Präsentationen und Vorträge
Präsentationen und Vorträge sind auf unserem Youtube-Kanal zusammengestellt.
Publikationen
2023
Thore
Tiemann,
Sebastian
Berndt,
Thomas
Eisenbarth and
Maciej
Liskiewicz,
"Act natural!": Exchanging Private Messages on Public Blockchains
in 8th IEEE European Symposium on Security and Privacy
,
IEEE,
2023.
pp. 292-308.
Jan
Wichelmann,
Anna
Pätschke,
Luca
Wilke and
Thomas
Eisenbarth,
Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software
in 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023
,
Joseph A. Calandrino and Carmela Troncoso, Eds.
USENIX Association,
2023.
DOI: | 10.48550/arXiv.2210.13124 |
Datei: | https://www.usenix.org/conference/usenixsecurity23/presentation/wichelmann |
Thore
Tiemann,
Zane
Weissman,
Thomas
Eisenbarth and
Berk
Sunar,
IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems
in Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security
,
Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik, Eds.
ACM,
2023.
pp. 827-840.
DOI: | 10.1145/3579856.3582838 |
Weblink: | https://arxiv.org/abs/2202.11623 |
Datei: | fileadmin/files/documents/slides_iotlb-sc_tiemann_asiaccs23.pdf |
Nils
Loose,
Felix
Mächtle,
Claudius
Pott,
Volodymyr
Bezsmertnyi and
Thomas
Eisenbarth,
Madvex: Instrumentation-based Adversarial Attacks on Machine Learning Malware Detection
in Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) - 20th International Conference
,
Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati, Eds.
Springer,
2023.
pp. 69-88.
DOI: | 10.1007/978-3-031-35504-2_4 |
Weblink: | https://arxiv.org/abs/2305.02559 |
Jan
Wichelmann,
Christopher
Peredy,
Florian
Sieck,
Anna
Pätschke and
Thomas
Eisenbarth,
MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V
in Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) - 20th International Conference
,
Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati, Eds.
Springer,
2023.
pp. 3-23.
DOI: | 10.1007/978-3-031-35504-2_1 |
Weblink: | https://arxiv.org/abs/2305.00584 |
2022
Moritz
Kirschte,
Sebastian
Meiser,
Saman
Ardalan and
Esfandiar
Mohammadi,
Single SMPC Invocation DPHelmet: Differentially Private Distributed Learning on a Large Scale
,
arXiv
,
Nov.
2022.
DOI: | 10.48550/ARXIV.2211.02003 |
Datei: | https://arxiv.org/abs/2211.02003 |
Sebastian
Berndt,
Jan
Wichelmann,
Claudius
Pott,
Tim-Henrik
Traving and
Thomas
Eisenbarth,
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols
in Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security
,
ACM,
2022.
pp. 712-726.
DOI: | 10.1145/3488932.3517387 |
ISBN: | 9781450391405 |
Datei: | https://dl.acm.org/doi/pdf/10.1145/3488932.3517387 |
Jan
Wichelmann,
Florian
Sieck,
Anna
Pätschke and
Thomas
Eisenbarth,
Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications
in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022
,
Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi, Eds.
ACM,
2022.
pp. 2915--2929.
DOI: | 10.1145/3548606.3560654 |
Datei: | https://doi.org/10.1145/3548606.3560654 |
Mengyuan
Li,
Luca
Wilke,
Jan
Wichelmann,
Thomas
Eisenbarth,
Radu
Teodorescu and
Yinqian
Zhang,
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP
in 2022 IEEE Symposium on Security and Privacy (SP)
,
San Francisco, CA, USA:
IEEE,
2022.
pp. 337-351.
DOI: | 10.1109/SP46214.2022.9833768 |
Datei: | https://doi.ieeecomputersociety.org/10.1109/SP46214.2022.9833768 |
2021
Ilia
Polian,
Frank
Altmann,
Tolga
Arul,
Christian
Boit,
Ralf
Brederlow,
Lucas
Davi,
Rolf
Drechsler,
Nan
Du,
Thomas
Eisenbarth,
Tim
Güneysu,
Sascha
Hermann,
Matthias
Hiller,
Rainer
Leupers,
Farhad
Merchant,
Thomas
Mussenbrock,
Stefan
Katzenbeisser,
Akash
Kumar,
Wolfgang
Kunz,
Thomas
Mikolajick,
Vivek
Pachauri,
Jean-Pierre
Seifert,
Frank
Sill Torres and
Jens
Trommer,
Nano Security: From Nano-Electronics to Secure Systems
in Design, Automation & Test in Europe Conference & Exhibition, DATE 2021, Grenoble, France, February 1-5, 2021
,
IEEE,
2021.
pp. 1334--1339.
DOI: | 10.23919/DATE51398.2021.9474187 |
Datei: | https://doi.org/10.23919/DATE51398.2021.9474187 |
Florian
Sieck,
Sebastian
Berndt,
Jan
Wichelmann and
Thomas
Eisenbarth,
Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries
in CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security
,
Yongdae Kim and
Jong Kim and
Giovanni Vigna and
Elaine Shi, Eds.
ACM,
2021.
pp. 2456--2473.
DOI: | 10.1145/3460120.3484783 |
Datei: | https://doi.org/10.1145/3460120.3484783 |
Luca
Wilke,
Jan
Wichelmann,
Florian
Sieck and
Thomas
Eisenbarth,
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation
in 2021 IEEE Security and Privacy Workshops (SPW)
,
2021.
pp. 456-466.
DOI: | 10.1109/SPW53761.2021.00064 |
Datei: | https://uzl-its.github.io/undeserved-trust/ |
Sebastian
Berndt,
Klaus
Jansen and
Alexandra
Lassota,
Tightness of Sensitivity and Proximity Bounds for Integer Linear Programs
in {SOFSEM} 2021: Theory and Practice of Computer Science - 47th International
Conference on Current Trends in Theory and Practice of Computer Science,
{SOFSEM} 2021, Bolzano-Bozen, Italy, January 25-29, 2021, Proceedings
,
Tom{\'{a}}s Bures and
Riccardo Dondi and
Johann Gamper and
Giovanna Guerrini and
Tomasz Jurdzinski and
Claus Pahl and
Florian Sikora and
Prudence W. H. Wong, Eds.
Springer,
2021.
pp. 349--360.
DOI: | 10.1007/978-3-030-67731-2_25 |
Datei: | https://doi.org/10.1007/978-3-030-67731-2_25 |
Diego F.
Aranha,
Sebastian
Berndt,
Thomas
Eisenbarth,
Okan
Seker,
Akira
Takahashi,
Luca
Wilke and
Greg
Zaverucha,
Side-Channel Protections for Picnic Signatures
,
IACR Transactions on Cryptographic Hardware and Embedded Systems
,
vol. 2021,
no. 4,
pp. 239-282,
2021.
DOI: | 10.46586/tches.v2021.i4.239-282 |
Datei: | https://tches.iacr.org/index.php/TCHES/article/view/9066 |
Sebastian
Berndt,
Kilian
Grage,
Klaus
Jansen,
Lukas
Johannsen and
Maria
Kosche,
Robust Online Algorithms for Dynamic Choosing Problems
in Connecting with Computability - 17th Conference on Computability in
Europe, CiE 2021, Virtual Event, Ghent, July 5-9, 2021, Proceedings
,
Liesbeth De Mol and
Andreas Weiermann and
Florin Manea and
David Fern{\'{a}}ndez{-}Duque, Eds.
Springer,
2021.
pp. 38--49.
DOI: | 10.1007/978-3-030-80049-9_4 |
Datei: | https://doi.org/10.1007/978-3-030-80049-9_4 |
Eike
Petersen,
Yannik
Potdevin,
Esfandiar
Mohammadi,
Stephan
Zidowitz,
Sabrina
Breyer,
Dirk
Nowotka,
Sandra
Henn,
Ludwig
Pechmann,
Martin
Leucker,
Philipp
Rostalski and
Christian
Herzog,
Responsible and Regulatory Conform Machine Learning for Medicine: A Survey of Technical Challenges and Solutions
,
CoRR
,
vol. abs/2107.09546,
2021.
Datei: | https://arxiv.org/abs/2107.09546 |
Sebastian
Berndt,
Klaus
Jansen and
Kim{-}Manuel
Klein,
New Bounds for the Vertices of the Integer Hull
in 4th Symposium on Simplicity in Algorithms, {SOSA} 2021, Virtual Conference,
January 11-12, 2021
,
Hung Viet Le and
Valerie King, Eds.
{SIAM},
2021.
pp. 25--36.
DOI: | 10.1137/1.9781611976496.3 |
Datei: | https://doi.org/10.1137/1.9781611976496.3 |
Jan
Wichelmann,
Sebastian
Berndt,
Claudius
Pott and
Thomas
Eisenbarth,
Help, My Signal has Bad Device! - Breaking the Signal Messenger's
Post-Compromise Security Through a Malicious Device
in Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings
,
Leyla Bilge and
Lorenzo Cavallaro and
Giancarlo Pellegrino and
Nuno Neves, Eds.
Springer,
2021.
pp. 88--105.
DOI: | 10.1007/978-3-030-80825-9_5 |
Datei: | https://doi.org/10.1007/978-3-030-80825-9_5 |
Sebastian
Berndt,
Max A.
Deppert,
Klaus
Jansen and
Lars
Rohwedder,
Load Balancing: The Long Road from Theory to Practice
,
CoRR
,
vol. abs/2107.13638,
2021.
Datei: | https://arxiv.org/abs/2107.13638 |
David M.
Sommer,
Lukas
Abfalterer,
Sheila
Zingg and
Esfandiar
Mohammadi,
Learning Numeric Optimal Differentially Private Truncated Additive Mechanisms
,
CoRR
,
vol. abs/2107.12957,
2021.
Datei: | https://arxiv.org/abs/2107.12957 |
Claudius
Pott,
Philipp
Jungklass,
David Jacek
Csejka,
Thomas
Eisenbarth and
Marco
Siebert,
Firmware Security Module: A Framework for Trusted Computing in Automotive Multiprocessors
,
Journal of Hardware and Systems Security
,
2021.
DOI: | 10.1007/s41635-021-00114-4 |
Datei: | https://doi.org/10.1007/s41635-021-00114-4 |
Debajyoti
Das,
Sebastian
Meiser,
Esfandiar
Mohammadi and
Aniket
Kate,
Divide and Funnel: a Scaling Technique for Mix-Networks
,
IACR Cryptol. ePrint Arch.
,
pp. 1685,
2021.
Datei: | https://eprint.iacr.org/2021/1685 |
Tim
Gellersen,
Okan
Seker and
Thomas
Eisenbarth,
Differential Power Analysis of the Picnic Signature Scheme
in Post-Quantum Cryptography - 12th International Workshop, PQCrypto
2021, Daejeon, South Korea, July 20-22, 2021, Proceedings
,
Jung Hee Cheon and Jean-Pierre Tillich, Eds.
Springer,
2021.
pp. 177--194.
DOI: | 10.1007/978-3-030-81293-5_10 |
Datei: | https://doi.org/10.1007/978-3-030-81293-5_10 |
Samira
Briongos,
Ida
Bruhns,
Pedro
Malagón,
Thomas
Eisenbarth and
José Manuel
Moya,
Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged
Cache Attacks
in IEEE European Symposium on Security and Privacy, EuroS&P 2021, Vienna, Austria, September 6-10, 2021
,
IEEE,
2021.
pp. 683--700.
DOI: | 10.1109/EuroSP51992.2021.00051 |
Datei: | https://doi.org/10.1109/EuroSP51992.2021.00051 |
Okan
Seker,
Thomas
Eisenbarth and
Maciej
Liskiewicz,
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks
,
IACR Transactions on Cryptographic Hardware and Embedded Systems
,
vol. 2021,
no. 2,
pp. 61-105,
2021.
Cryptology ePrint Archive, Report 2020/443.
DOI: | 10.46586/tches.v2021.i2.61-105 |
Datei: | https://tches.iacr.org/index.php/TCHES/article/view/8788 |