-Scale Computing Systems , vol. 2, no. 3, pp. 211--222, 2016.
| File: | TMSCS.2016.2550438 | 
Efficient, Adversarial Neighbor Discovery Using Logical Channels on Microsoft Azure, in Proceedings of the 32nd Annual Conference on Computer Security Applications , New York, NY, USA: ACM, 2016. pp. 436--447.
| DOI: | 10.1145/2991079.2991113 | 
| ISBN: | 978-1-4503-4771-6 | 
| File: | 
Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem, IEEE Trans. Information Forensics and Security , vol. 11, no. 6, pp. 1093--1105, 2016.
| File: | TIFS.2015.2509944 | 
Simpler, Faster, and More Robust T-Test Based Leakage Detection, Standaert, Francois-Xavier and Oswald, Elisabeth, Eds. Cham: Springer International Publishing, 2016, pp. 163--183.
| ISBN: | 978-3-319-43283-0 | 
| File: | 978-3-319-43283-0_10 | 
SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs, in Smart Card Research and Advanced Applications - 15th International Conference, CARDIS 2016, Cannes, France, November 7-9, 2016, Revised Selected Papers , 2016. pp. 73--88.
| DOI: | 10.1007/978-3-319-54669-8_5 | 
| File: | 978-3-319-54669-8_5 | 
2015
Guest Editorial: Special Section on Embedded System Security, IEEE Embedded Systems Letters , vol. 7, no. 1, pp. 1-2, Mar. 2015.
| File: | LES.2015.2404940 | 
A Faster and More Realistic Flush+Reload Attack on AES, in Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers , 2015. pp. 111--126.
| File: | 978-3-319-21476-4_8 | 
Differential Power Analysis of a McEliece Cryptosystem, in Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers , 2015. pp. 538--556.
| DOI: | 10.1007/978-3-319-28166-7_26 | 
| File: | 534 | 
Faster Leakage Detection and Exploitation, in Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015 , 2015. pp. 21--29.
| DOI: | 10.1145/2808414.2808419 | 
| File: | 301419853_Faster_Leakage_Detection_and_Exploitation | 
Know Thy Neighbor: Crypto Library Detection in Cloud, PoPETs , vol. 2015, no. 1, pp. 25--40, 2015.
| File: | popets-2015-0003.xml | 
Lucky 13 Strikes Back, in Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015 , 2015. pp. 85--96.
| File: | 2714576.2714625 | 
Masking Large Keys in Hardware: A Masked Implementation of McEliece, in Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers , 2015. pp. 293--309.
| File: | 978-3-319-31301-6_18 | 
Near Collision Side Channel Attacks, in Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers , 2015. pp. 277--292.
| File: | 978-3-319-31301-6_17 | 
On the security margin of MAC striping, Inf. Process. Lett. , vol. 115, no. 11, pp. 899--902, 2015.
| File: | j.ipl.2015.05.009 | 
Power analysis of the t-private logic style for FPGAs, in IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015 , 2015. pp. 68--71.
| File: | HST.2015.7140239 | 
Silent Simon: A threshold implementation under 100 slices, in IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015 , 2015. pp. 1--6.
| File: | HST.2015.7140227 | 
SSA: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES, in 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015 , 2015. pp. 591--604.
| File: | SP.2015.42 | 
Systematic Reverse Engineering of Cache Slice Selection in Intel Processors, in 2015 Euromicro Conference on Digital System Design, DSD 2015, Madeira, Portugal, August 26-28, 2015 , 2015. pp. 629--636.
| File: | DSD.2015.56 | 
2014
Balanced Encoding to Mitigate Power Analysis: A Case Study, IACR Cryptology ePrint Archive , vol. 2014, pp. 952, 2014.
| File: | 952 | 
Bounded, yet Sufficient? How to Determine Whether Limited Side Channel Information Enables Key Recovery, in Smart Card Research and Advanced Applications - 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers , 2014. pp. 215--232.
| File: | 978-3-319-16763-3_13 | 
Fine Grain Cross-VM Attacks on Xen and VMware, in 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, BDCloud 2014, Sydney, Australia, December 3-5, 2014 , 2014. pp. 737--744.
| DOI: | 10.1109/BDCloud.2014.102 | 
| File: | 248 | 
Non-Linear Collision Analysis, in Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers , 2014. pp. 198--214.
| File: | 978-3-319-13066-8_13 | 
Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince, in Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers , 2014. pp. 208--220.
| File: | 978-3-662-44774-1_17 | 
Wait a minute! A fast, Cross-VM attack on AES, IACR Cryptology ePrint Archive , vol. 2014, pp. 435, 2014.
| File: | 435 | 

- Staff
 - Thomas Eisenbarth
 - Esfandiar Mohammadi
 - Sebastian Berndt
 - Paula Arnold
 - Joseph Bienhüls
 - Jeremy Boy
 - Till Eifert
 - Mohamed ElGhamrawy
 - Tim Gellersen
 - Jonah Heller
 - Kristoffer Hempel
 - Eike Hoffmann
 - Timothy Imort
 - Moritz Kirschte
 - Niklas Klinger
 - Marven Kummerfeldt
 - Johannes Liebenow
 - Nils Loose
 - Felix Mächtle
 - Felix Maurer
 - Sebastian Meiser
 - Akhil Narahari
 - Anna Pätschke
 - Pajam Pauls
 - Thorsten Peinemann
 - Christopher Peredy
 - Marcel Pflaeging
 - Tammo Polle
 - Claudius Pott
 - Anja Rabich
 - Jonas Sander
 - Ines Schiebahn
 - Yara Schütt
 - Jan-Niclas Serr
 - Florian Sieck
 - Annika Strang
 - Thore Tiemann
 - Alexander Treff
 - Jan Wichelmann
 
