Präsentationen und Vorträge

Präsentationen und Vorträge sind auf unserem Youtube-Kanal zusammengestellt.

Publikationen

2024

Marcel Gehrke, Johannes Liebenow, Esfandiar Mohammadi, and Tanya Braun,
Lifting in Support of Privacy-Preserving Probabilistic Inference, KI - Künstliche Intelligenz , vol. 1610-1987, 2024.
DOI:https://doi.org/10.1007/s13218-024-00851-y
Datei: s13218-024-00851-y
Jan Wichelmann, Anja Rabich, Anna Pätschke, and Thomas Eisenbarth,
OBELIX: Mitigating Side-Channels Through Dynamic Obfuscation, in 2024 IEEE Symposium on Security and Privacy (SP) , San Francisco, CA, USA: IEEE, 2024.
Johannes Liebenow, Timothy Imort, Yannick Fuchs, Marcel Heisel, Nadja Käding, Jan Rupp, and Esfandiar Mohammadi,
PrivAgE: A Toolchain for Privacy-Preserving Distributed Aggregation on Edge-Devices, KI - Künstliche Intelligenz , vol. 1610-1987, 2024.
DOI:https://doi.org/10.1007/s13218-023-00823-8
Datei: s13218-023-00823-8
Luca Wilke, Jan Wichelmann, Anja Rabich, and Thomas Eisenbarth,
SEV-Step: A Single-Stepping Framework for AMD-SEV, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 180-206.
DOI:10.46586/tches.v2024.i1.180-206
Datei: 10792
Thore Tiemann, Zane Weissman, Thomas Eisenbarth, and Berk Sunar,
Microarchitectural Vulnerabilities Introduced, Exploited, and Accelerated by Heterogeneous FPGA-CPU Platforms, in Security of FPGA-Accelerated Cloud Computing Environments , Szefer, Jakub and Tessier, Russell, Eds. Cham: Springer International Publishing, 2024, pp. 203-237.
DOI:10.1007/978-3-031-45395-3_8
ISBN:978-3-031-45395-3
Datei: 978-3-031-45395-3_8
Bibtex: BibTeX
@inbook{tiemann2024fpgaplatform,
  author      = {Tiemann, Thore
                  and Weissman, Zane
                  and Eisenbarth, Thomas
                  and Sunar, Berk},
  editor      = {Szefer, Jakub
                  and Tessier, Russell},
  title       = {Microarchitectural Vulnerabilities Introduced, 
                  Exploited, and Accelerated by Heterogeneous 
                  {FPGA-CPU} Platforms},
  bookTitle   = {Security of FPGA-Accelerated Cloud Computing 
                  Environments},
  year        = {2024},
  publisher   = {Springer International Publishing},
  pages       = {203--237},
  isbn        = {978-3-031-45395-3},
  doi         = {10.1007/978-3-031-45395-3_8},
  url         = {https://doi.org/10.1007/978-3-031-45395-3_8},
}

2023

Florian Sieck, Zhiyuan Zhang, Sebastian Berndt, Chitchanok Chuengsatiansup, Thomas Eisenbarth, and Yuval Yarom,
TeeJam: Sub-Cache-Line Leakages Strike Back, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , Dez.2023. pp. 457 - 500.
DOI:10.46586/tches.v2024.i1.457-500
Weblink: https://tches.iacr.org/index.php/TCHES/article/view/11259
Bibtex: BibTeX
@article{Sieck_Zhang_Berndt_Chuengsatiansup_Eisenbarth_Yarom_2023, 
title={TeeJam: Sub-Cache-Line Leakages Strike Back}, 
volume={2024}, 
url={https://tches.iacr.org/index.php/TCHES/article/view/11259}, 
DOI={10.46586/tches.v2024.i1.457-500}, 
number={1}, 
journal={IACR Transactions on Cryptographic Hardware and Embedded Systems}, 
author={Sieck, Florian and Zhang, Zhiyuan and Berndt, Sebastian and Chuengsatiansup, Chitchanok and Eisenbarth, Thomas and Yarom, Yuval}, 
year={2023}, 
month={Dec.}, 
pages={457–500} 
}
Andrija Neskovic, Saleh Mulhem, Alexander Treff, Rainer Buchty, Thomas Eisenbarth, and Mladen Berekovic,
SystemC Model of Power Side-Channel Attacks Against AI Accelerators: Superstition or not?, in ICCAD '23: Proceedings of the 42nd IEEE/ACM International Conference on Computer-Aided Design , IEEE/ACM, Nov.2023.
DOI:10.48550/arXiv.2311.13387
Weblink: https://arxiv.org/abs/2311.13387
Moritz Kirschte, Thorsten Peinemann, Joshua Stock, Carlos Cotrini, and Esfandiar Mohammadi,
S-GBDT: Frugal Differentially Private Gradient Boosting Decision Trees, arXiv , Sep. 2023.
DOI:10.48550/arXiv.2309.12041
Datei: 2309.12041
Yara Schütt, Johannes Liebenow, Tanya Braun, Marcel Gehrke, Florian Thaeter, and Esfandiar Mohammadi,
DPM: Clustering Sensitive Data through Separation, CoRR , vol. abs/2307.02969, 2023.
DOI:10.48550/arXiv.2307.02969
Datei: arXiv.2307.02969
Nils Loose, Felix Mächtle, Claudius Pott, Volodymyr Bezsmertnyi, and Thomas Eisenbarth,
Madvex: Instrumentation-based Adversarial Attacks on Machine Learning Malware Detection, in Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) - 20th International Conference , Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati, Eds. Springer, 2023. pp. 69-88.
DOI:10.1007/978-3-031-35504-2_4
Weblink: https://arxiv.org/abs/2305.02559
Jan Wichelmann, Christopher Peredy, Florian Sieck, Anna Pätschke, and Thomas Eisenbarth,
MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V, in Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) - 20th International Conference , Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati, Eds. Springer, 2023. pp. 3-23.
DOI:10.1007/978-3-031-35504-2_1
Weblink: https://arxiv.org/abs/2305.00584
Philipp Schmitz, Tobias Jauch, Alex Wezel, Mohammad R. Fadiheh, Thore Tiemann, Jonah Heller, Thomas Eisenbarth, Dominik Stoffel, and Wolfgang Kunz,
Okapi: A Lightweight Architecture for Secure Speculation Exploiting Locality of Memory Accesses, 2023.
DOI:10.48550/arXiv.2312.08156
Bibtex: BibTeX
@misc{schmitz2023okapi,
  author        = {Philipp Schmitz and
                   Tobias Jauch and
                   Alex Wezel and
                   Mohammad R. Fadiheh and
                   Thore Tiemann and
                   Jonah Heller and
                   Thomas Eisenbarth and
                   Dominik Stoffel and
                   Wolfgang Kunz},
  title         = {Okapi: A Lightweight Architecture for Secure
                   Speculation Exploiting Locality of Memory Accesses}, 
  year          = {2023},
  eprint        = {2312.08156},
  archivePrefix = {arXiv},
  primaryClass  = {cs.CR},
  url           = {https://doi.org/10.48550/arXiv.2312.08156},
  doi           = {10.48550/arXiv.2312.08156},
}
Claudius Pott, Berk Gulmezoglu, and Thomas Eisenbarth,
Overcoming the Pitfalls of HPC-based Cryptojacking Detection in Presence of GPUs, in Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2023, Charlotte, NC, USA, April 24-26, 2023 , Mohamed Shehab and Maribel Fernandez and Ninghui Li, Eds. {ACM}, 2023. pp. 177--188.
DOI:10.1145/3577923.3583655
Datei: 3577923.3583655
Thore Tiemann, Sebastian Berndt, Thomas Eisenbarth, and Maciej Liskiewicz,
"Act natural!": Exchanging Private Messages on Public Blockchains, in 8th IEEE European Symposium on Security and Privacy , IEEE, 2023. pp. 292-308.
DOI:10.1109/EuroSP57164.2023.00026
Weblink: https://eprint.iacr.org/2021/1073
Weblink: https://doi.ieeecomputersociety.org/10.1109/EuroSP57164.2023.00026
Datei: Dateilink
Pascal Bemmann, Sebastian Berndt, Denis Diemert, Thomas Eisenbarth, and Tibor Jager,
Subversion-Resilient Authenticated Encryption Without Random Oracles, in Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part II , Mehdi Tibouchi and Xiaofeng Wang, Eds. Springer, 2023. pp. 460--483.
DOI:10.1007/978-3-031-33491-7\_17
Datei: 978-3-031-33491-7\_17
Sebastian Berndt, Thomas Eisenbarth, Sebastian Faust, Marc Gourjon, Maximilian Orlt, and Okan Seker,
Combined Fault and Leakage Resilience: Composability, Constructions and Compiler, in Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part III , Helena Handschuh and Anna Lysyanskaya, Eds. Cham: Springer, 2023. pp. 377--409.
DOI:10.1007/978-3-031-38548-3\_13
ISBN:978-3-031-38548-3
Datei: 978-3-031-38548-3\_13
Jan Wichelmann, Anna Pätschke, Luca Wilke, and Thomas Eisenbarth,
Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software, in 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023 , Joseph A. Calandrino and Carmela Troncoso, Eds. USENIX Association, 2023.
DOI:10.48550/arXiv.2210.13124
Datei: wichelmann
Thore Tiemann, Zane Weissman, Thomas Eisenbarth, and Berk Sunar,
IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems, in Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security , Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik, Eds. ACM, 2023. pp. 827-840.
DOI:10.1145/3579856.3582838
Weblink: https://arxiv.org/abs/2202.11623
Datei: Dateilink

2022

Moritz Kirschte, Sebastian Meiser, Saman Ardalan, and Esfandiar Mohammadi,
Distributed DP-Helmet: Scalable Differentially Private Non-interactive Averaging of Single Layers, arXiv , Nov. 2022.
DOI:10.48550/arXiv.2211.02003
Datei: 2211.02003
Jan Wichelmann, Florian Sieck, Anna Pätschke, and Thomas Eisenbarth,
Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications, in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022 , Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi, Eds. ACM, 2022. pp. 2915--2929.
DOI:10.1145/3548606.3560654
Datei: 3548606.3560654
Mengyuan Li, Luca Wilke, Jan Wichelmann, Thomas Eisenbarth, Radu Teodorescu, and Yinqian Zhang,
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP, in 2022 IEEE Symposium on Security and Privacy (SP) , San Francisco, CA, USA: IEEE, 2022. pp. 337-351.
DOI:10.1109/SP46214.2022.9833768
Datei: SP46214.2022.9833768
Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving, and Thomas Eisenbarth,
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols, in Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security , ACM, 2022. pp. 712-726.
DOI:10.1145/3488932.3517387
ISBN:9781450391405
Datei: 3488932.3517387

2021

Florian Sieck, Sebastian Berndt, Jan Wichelmann, and Thomas Eisenbarth,
Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries, in CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security , Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi, Eds. ACM, 2021. pp. 2456--2473.
DOI:10.1145/3460120.3484783
Datei: 3460120.3484783
Luca Wilke, Jan Wichelmann, Florian Sieck, and Thomas Eisenbarth,
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation, in 2021 IEEE Security and Privacy Workshops (SPW) , 2021. pp. 456-466.
DOI:10.1109/SPW53761.2021.00064
Datei:
Sebastian Berndt, Klaus Jansen, and Alexandra Lassota,
Tightness of Sensitivity and Proximity Bounds for Integer Linear Programs, in {SOFSEM} 2021: Theory and Practice of Computer Science - 47th International Conference on Current Trends in Theory and Practice of Computer Science, {SOFSEM} 2021, Bolzano-Bozen, Italy, January 25-29, 2021, Proceedings , Tom{\'{a}}s Bures and Riccardo Dondi and Johann Gamper and Giovanna Guerrini and Tomasz Jurdzinski and Claus Pahl and Florian Sikora and Prudence W. H. Wong, Eds. Springer, 2021. pp. 349--360.
DOI:10.1007/978-3-030-67731-2_25
Datei: 978-3-030-67731-2_25