Präsentationen und Vorträge

Präsentationen und Vorträge sind auf unserem Youtube-Kanal zusammengestellt.

Publikationen

2023

  • Thore Tiemann, Sebastian Berndt, Thomas Eisenbarth and Maciej Liskiewicz,
    "Act natural!": Exchanging Private Messages on Public Blockchains in 8th IEEE European Symposium on Security and Privacy , IEEE, 2023. pp. 292-308.
    DOI:10.1109/EuroSP57164.2023.00026
    Weblink: https://eprint.iacr.org/2021/1073
    Weblink: https://doi.ieeecomputersociety.org/10.1109/EuroSP57164.2023.00026
    Datei: fileadmin/files/documents/slides_act-natural_tiemann_eurosp23.pdf

  • Jan Wichelmann, Anna Pätschke, Luca Wilke and Thomas Eisenbarth,
    Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software in 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023 , Joseph A. Calandrino and Carmela Troncoso, Eds. USENIX Association, 2023.
    DOI:10.48550/arXiv.2210.13124
    Datei: https://www.usenix.org/conference/usenixsecurity23/presentation/wichelmann

  • Thore Tiemann, Zane Weissman, Thomas Eisenbarth and Berk Sunar,
    IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems in Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security , Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik, Eds. ACM, 2023. pp. 827-840.
    DOI:10.1145/3579856.3582838
    Weblink: https://arxiv.org/abs/2202.11623
    Datei: fileadmin/files/documents/slides_iotlb-sc_tiemann_asiaccs23.pdf

  • Nils Loose, Felix Mächtle, Claudius Pott, Volodymyr Bezsmertnyi and Thomas Eisenbarth,
    Madvex: Instrumentation-based Adversarial Attacks on Machine Learning Malware Detection in Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) - 20th International Conference , Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati, Eds. Springer, 2023. pp. 69-88.
    DOI:10.1007/978-3-031-35504-2_4
    Weblink: https://arxiv.org/abs/2305.02559

  • Jan Wichelmann, Christopher Peredy, Florian Sieck, Anna Pätschke and Thomas Eisenbarth,
    MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V in Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) - 20th International Conference , Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati, Eds. Springer, 2023. pp. 3-23.
    DOI:10.1007/978-3-031-35504-2_1
    Weblink: https://arxiv.org/abs/2305.00584

  • 2022

  • Moritz Kirschte, Sebastian Meiser, Saman Ardalan and Esfandiar Mohammadi,
    Single SMPC Invocation DPHelmet: Differentially Private Distributed Learning on a Large Scale , arXiv , Nov. 2022.
    DOI:10.48550/ARXIV.2211.02003
    Datei: https://arxiv.org/abs/2211.02003

  • Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving and Thomas Eisenbarth,
    ASAP: Algorithm Substitution Attacks on Cryptographic Protocols in Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security , ACM, 2022. pp. 712-726.
    DOI:10.1145/3488932.3517387
    ISBN:9781450391405
    Datei: https://dl.acm.org/doi/pdf/10.1145/3488932.3517387

  • Jan Wichelmann, Florian Sieck, Anna Pätschke and Thomas Eisenbarth,
    Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022 , Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi, Eds. ACM, 2022. pp. 2915--2929.
    DOI:10.1145/3548606.3560654
    Datei: https://doi.org/10.1145/3548606.3560654

  • Mengyuan Li, Luca Wilke, Jan Wichelmann, Thomas Eisenbarth, Radu Teodorescu and Yinqian Zhang,
    A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP in 2022 IEEE Symposium on Security and Privacy (SP) , San Francisco, CA, USA: IEEE, 2022. pp. 337-351.
    DOI:10.1109/SP46214.2022.9833768
    Datei: https://doi.ieeecomputersociety.org/10.1109/SP46214.2022.9833768

  • 2021

  • Ilia Polian, Frank Altmann, Tolga Arul, Christian Boit, Ralf Brederlow, Lucas Davi, Rolf Drechsler, Nan Du, Thomas Eisenbarth, Tim Güneysu, Sascha Hermann, Matthias Hiller, Rainer Leupers, Farhad Merchant, Thomas Mussenbrock, Stefan Katzenbeisser, Akash Kumar, Wolfgang Kunz, Thomas Mikolajick, Vivek Pachauri, Jean-Pierre Seifert, Frank Sill Torres and Jens Trommer,
    Nano Security: From Nano-Electronics to Secure Systems in Design, Automation & Test in Europe Conference & Exhibition, DATE 2021, Grenoble, France, February 1-5, 2021 , IEEE, 2021. pp. 1334--1339.
    DOI:10.23919/DATE51398.2021.9474187
    Datei: https://doi.org/10.23919/DATE51398.2021.9474187

  • Florian Sieck, Sebastian Berndt, Jan Wichelmann and Thomas Eisenbarth,
    Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries in CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security , Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi, Eds. ACM, 2021. pp. 2456--2473.
    DOI:10.1145/3460120.3484783
    Datei: https://doi.org/10.1145/3460120.3484783

  • Luca Wilke, Jan Wichelmann, Florian Sieck and Thomas Eisenbarth,
    undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation in 2021 IEEE Security and Privacy Workshops (SPW) , 2021. pp. 456-466.
    DOI:10.1109/SPW53761.2021.00064
    Datei: https://uzl-its.github.io/undeserved-trust/

  • Sebastian Berndt, Klaus Jansen and Alexandra Lassota,
    Tightness of Sensitivity and Proximity Bounds for Integer Linear Programs in {SOFSEM} 2021: Theory and Practice of Computer Science - 47th International Conference on Current Trends in Theory and Practice of Computer Science, {SOFSEM} 2021, Bolzano-Bozen, Italy, January 25-29, 2021, Proceedings , Tom{\'{a}}s Bures and Riccardo Dondi and Johann Gamper and Giovanna Guerrini and Tomasz Jurdzinski and Claus Pahl and Florian Sikora and Prudence W. H. Wong, Eds. Springer, 2021. pp. 349--360.
    DOI:10.1007/978-3-030-67731-2_25
    Datei: https://doi.org/10.1007/978-3-030-67731-2_25

  • Diego F. Aranha, Sebastian Berndt, Thomas Eisenbarth, Okan Seker, Akira Takahashi, Luca Wilke and Greg Zaverucha,
    Side-Channel Protections for Picnic Signatures , IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 4, pp. 239-282, 2021.
    DOI:10.46586/tches.v2021.i4.239-282
    Datei: https://tches.iacr.org/index.php/TCHES/article/view/9066

  • Sebastian Berndt, Kilian Grage, Klaus Jansen, Lukas Johannsen and Maria Kosche,
    Robust Online Algorithms for Dynamic Choosing Problems in Connecting with Computability - 17th Conference on Computability in Europe, CiE 2021, Virtual Event, Ghent, July 5-9, 2021, Proceedings , Liesbeth De Mol and Andreas Weiermann and Florin Manea and David Fern{\'{a}}ndez{-}Duque, Eds. Springer, 2021. pp. 38--49.
    DOI:10.1007/978-3-030-80049-9_4
    Datei: https://doi.org/10.1007/978-3-030-80049-9_4

  • Eike Petersen, Yannik Potdevin, Esfandiar Mohammadi, Stephan Zidowitz, Sabrina Breyer, Dirk Nowotka, Sandra Henn, Ludwig Pechmann, Martin Leucker, Philipp Rostalski and Christian Herzog,
    Responsible and Regulatory Conform Machine Learning for Medicine: A Survey of Technical Challenges and Solutions , CoRR , vol. abs/2107.09546, 2021.
    Datei: https://arxiv.org/abs/2107.09546

  • Sebastian Berndt, Klaus Jansen and Kim{-}Manuel Klein,
    New Bounds for the Vertices of the Integer Hull in 4th Symposium on Simplicity in Algorithms, {SOSA} 2021, Virtual Conference, January 11-12, 2021 , Hung Viet Le and Valerie King, Eds. {SIAM}, 2021. pp. 25--36.
    DOI:10.1137/1.9781611976496.3
    Datei: https://doi.org/10.1137/1.9781611976496.3

  • Jan Wichelmann, Sebastian Berndt, Claudius Pott and Thomas Eisenbarth,
    Help, My Signal has Bad Device! - Breaking the Signal Messenger's Post-Compromise Security Through a Malicious Device in Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings , Leyla Bilge and Lorenzo Cavallaro and Giancarlo Pellegrino and Nuno Neves, Eds. Springer, 2021. pp. 88--105.
    DOI:10.1007/978-3-030-80825-9_5
    Datei: https://doi.org/10.1007/978-3-030-80825-9_5

  • Sebastian Berndt, Max A. Deppert, Klaus Jansen and Lars Rohwedder,
    Load Balancing: The Long Road from Theory to Practice , CoRR , vol. abs/2107.13638, 2021.
    Datei: https://arxiv.org/abs/2107.13638

  • David M. Sommer, Lukas Abfalterer, Sheila Zingg and Esfandiar Mohammadi,
    Learning Numeric Optimal Differentially Private Truncated Additive Mechanisms , CoRR , vol. abs/2107.12957, 2021.
    Datei: https://arxiv.org/abs/2107.12957

  • Claudius Pott, Philipp Jungklass, David Jacek Csejka, Thomas Eisenbarth and Marco Siebert,
    Firmware Security Module: A Framework for Trusted Computing in Automotive Multiprocessors , Journal of Hardware and Systems Security , 2021.
    DOI:10.1007/s41635-021-00114-4
    Datei: https://doi.org/10.1007/s41635-021-00114-4

  • Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi and Aniket Kate,
    Divide and Funnel: a Scaling Technique for Mix-Networks , IACR Cryptol. ePrint Arch. , pp. 1685, 2021.
    Datei: https://eprint.iacr.org/2021/1685

  • Tim Gellersen, Okan Seker and Thomas Eisenbarth,
    Differential Power Analysis of the Picnic Signature Scheme in Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings , Jung Hee Cheon and Jean-Pierre Tillich, Eds. Springer, 2021. pp. 177--194.
    DOI:10.1007/978-3-030-81293-5_10
    Datei: https://doi.org/10.1007/978-3-030-81293-5_10

  • Samira Briongos, Ida Bruhns, Pedro Malagón, Thomas Eisenbarth and José Manuel Moya,
    Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged Cache Attacks in IEEE European Symposium on Security and Privacy, EuroS&P 2021, Vienna, Austria, September 6-10, 2021 , IEEE, 2021. pp. 683--700.
    DOI:10.1109/EuroSP51992.2021.00051
    Datei: https://doi.org/10.1109/EuroSP51992.2021.00051

  • Okan Seker, Thomas Eisenbarth and Maciej Liskiewicz,
    A White-Box Masking Scheme Resisting Computational and Algebraic Attacks , IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 2, pp. 61-105, 2021. Cryptology ePrint Archive, Report 2020/443.
    DOI:10.46586/tches.v2021.i2.61-105
    Datei: https://tches.iacr.org/index.php/TCHES/article/view/8788