Präsentationen und Vorträge
Präsentationen und Vorträge sind auf unserem Youtube-Kanal zusammengestellt.
Publikationen
2025
Christian
Ewert,
Andrija
Neskovic,
Carsten
Heinz,
Felix
Muuss,
Alexander
Treff,
Marc
Gourjon,
Rainer
Buchty,
Thomas
Eisenbarth,
Andreas
Koch,
Mladen
Berekovic, and
Saleh
Mulhem,
Lightweight Authenticated Integration and In-Field Secure Operation of System-in-Package, ACM Trans. Des. Autom. Electron. Syst. , Jun. 2025. Association for Computing Machinery.
Lightweight Authenticated Integration and In-Field Secure Operation of System-in-Package, ACM Trans. Des. Autom. Electron. Syst. , Jun. 2025. Association for Computing Machinery.
DOI: | 10.1145/3745780 |
Datei: | 3745780 |
Felix
Mächtle,
Nils
Loose,
Jan-Niclas
Serr,
Jonas
Sander, and
Thomas
Eisenbarth,
AutoStub: Genetic Programming-Based Stub Creation for Symbolic Execution, in Proceedings of the 18th ACM/IEEE International Workshop on Search-Based and Fuzz Testing, SBFT 2025 , 2025.
AutoStub: Genetic Programming-Based Stub Creation for Symbolic Execution, in Proceedings of the 18th ACM/IEEE International Workshop on Search-Based and Fuzz Testing, SBFT 2025 , 2025.
Jonas
Sander,
Sebastian
Berndt,
Ida
Bruhns, and
Thomas
Eisenbarth,
Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2025, pp. 420-449, 2025. IACR.
Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2025, pp. 420-449, 2025. IACR.
DOI: | 10.46586/tches.v2025.i1.420-449 |
Zane
Weissman,
Thore
Tiemann,
Thomas
Eisenbarth, and
Berk
Sunar,
Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms, in Information Systems Security , Patil, Vishwas T. and Krishnan, Ram and Shyamasundar, Rudrapatna K., Eds. Springer Nature Switzerland, 2025. pp. 3-24.
Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms, in Information Systems Security , Patil, Vishwas T. and Krishnan, Ram and Shyamasundar, Rudrapatna K., Eds. Springer Nature Switzerland, 2025. pp. 3-24.
DOI: | 10.1007/978-3-031-80020-7_1 |
ISBN: | 978-3-031-80020-7 |
Weblink: | https://doi.org/10.48550/arXiv.2311.15999 |
Bibtex: | ![]() @inproceedings{weissman2025firecracker, author = {Weissman, Zane and Tiemann, Thore and Eisenbarth, Thomas and Sunar, Berk}, title = {Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms}, booktitle = {Information Systems Security}, editor = {Patil, Vishwas T. and Krishnan, Ram and Shyamasundar, Rudrapatna K.}, year = {2025}, pages = {3--24}, publisher = {Springer Nature Switzerland}, isbn = {978-3-031-80020-7}, doi = {10.1007/978-3-031-80020-7_1}, } |
Sebastian
Meiser,
Debajyoti
Das,
Moritz
Kirschte,
Esfandiar
Mohammadi, and
Aniket
Kate,
Mixnets on a tightrope: Quantifying the leakage of mix networks using a provably optimal heuristic adversary, in 2025 IEEE Symposium on Security and Privacy (SP) , Los Alamitos, CA, USA: IEEE Computer Society, 2025. pp. 4457-4475.
Mixnets on a tightrope: Quantifying the leakage of mix networks using a provably optimal heuristic adversary, in 2025 IEEE Symposium on Security and Privacy (SP) , Los Alamitos, CA, USA: IEEE Computer Society, 2025. pp. 4457-4475.
Datei: | SP61157.2025.00233 |
Felix
Mächtle,
Jan-Niclas
Serr,
Nils
Loose,
Jonas
Sander, and
Thomas
Eisenbarth,
OCEAN: Open-World Contrastive Authorship Identification, in Applied Cryptography and Network Security (ACNS) 2025 , 2025.
OCEAN: Open-World Contrastive Authorship Identification, in Applied Cryptography and Network Security (ACNS) 2025 , 2025.
Weblink: | https://arxiv.org/abs/2412.05049 |
Bibtex: | ![]() @misc{maechtle2024oceanopenworldcontrastiveauthorship, title={OCEAN: Open-World Contrastive Authorship Identification}, author={Felix Mächtle and Jan-Niclas Serr and Nils Loose and Jonas Sander and Thomas Eisenbarth}, year={2024}, eprint={2412.05049}, archivePrefix={arXiv}, primaryClass={cs.AI}, url={https://arxiv.org/abs/2412.05049}, } |
Philipp
Schmitz,
Tobias
Jauch,
Alex
Wezel,
Mohammad R.
Fadiheh,
Thore
Tiemann,
Jonah
Heller,
Thomas
Eisenbarth,
Dominik
Stoffel, and
Wolfgang
Kunz,
Okapi: A Lightweight Architecture for Secure Speculation Exploiting Locality of Memory Accesses, in Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2025 (to appear) , 2025.
Okapi: A Lightweight Architecture for Secure Speculation Exploiting Locality of Memory Accesses, in Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2025 (to appear) , 2025.
DOI: | 10.48550/arXiv.2312.08156 |
Weblink: | https://arxiv.org/abs/2312.08156 |
Bibtex: | ![]() @inproceedings{schmitz2025okapi, author = {Philipp Schmitz and Tobias Jauch and Alex Wezel and Mohammad R. Fadiheh and Thore Tiemann and Jonah Heller and Thomas Eisenbarth and Dominik Stoffel and Wolfgang Kunz}, title = {Okapi: A Lightweight Architecture for Secure Speculation Exploiting Locality of Memory Accesses}, booktitle = {to appear in Proceedings of the 20th {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2025, Ha Noi, August 25-29, 2025}, publisher = {{ACM}}, year = {2025}, doi = {10.48550/arXiv.2312.08156} } |
Anna
Pätschke,
Jan
Wichelmann, and
Thomas
Eisenbarth,
Zebrafix: Mitigating Memory-Centric Side-Channel Leakage via Interleaving, 2025.
Zebrafix: Mitigating Memory-Centric Side-Channel Leakage via Interleaving, 2025.
Datei: | 2502.09139 |
2024
Luca
Wilke,
Florian
Sieck, and
Thomas
Eisenbarth,
TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security , ACM, Okt.2024.
TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security , ACM, Okt.2024.
DOI: | 10.1145/3658644.3690230 |
Weblink: | https://uzl-its.github.io/tdxdown/ |
Bibtex: | ![]() @INPROCEEDINGS{tdxdownCCS24, author = {Luca Wilke and Florian Sieck and Thomas Eisenbarth}, booktitle = {Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, {CCS} 2024, Salt Lake City, UT, USA, October 14--18, 2024}, title = {{TDXdown}: Single-Stepping and Instruction Counting Attacks against Intel {TDX}}, year = {2024}, doi = {10.1145/3658644.3690230} } |
Max
Schulze,
Yorck
Zisgen,
Moritz
Kirschte,
Esfandiar
Mohammadi, and
Agnes
Koschmider,
Differentially Private Inductive Miner, in 2024 6th International Conference on Process Mining (ICPM) , Curran Associates, Sep.2024. pp. 89-96.
Differentially Private Inductive Miner, in 2024 6th International Conference on Process Mining (ICPM) , Curran Associates, Sep.2024. pp. 89-96.
DOI: | 10.1109/ICPM63005.2024.10680684 |
ISBN: | 979-8-3503-6503-0 |
Datei: | 10680684 |
Jan
Wichelmann,
Anja
Rabich,
Anna
Pätschke, and
Thomas
Eisenbarth,
Obelix: Mitigating Side-Channels Through Dynamic Obfuscation, in 2024 IEEE Symposium on Security and Privacy (S&P) , San Francisco, CA, USA: IEEE, Mai2024. pp. 4182-4199.
Obelix: Mitigating Side-Channels Through Dynamic Obfuscation, in 2024 IEEE Symposium on Security and Privacy (S&P) , San Francisco, CA, USA: IEEE, Mai2024. pp. 4182-4199.
DOI: | 10.1109/SP54263.2024.00261 |
Weblink: | https://doi.ieeecomputersociety.org/10.1109/SP54263.2024.00261 |
Johannes
Liebenow,
Yara
Schütt,
Tanya
Braun,
Marcel
Gehrke,
Florian
Thaeter, and
Esfandiar
Mohammadi,
DPM: Clustering Sensitive Data through Separation, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, CCS 2024 , ACM, 2024.
DPM: Clustering Sensitive Data through Separation, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, CCS 2024 , ACM, 2024.
DOI: | 10.48550/arXiv.2307.02969 |
Datei: | arXiv.2307.02969 |
Volodymyr
Bezsmertnyi,
Jean Michel
Cioranesco, and
Thomas
Eisenbarth,
Duplication-Based Fault Tolerance for RISC-V Embedded Software, in Computer Security - ESORICS 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part IV , Joaquin Garcia Alfaro, Rafal Kozik, Michal Choras, Sokratis K. Katsikas, Eds. Springer, 2024. pp. 86--104.
Duplication-Based Fault Tolerance for RISC-V Embedded Software, in Computer Security - ESORICS 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part IV , Joaquin Garcia Alfaro, Rafal Kozik, Michal Choras, Sokratis K. Katsikas, Eds. Springer, 2024. pp. 86--104.
DOI: | 10.1007/978-3-031-70903-6\_5 |
Weblink: | https://dblp.org/rec/conf/esorics/BezsmertnyiCE24.html |
Weblink: | https://link.springer.com/chapter/10.1007/978-3-031-70903-6_5 |
Datei: | 978-3-031-70903-6\_5 |
Debopriya Roy
Dipta,
Thore
Tiemann,
Berk
Gulmezoglu,
Eduard
Marin, and
Thomas
Eisenbarth,
Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments, in 9th IEEE European Symposium on Security and Privacy, EuroS&P 2024 , IEEE, 2024. pp. 327-344.
Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments, in 9th IEEE European Symposium on Security and Privacy, EuroS&P 2024 , IEEE, 2024. pp. 327-344.
DOI: | 10.1109/EUROSP60621.2024.00025 |
Weblink: | https://doi.ieeecomputersociety.org/10.1109/EuroSP60621.2024.00025 |
Weblink: | https://doi.org/10.48550/arXiv.2404.10715 |
Bibtex: | ![]() @inproceedings{DBLP:conf/eurosp/DiptaTGME24, author = {Debopriya Roy Dipta and Thore Tiemann and Berk G{\"{u}}lmezoglu and Eduard Marin and Thomas Eisenbarth}, title = {Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments}, booktitle = {9th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2024, Vienna, Austria, July 8-12, 2024}, pages = {327--344}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/EuroSP60621.2024.00025}, doi = {10.1109/EUROSP60621.2024.00025} } |
Roland
Stenger,
Steffen
Busse,
Jonas
Sander,
Thomas
Eisenbarth, and
Sebastian
Fudickar,
Evaluating the Impact of Face Anonymization Methods on Computer Vision Tasks: A Trade-off Between Privacy and Utility, IEEE Access , pp. 1-1, 2024.
Evaluating the Impact of Face Anonymization Methods on Computer Vision Tasks: A Trade-off Between Privacy and Utility, IEEE Access , pp. 1-1, 2024.
DOI: | 10.1109/ACCESS.2024.3519441 |
Weblink: | https://ieeexplore.ieee.org/document/10804775 |
Datei: | ACCESS.2024.3519441 |
Marcel
Gehrke,
Johannes
Liebenow,
Esfandiar
Mohammadi, and
Tanya
Braun,
Lifting in Support of Privacy-Preserving Probabilistic Inference, KI - Künstliche Intelligenz , vol. 38, pp. 225-241, 2024.
Lifting in Support of Privacy-Preserving Probabilistic Inference, KI - Künstliche Intelligenz , vol. 38, pp. 225-241, 2024.
DOI: | 10.1007/s13218-024-00851-y |
Datei: | s13218-024-00851-y |
Thore
Tiemann,
Zane
Weissman,
Thomas
Eisenbarth, and
Berk
Sunar,
Microarchitectural Vulnerabilities Introduced, Exploited, and Accelerated by Heterogeneous FPGA-CPU Platforms, in Security of FPGA-Accelerated Cloud Computing Environments , Szefer, Jakub and Tessier, Russell, Eds. Cham: Springer International Publishing, 2024, pp. 203-237.
Microarchitectural Vulnerabilities Introduced, Exploited, and Accelerated by Heterogeneous FPGA-CPU Platforms, in Security of FPGA-Accelerated Cloud Computing Environments , Szefer, Jakub and Tessier, Russell, Eds. Cham: Springer International Publishing, 2024, pp. 203-237.
DOI: | 10.1007/978-3-031-45395-3_8 |
ISBN: | 978-3-031-45395-3 |
Bibtex: | ![]() @inbook{tiemann2024fpgaplatform, author = {Tiemann, Thore and Weissman, Zane and Eisenbarth, Thomas and Sunar, Berk}, editor = {Szefer, Jakub and Tessier, Russell}, title = {Microarchitectural Vulnerabilities Introduced, Exploited, and Accelerated by Heterogeneous {FPGA-CPU} Platforms}, bookTitle = {Security of FPGA-Accelerated Cloud Computing Environments}, year = {2024}, publisher = {Springer International Publishing}, pages = {203--237}, isbn = {978-3-031-45395-3}, doi = {10.1007/978-3-031-45395-3_8}, url = {https://doi.org/10.1007/978-3-031-45395-3_8}, } |
Paula
Arnold,
Sebastian
Berndt,
Thomas
Eisenbarth, and
Maximilian
Orlt,
Polynomial sharings on two secrets: Buy one, get one free, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 671-706.
Polynomial sharings on two secrets: Buy one, get one free, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 671-706.
DOI: | 10.46586/tches.v2024.i3.671-706 |
Datei: | 11691 |
Johannes
Liebenow,
Timothy
Imort,
Yannick
Fuchs,
Marcel
Heisel,
Nadja
Käding,
Jan
Rupp, and
Esfandiar
Mohammadi,
PrivAgE: A Toolchain for Privacy-Preserving Distributed Aggregation on Edge-Devices, KI - Künstliche Intelligenz , vol. 38, pp. 183-188, 2024.
PrivAgE: A Toolchain for Privacy-Preserving Distributed Aggregation on Edge-Devices, KI - Künstliche Intelligenz , vol. 38, pp. 183-188, 2024.
DOI: | 10.1007/s13218-023-00823-8 |
Datei: | s13218-023-00823-8 |
Thorsten
Peinemann,
Moritz
Kirschte,
Joshua
Stock,
Carlos
Cotrini, and
Esfandiar
Mohammadi,
S-BDT: Distributed Differentially Private Boosted Decision Trees, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS '24) , New York, NY, USA: Association for Computing Machinery, 2024. pp. 288–302.
S-BDT: Distributed Differentially Private Boosted Decision Trees, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS '24) , New York, NY, USA: Association for Computing Machinery, 2024. pp. 288–302.
DOI: | 10.1145/3658644.3690301 |
ISBN: | 9798400706363 |
Datei: | 2309.12041 |
Luca
Wilke,
Jan
Wichelmann,
Anja
Rabich, and
Thomas
Eisenbarth,
SEV-Step: A Single-Stepping Framework for AMD-SEV, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 180-206.
SEV-Step: A Single-Stepping Framework for AMD-SEV, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 180-206.
DOI: | 10.46586/tches.v2024.i1.180-206 |
Datei: | 10792 |
Ida
Bruhns,
Sebastian
Berndt,
Jonas
Sander, and
Thomas
Eisenbarth,
Slalom at the Carnival: Privacy-preserving Inference with Masks from Public Knowledge, IACR Commun. Cryptol. , vol. 1, no. 3, pp. 40, 2024.
Slalom at the Carnival: Privacy-preserving Inference with Masks from Public Knowledge, IACR Commun. Cryptol. , vol. 1, no. 3, pp. 40, 2024.
DOI: | 10.62056/AKP-49QGXQ |
Datei: | akp-49qgxq |
Luca
Wilke, and
Gianluca
Scopelliti,
SNPGuard: Remote Attestation of SEV-SNP VMs Using Open Source Tools, in 2024 IEEE European Symposium on Security and Privacy Workshops EuroS&P , IEEE Computer Society, 2024. pp. 193-198.
SNPGuard: Remote Attestation of SEV-SNP VMs Using Open Source Tools, in 2024 IEEE European Symposium on Security and Privacy Workshops EuroS&P , IEEE Computer Society, 2024. pp. 193-198.
DOI: | 10.1109/EuroSPW61312.2024.00026 |
Weblink: | https://doi.ieeecomputersociety.org/10.1109/EuroSPW61312.2024.00026 |
Bibtex: | ![]() @INPROCEEDINGS {10628964, author = {L. Wilke and G. Scopelliti}, booktitle = {2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)}, title = {SNPGuard: Remote Attestation of SEV-SNP VMs Using Open Source Tools}, year = {2024}, volume = {}, issn = {}, pages = {193-198}, doi = {10.1109/EuroSPW61312.2024.00026}, url = {https://doi.ieeecomputersociety.org/10.1109/EuroSPW61312.2024.00026}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, month = {jul} } |
Nils
Loose,
Felix
Mächtle,
Florian
Sieck, and
Thomas
Eisenbarth,
SWAT: Modular Dynamic Symbolic Execution for Java Applications using Dynamic Instrumentation (Competition Contribution), in Tools and Algorithms for the Construction and Analysis of Systems - 30th International Conference, TACAS 2024, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024, Luxembourg City, Luxembourg, April 6-11, 2024, Proceedings, Part III , Bernd Finkbeiner and Laura Kovács, Eds. Springer, 2024. pp. 399-405.
SWAT: Modular Dynamic Symbolic Execution for Java Applications using Dynamic Instrumentation (Competition Contribution), in Tools and Algorithms for the Construction and Analysis of Systems - 30th International Conference, TACAS 2024, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024, Luxembourg City, Luxembourg, April 6-11, 2024, Proceedings, Part III , Bernd Finkbeiner and Laura Kovács, Eds. Springer, 2024. pp. 399-405.
DOI: | 10.1007/978-3-031-57256-2_28 |
Datei: | 978-3-031-57256-2_28 |
2023
Florian
Sieck,
Zhiyuan
Zhang,
Sebastian
Berndt,
Chitchanok
Chuengsatiansup,
Thomas
Eisenbarth, and
Yuval
Yarom,
TeeJam: Sub-Cache-Line Leakages Strike Back, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , Dez.2023. pp. 457-500.
TeeJam: Sub-Cache-Line Leakages Strike Back, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , Dez.2023. pp. 457-500.
DOI: | 10.46586/tches.v2024.i1.457-500 |
Weblink: | https://tches.iacr.org/index.php/TCHES/article/view/11259 |
Bibtex: | ![]() @article{Sieck_Zhang_Berndt_Chuengsatiansup_Eisenbarth_Yarom_2023, title={TeeJam: Sub-Cache-Line Leakages Strike Back}, volume={2024}, url={https://tches.iacr.org/index.php/TCHES/article/view/11259}, DOI={10.46586/tches.v2024.i1.457-500}, number={1}, journal={IACR Transactions on Cryptographic Hardware and Embedded Systems}, author={Sieck, Florian and Zhang, Zhiyuan and Berndt, Sebastian and Chuengsatiansup, Chitchanok and Eisenbarth, Thomas and Yarom, Yuval}, year={2023}, month={Dec.}, pages={457–500} } |

- Forschung
- Publikationen
- Dissertationen
- Tools
- Seminar
- Projekte