Präsentationen und Vorträge

Präsentationen und Vorträge sind auf unserem Youtube-Kanal zusammengestellt.

Publikationen

2025

Christian Ewert, Andrija Neskovic, Carsten Heinz, Felix Muuss, Alexander Treff, Marc Gourjon, Rainer Buchty, Thomas Eisenbarth, Andreas Koch, Mladen Berekovic, and Saleh Mulhem,
Lightweight Authenticated Integration and In-Field Secure Operation of System-in-Package, ACM Trans. Des. Autom. Electron. Syst. , Jun. 2025. Association for Computing Machinery.
DOI:10.1145/3745780
Datei: 3745780
Felix Mächtle, Nils Loose, Jan-Niclas Serr, Jonas Sander, and Thomas Eisenbarth,
AutoStub: Genetic Programming-Based Stub Creation for Symbolic Execution, in Proceedings of the 18th ACM/IEEE International Workshop on Search-Based and Fuzz Testing, SBFT 2025 , 2025.
Jonas Sander, Sebastian Berndt, Ida Bruhns, and Thomas Eisenbarth,
Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2025, pp. 420-449, 2025. IACR.
DOI:10.46586/tches.v2025.i1.420-449
Zane Weissman, Thore Tiemann, Thomas Eisenbarth, and Berk Sunar,
Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms, in Information Systems Security , Patil, Vishwas T. and Krishnan, Ram and Shyamasundar, Rudrapatna K., Eds. Springer Nature Switzerland, 2025. pp. 3-24.
DOI:10.1007/978-3-031-80020-7_1
ISBN:978-3-031-80020-7
Weblink: https://doi.org/10.48550/arXiv.2311.15999
Bibtex: BibTeX
@inproceedings{weissman2025firecracker,
  author    = {Weissman, Zane and
               Tiemann, Thore and
               Eisenbarth, Thomas and
               Sunar, Berk},
  title     = {Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms},
  booktitle = {Information Systems Security},
  editor    = {Patil, Vishwas T. and
               Krishnan, Ram and
               Shyamasundar, Rudrapatna K.},
  year      = {2025},
  pages     = {3--24},
  publisher = {Springer Nature Switzerland},
  isbn      = {978-3-031-80020-7},
  doi       = {10.1007/978-3-031-80020-7_1},
}
Sebastian Meiser, Debajyoti Das, Moritz Kirschte, Esfandiar Mohammadi, and Aniket Kate,
Mixnets on a tightrope: Quantifying the leakage of mix networks using a provably optimal heuristic adversary, in 2025 IEEE Symposium on Security and Privacy (SP) , Los Alamitos, CA, USA: IEEE Computer Society, 2025. pp. 4457-4475.
Datei: SP61157.2025.00233
Felix Mächtle, Jan-Niclas Serr, Nils Loose, Jonas Sander, and Thomas Eisenbarth,
OCEAN: Open-World Contrastive Authorship Identification, in Applied Cryptography and Network Security (ACNS) 2025 , 2025.
Weblink: https://arxiv.org/abs/2412.05049
Bibtex: BibTeX
@misc{maechtle2024oceanopenworldcontrastiveauthorship,
      title={OCEAN: Open-World Contrastive Authorship Identification}, 
      author={Felix Mächtle and Jan-Niclas Serr and Nils Loose and Jonas Sander and Thomas Eisenbarth},
      year={2024},
      eprint={2412.05049},
      archivePrefix={arXiv},
      primaryClass={cs.AI},
      url={https://arxiv.org/abs/2412.05049}, 
}
Philipp Schmitz, Tobias Jauch, Alex Wezel, Mohammad R. Fadiheh, Thore Tiemann, Jonah Heller, Thomas Eisenbarth, Dominik Stoffel, and Wolfgang Kunz,
Okapi: A Lightweight Architecture for Secure Speculation Exploiting Locality of Memory Accesses, in Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2025 (to appear) , 2025.
DOI:10.48550/arXiv.2312.08156
Weblink: https://arxiv.org/abs/2312.08156
Bibtex: BibTeX
@inproceedings{schmitz2025okapi,
  author        = {Philipp Schmitz and
                   Tobias Jauch and
                   Alex Wezel and
                   Mohammad R. Fadiheh and
                   Thore Tiemann and
                   Jonah Heller and
                   Thomas Eisenbarth and
                   Dominik Stoffel and
                   Wolfgang Kunz},
  title         = {Okapi: A Lightweight Architecture for Secure
                   Speculation Exploiting Locality of Memory Accesses}, 
  booktitle    = {to appear in Proceedings of the 20th {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2025, Ha Noi, August 25-29, 2025},
  publisher    = {{ACM}},
  year         = {2025},
  doi           = {10.48550/arXiv.2312.08156}
}
Anna Pätschke, Jan Wichelmann, and Thomas Eisenbarth,
Zebrafix: Mitigating Memory-Centric Side-Channel Leakage via Interleaving, 2025.
Datei: 2502.09139

2024

Luca Wilke, Florian Sieck, and Thomas Eisenbarth,
TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security , ACM, Okt.2024.
DOI:10.1145/3658644.3690230
Weblink: https://uzl-its.github.io/tdxdown/
Bibtex: BibTeX
@INPROCEEDINGS{tdxdownCCS24,
  author    = {Luca Wilke and Florian Sieck and Thomas Eisenbarth},
  booktitle = {Proceedings of the 2024 ACM SIGSAC Conference
                on Computer and Communications Security, {CCS} 2024,
                Salt Lake City, UT, USA, October 14--18, 2024},
  title     = {{TDXdown}: Single-Stepping and Instruction Counting Attacks
                against Intel {TDX}},
  year      = {2024},
  doi       = {10.1145/3658644.3690230}
}
Max Schulze, Yorck Zisgen, Moritz Kirschte, Esfandiar Mohammadi, and Agnes Koschmider,
Differentially Private Inductive Miner, in 2024 6th International Conference on Process Mining (ICPM) , Curran Associates, Sep.2024. pp. 89-96.
DOI:10.1109/ICPM63005.2024.10680684
ISBN:979-8-3503-6503-0
Datei: 10680684
Jan Wichelmann, Anja Rabich, Anna Pätschke, and Thomas Eisenbarth,
Obelix: Mitigating Side-Channels Through Dynamic Obfuscation, in 2024 IEEE Symposium on Security and Privacy (S&P) , San Francisco, CA, USA: IEEE, Mai2024. pp. 4182-4199.
DOI:10.1109/SP54263.2024.00261
Weblink: https://doi.ieeecomputersociety.org/10.1109/SP54263.2024.00261
Johannes Liebenow, Yara Schütt, Tanya Braun, Marcel Gehrke, Florian Thaeter, and Esfandiar Mohammadi,
DPM: Clustering Sensitive Data through Separation, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, CCS 2024 , ACM, 2024.
DOI:10.48550/arXiv.2307.02969
Datei: arXiv.2307.02969
Volodymyr Bezsmertnyi, Jean Michel Cioranesco, and Thomas Eisenbarth,
Duplication-Based Fault Tolerance for RISC-V Embedded Software, in Computer Security - ESORICS 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part IV , Joaquin Garcia Alfaro, Rafal Kozik, Michal Choras, Sokratis K. Katsikas, Eds. Springer, 2024. pp. 86--104.
DOI:10.1007/978-3-031-70903-6\_5
Weblink: https://dblp.org/rec/conf/esorics/BezsmertnyiCE24.html
Weblink: https://link.springer.com/chapter/10.1007/978-3-031-70903-6_5
Datei: 978-3-031-70903-6\_5
Debopriya Roy Dipta, Thore Tiemann, Berk Gulmezoglu, Eduard Marin, and Thomas Eisenbarth,
Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments, in 9th IEEE European Symposium on Security and Privacy, EuroS&P 2024 , IEEE, 2024. pp. 327-344.
DOI:10.1109/EUROSP60621.2024.00025
Weblink: https://doi.ieeecomputersociety.org/10.1109/EuroSP60621.2024.00025
Weblink: https://doi.org/10.48550/arXiv.2404.10715
Bibtex: BibTeX
@inproceedings{DBLP:conf/eurosp/DiptaTGME24,
  author       = {Debopriya Roy Dipta and
                  Thore Tiemann and
                  Berk G{\"{u}}lmezoglu and
                  Eduard Marin and
                  Thomas Eisenbarth},
  title        = {Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox
                  Environments},
  booktitle    = {9th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2024, Vienna, Austria, July 8-12, 2024},
  pages        = {327--344},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/EuroSP60621.2024.00025},
  doi          = {10.1109/EUROSP60621.2024.00025}
}
Roland Stenger, Steffen Busse, Jonas Sander, Thomas Eisenbarth, and Sebastian Fudickar,
Evaluating the Impact of Face Anonymization Methods on Computer Vision Tasks: A Trade-off Between Privacy and Utility, IEEE Access , pp. 1-1, 2024.
DOI:10.1109/ACCESS.2024.3519441
Weblink: https://ieeexplore.ieee.org/document/10804775
Datei: ACCESS.2024.3519441
Marcel Gehrke, Johannes Liebenow, Esfandiar Mohammadi, and Tanya Braun,
Lifting in Support of Privacy-Preserving Probabilistic Inference, KI - Künstliche Intelligenz , vol. 38, pp. 225-241, 2024.
DOI:10.1007/s13218-024-00851-y
Datei: s13218-024-00851-y
Thore Tiemann, Zane Weissman, Thomas Eisenbarth, and Berk Sunar,
Microarchitectural Vulnerabilities Introduced, Exploited, and Accelerated by Heterogeneous FPGA-CPU Platforms, in Security of FPGA-Accelerated Cloud Computing Environments , Szefer, Jakub and Tessier, Russell, Eds. Cham: Springer International Publishing, 2024, pp. 203-237.
DOI:10.1007/978-3-031-45395-3_8
ISBN:978-3-031-45395-3
Bibtex: BibTeX
@inbook{tiemann2024fpgaplatform,
  author      = {Tiemann, Thore
                  and Weissman, Zane
                  and Eisenbarth, Thomas
                  and Sunar, Berk},
  editor      = {Szefer, Jakub
                  and Tessier, Russell},
  title       = {Microarchitectural Vulnerabilities Introduced, 
                  Exploited, and Accelerated by Heterogeneous 
                  {FPGA-CPU} Platforms},
  bookTitle   = {Security of FPGA-Accelerated Cloud Computing 
                  Environments},
  year        = {2024},
  publisher   = {Springer International Publishing},
  pages       = {203--237},
  isbn        = {978-3-031-45395-3},
  doi         = {10.1007/978-3-031-45395-3_8},
  url         = {https://doi.org/10.1007/978-3-031-45395-3_8},
}
Paula Arnold, Sebastian Berndt, Thomas Eisenbarth, and Maximilian Orlt,
Polynomial sharings on two secrets: Buy one, get one free, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 671-706.
DOI:10.46586/tches.v2024.i3.671-706
Datei: 11691
Johannes Liebenow, Timothy Imort, Yannick Fuchs, Marcel Heisel, Nadja Käding, Jan Rupp, and Esfandiar Mohammadi,
PrivAgE: A Toolchain for Privacy-Preserving Distributed Aggregation on Edge-Devices, KI - Künstliche Intelligenz , vol. 38, pp. 183-188, 2024.
DOI:10.1007/s13218-023-00823-8
Datei: s13218-023-00823-8
Thorsten Peinemann, Moritz Kirschte, Joshua Stock, Carlos Cotrini, and Esfandiar Mohammadi,
S-BDT: Distributed Differentially Private Boosted Decision Trees, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS '24) , New York, NY, USA: Association for Computing Machinery, 2024. pp. 288–302.
DOI:10.1145/3658644.3690301
ISBN:9798400706363
Datei: 2309.12041
Luca Wilke, Jan Wichelmann, Anja Rabich, and Thomas Eisenbarth,
SEV-Step: A Single-Stepping Framework for AMD-SEV, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 180-206.
DOI:10.46586/tches.v2024.i1.180-206
Datei: 10792
Ida Bruhns, Sebastian Berndt, Jonas Sander, and Thomas Eisenbarth,
Slalom at the Carnival: Privacy-preserving Inference with Masks from Public Knowledge, IACR Commun. Cryptol. , vol. 1, no. 3, pp. 40, 2024.
DOI:10.62056/AKP-49QGXQ
Datei: akp-49qgxq
Luca Wilke, and Gianluca Scopelliti,
SNPGuard: Remote Attestation of SEV-SNP VMs Using Open Source Tools, in 2024 IEEE European Symposium on Security and Privacy Workshops EuroS&P , IEEE Computer Society, 2024. pp. 193-198.
DOI:10.1109/EuroSPW61312.2024.00026
Weblink: https://doi.ieeecomputersociety.org/10.1109/EuroSPW61312.2024.00026
Bibtex: BibTeX
@INPROCEEDINGS {10628964,
author = {L. Wilke and G. Scopelliti},
booktitle = {2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)},
title = {SNPGuard: Remote Attestation of SEV-SNP VMs Using Open Source Tools},
year = {2024},
volume = {},
issn = {},
pages = {193-198},
doi = {10.1109/EuroSPW61312.2024.00026},
url = {https://doi.ieeecomputersociety.org/10.1109/EuroSPW61312.2024.00026},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
month = {jul}
}
Nils Loose, Felix Mächtle, Florian Sieck, and Thomas Eisenbarth,
SWAT: Modular Dynamic Symbolic Execution for Java Applications using Dynamic Instrumentation (Competition Contribution), in Tools and Algorithms for the Construction and Analysis of Systems - 30th International Conference, TACAS 2024, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024, Luxembourg City, Luxembourg, April 6-11, 2024, Proceedings, Part III , Bernd Finkbeiner and Laura Kovács, Eds. Springer, 2024. pp. 399-405.
DOI:10.1007/978-3-031-57256-2_28
Datei: 978-3-031-57256-2_28

2023

Florian Sieck, Zhiyuan Zhang, Sebastian Berndt, Chitchanok Chuengsatiansup, Thomas Eisenbarth, and Yuval Yarom,
TeeJam: Sub-Cache-Line Leakages Strike Back, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , Dez.2023. pp. 457-500.
DOI:10.46586/tches.v2024.i1.457-500
Weblink: https://tches.iacr.org/index.php/TCHES/article/view/11259
Bibtex: BibTeX
@article{Sieck_Zhang_Berndt_Chuengsatiansup_Eisenbarth_Yarom_2023, 
title={TeeJam: Sub-Cache-Line Leakages Strike Back}, 
volume={2024}, 
url={https://tches.iacr.org/index.php/TCHES/article/view/11259}, 
DOI={10.46586/tches.v2024.i1.457-500}, 
number={1}, 
journal={IACR Transactions on Cryptographic Hardware and Embedded Systems}, 
author={Sieck, Florian and Zhang, Zhiyuan and Berndt, Sebastian and Chuengsatiansup, Chitchanok and Eisenbarth, Thomas and Yarom, Yuval}, 
year={2023}, 
month={Dec.}, 
pages={457–500} 
}