Prof. Dr.-Ing. Thomas Eisenbarth
Institutsdirektor
Ratzeburger Allee 160
23562 Lübeck
Gebäude 64, 1. OG,
Raum 043
Email: | thomas.eisenbarth(at)uni-luebeck.de |
Phone: | +49 451 3101 6600 |
Fax: | +49 451 3101 6604 |
About Me
I am a Professor of IT Security at the University of Lübeck. I received my Ph.D. in ECE from Ruhr-Universität Bochum, Germany, where I was a member of the Horst Goertz Institute for IT Security (HGI). Starting in 2010, I spent two years at the Center for Cryptology and Information Security (CCIS) at Florida Atlantic University. In 2012, I joined the Department of Electrical and Computer Engineering at WPI. Since August 2017 I am the Director of the Institute of IT Security at the University of Lübeck.
Since October 2024, I am the head of the STEM sections (the non-medical departments) of University of Lübeck.
My research interests are in:
- Systems security, software security and code analysis
- Applied Cryptology
- Secure virtualization, computer architecture and trusted execution environments
- Side channel analysis, physical attacks and their prevention
Publications
2018
DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes, 2018.
Weblink: | https://dblp.uni-trier.de/rec/journals/corr/abs-1808-01352.html?view=bibtex |
File: | 1808.01352 |
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2018, no. 3, pp. 394-430, 2018.
DOI: | 10.13154/tches.v2018.i3.394-430 |
File: | 7281 |
Identifying and Eliminating Side-Channel Leaks in Programmable Systems, IEEE Design Test , vol. 35, no. 1, pp. 74-89, 2018.
DOI: | 10.1109/MDAT.2017.2766166 |
IT Security in Lübeck - The design of a modern and future-proof security curriculum, in 2018 12th European Workshop on Microelectronics Education (EWME) , 2018. pp. 79-82.
DOI: | 10.1109/EWME.2018.8629494 |
File: | 8629494 |
MASCAT: Preventing Microarchitectural Attacks Before Distribution, in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018 , 2018. pp. 377--388.
DOI: | 10.1145/3176258.3176316 |
File: | 3176258.3176316 |
MicroWalk: A Framework for Finding Side Channels in Binaries, in Proceedings of the 34th Annual Computer Security Applications Conference , New York, NY, USA: ACM, 2018. pp. 161--173.
DOI: | 10.1145/3274694.3274741 |
File: | 3274694.3274741 |
2017
CacheShield: Protecting Legacy Processes Against Cache Attacks, 09 2017.
File: | 1709.01795v1 |
uLeech: A side-channel evaluation platform for IoT, in 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS) , 2017. pp. 25-28.
DOI: | 10.1109/MWSCAS.2017.8052851 |
File: | 8052851 |
PerfWeb: How to Violate Web Privacy with Hardware Performance Events, in Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II , 2017. pp. 80--97.
File: | 978-3-319-66399-9_5 |
Lightweight Side Channel Resistance: Threshold Implementations of Simon, IEEE Transactions on Computers , vol. 66, no. 4, pp. 661-671, 2017.
File: | TC.2016.2614504 |
Hit by the Bus: QoS Degradation Attack on Android, in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2017. pp. 716--727.
ISBN: | 978-1-4503-4944-4 |
File: | 3052973.3053028 |
Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries, CoRR , vol. abs/1709.01552, 2017.
File: | 1709.01552 |
AutoLock: Why Cache Attacks on ARM Are Harder Than You Think, in 26th USENIX Security Symposium (USENIX Security 17) , Vancouver, BC: USENIX Association, 2017. pp. 1075--1091.
ISBN: | 978-1-931971-40-9 |
File: | green |
CacheZoom: How SGX Amplifies the Power of Cache Attacks, in Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings , 2017. pp. 69--90.
File: | 978-3-319-66787-4_4 |
Cache-Based Application Detection in the Cloud Using Machine Learning, in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2017. pp. 288--300.
ISBN: | 978-1-4503-4944-4 |
File: | 3052973.3053036 |
2016
Efficient, Adversarial Neighbor Discovery Using Logical Channels on Microsoft Azure, in Proceedings of the 32nd Annual Conference on Computer Security Applications , New York, NY, USA: ACM, 2016. pp. 436--447.
DOI: | 10.1145/2991079.2991113 |
ISBN: | 978-1-4503-4771-6 |
File: | NeighborDiscoveryAzure%20ACSAC2016.pdf |
A honeypot system for wearable networks, in 2016 IEEE 37th Sarnoff Symposium , 2016. pp. 199-201.
File: | SARNOF.2016.7846755 |
SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs, in Smart Card Research and Advanced Applications - 15th International Conference, CARDIS 2016, Cannes, France, November 7-9, 2016, Revised Selected Papers , 2016. pp. 73--88.
DOI: | 10.1007/978-3-319-54669-8_5 |
File: | 978-3-319-54669-8_5 |
Simpler, Faster, and More Robust T-Test Based Leakage Detection, Standaert, Francois-Xavier and Oswald, Elisabeth, Eds. Cham: Springer International Publishing, 2016, pp. 163--183.
ISBN: | 978-3-319-43283-0 |
File: | 978-3-319-43283-0_10 |
Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem, IEEE Trans. Information Forensics and Security , vol. 11, no. 6, pp. 1093--1105, 2016.
File: | TIFS.2015.2509944 |
Cross-VM Cache Attacks on AES, IEEE Trans. Multi-Scale Computing Systems , vol. 2, no. 3, pp. 211--222, 2016.
File: | TMSCS.2016.2550438 |
Cross Processor Cache Attacks, in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2016. pp. 353--364.
DOI: | 10.1145/2897845.2897867 |
ISBN: | 978-1-4503-4233-9 |
File: | 2897845.2897867 |
Co-location Detection on the Cloud, in Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers , 2016. pp. 19--34.
File: | 978-3-319-43283-0_2 |
Cache Attacks Enable Bulk Key Recovery on the Cloud, in Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings , 2016. pp. 368--388.
DOI: | 10.1007/978-3-662-53140-2_18 |
File: | 978-3-662-53140-2_18 |
A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile---and Why It Is Not, Cheon, Jung Hee and Takagi, Tsuyoshi, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016, pp. 819--843.
ISBN: | 978-3-662-53887-6 |
File: | 10.1007%2F978-3-662-53887-6_30 |
- Staff
- Thomas Eisenbarth
- Esfandiar Mohammadi
- Paula Arnold
- Jeremy Boy
- Till Eifert
- Tim Gellersen
- Jonah Heller
- Kristoffer Hempel
- Eike Hoffmann
- Timothy Imort
- Moritz Kirschte
- Marven Kummerfeldt
- Johannes Liebenow
- Nils Loose
- Felix Mächtle
- Felix Maurer
- Sebastian Meiser
- Anna Pätschke
- Pajam Pauls
- Thorsten Peinemann
- Christopher Peredy
- Tammo Polle
- Yannik Potdevin
- Claudius Pott
- Anja Rabich
- Jonas Sander
- Ines Schiebahn
- Yara Schütt
- Jan-Niclas Serr
- Florian Sieck
- Annika Strang
- Thore Tiemann
- Alexander Treff
- Jan Wichelmann
- Luca Wilke