Publikationen
2021
Okan
Seker,
Thomas
Eisenbarth and
Maciej
Liskiewicz,
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks
,
IACR Transactions on Cryptographic Hardware and Embedded Systems
,
vol. 2021,
no. 2,
pp. 61-105,
2021.
Cryptology ePrint Archive, Report 2020/443.
DOI: | 10.46586/tches.v2021.i2.61-105 |
Datei: | https://tches.iacr.org/index.php/TCHES/article/view/8788 |
Sebastian
Berndt,
Klaus
Jansen and
Kim-Manuel
Klein,
New Bounds for the Vertices of the Integer Hull
in SOSA@SODA
,
SIAM,
2021.
Sebastian
Berndt,
Klaus
Jansen and
Alexandra
Lassota,
Tightness of Sensitivity and Proximity Bounds for Integer Programs
in SOFSEM (accepted)
,
2021.
2020
Daniel
Moghimi,
Berk
Sunar,
Thomas
Eisenbarth and
Nadia
Heninger,
TPM-FAIL: TPM meets Timing and Lattice Attacks
in 29th USENIX Security Symposium (USENIX Security 20)
,
Boston, MA:
USENIX Association,
2020.
Datei: | https://tpm.fail/ |
Max
Bannach,
Sebastian
Berndt,
Marten
Maack,
Matthias
Mnich,
Alexandra
Lassota,
Malin
Rau and
Malte
Skambath,
Solving Packing Problems with Few Small Items Using Rainbow Matchings
in MFCS 2020
,
Schloss Dagstuhl - Leibniz-Zentrum für Informatik,
2020.
Okan
Seker,
Sebastian
Berndt,
Luca
Wilke and
Thomas
Eisenbarth,
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis
in CCS
,
ACM,
2020.
pp. 1033--1049.
DOI: | 10.1145/3372297.3417889 |
Datei: | https://dl.acm.org/doi/10.1145/3372297.3417889 |
Luca
Wilke,
Jan
Wichelmann,
Mathias
Morbitzer and
Thomas
Eisenbarth,
SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions
in 2020 IEEE Symposium on Security and Privacy (SP)
,
Los Alamitos, CA, USA:
IEEE Computer Society,
2020.
pp. 1431-1444.
Datei: | https://uzl-its.github.io/SEVurity/ |
Samira
Briongos,
Pedro
Malagon,
Jose M.
Moya and
Thomas
Eisenbarth,
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks
in 29th USENIX Security Symposium (USENIX Security 20)
,
USENIX Association,
2020.
pp. 1967--1984.
ISBN: | 978-1-939133-17-5 |
Datei: | https://www.usenix.org/conference/usenixsecurity20/presentation/briongos |
Max
Bannach,
Sebastian
Berndt,
Martin
Schuster and
Marcel
Wienöbst,
PACE Solver Description: PID (star)
in IPEC
,
Schloss Dagstuhl - Leibniz-Zentrum für Informatik,
2020.
pp. 28:1--28:4.
Max
Bannach,
Sebastian
Berndt,
Martin
Schuster and
Marcel
Wienöbst,
PACE Solver Description: Fluid
in IPEC
,
Schloss Dagstuhl - Leibniz-Zentrum für Informatik,
2020.
pp. 27:1--27:3.
Sebastian
Berndt and
Maciej
Liskiewicz,
On the universal steganography of optimal rate
,
Inf. Comput.
,
vol. 275,
pp. 104632,
2020.
Samira
Briongos,
Pedro
Malag'on,
Jose Manuel
Moya and
Thomas
Eisenbarth,
Microarchitectural Isolation Guarantees Through Execution Based Signatures
in XXXV Conference on Design of Circuits and Integrated Systems, DCIS, 2020, Segovia, Spain, November 18-20, 2020
,
IEEE,
2020.
pp. 1--6.
DOI: | 10.1109/DCIS51330.2020.9268660 |
Datei: | https://doi.org/10.1109/DCIS51330.2020.9268660 |
Zane
Weissman,
Thore
Tiemann,
Daniel
Moghimi,
Evan
Custodio,
Thomas
Eisenbarth and
Berk
Sunar,
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms
,
IACR Transactions on Cryptographic Hardware and Embedded Systems
,
vol. 2020,
no. 3,
pp. 169-195,
2020.
DOI: | 10.13154/tches.v2020.i3.169-195 |
Datei: | https://tches.iacr.org/index.php/TCHES/article/view/8587 |
Tim
Gellersen,
Okan
Seker and
Thomas
Eisenbarth,
Differential Power Analysis of the Picnic Signature Scheme
,
2020.
Cryptology ePrint Archive, Report 2020/267.
Datei: | https://eprint.iacr.org/2020/267 |
Debajyoti
Das,
Sebastian
Meiser,
Esfandiar
Mohammadi and
Aniket
Kate,
Comprehensive Anonymity Trilemma: User Coordination is not enough
in Proceedings on Privacy Enhancing Technologies (PETS/PoPETS) 2020.3
,
Sciendo,
2020.
Datei: | https://content.sciendo.com/view/journals/popets/2020/3/article-p356.xml |
Sebastian
Berndt,
Jan
Wichelmann,
Claudius
Pott,
Tim-Henrik
Traving and
Thomas
Eisenbarth,
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols
,
IACR Cryptol. ePrint Arch.
,
vol. 2020,
pp. 1452,
2020.
Datei: | https://eprint.iacr.org/2020/1452 |
2019
Berk
Gulmezoglu,
Andreas
Zankl,
M. Caner
Tol,
Saad
Islam,
Thomas
Eisenbarth and
Berk
Sunar,
Undermining User Privacy on Mobile Devices Using AI
in Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security
,
New York, NY, USA:
ACM,
2019.
pp. 214--227.
DOI: | 10.1145/3321705.3329804 |
ISBN: | 978-1-4503-6752-3 |
Datei: | http://doi.acm.org/10.1145/3321705.3329804 |
Saad
Islam,
Ahmad
Moghimi,
Ida
Bruhns,
Moritz
Krebbel,
Berk
Gulmezoglu,
Thomas
Eisenbarth and
Berk
Sunar,
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache
Attacks
in 28th USENIX Security Symposium (USENIX Security 19)
,
Santa Clara, CA:
USENIX Association,
2019.
Datei: | https://www.usenix.org/conference/usenixsecurity19/presentation/islam |
Damien
Desfontaines,
Elisabeth
Krahmer and
Esfandiar
Mohammadi,
Passive and active attackers in noiseless privacy
,
CoRR
,
vol. abs/1905.00650,
2019.
Datei: | http://arxiv.org/abs/1905.00650 |
David
Sommer,
Sebastian
Meiser and
Esfandiar
Mohammadi,
Privacy Loss Classes: The Central Limit Theorem in Differential Privacy
,
Proceedings on Privacy Enhancing Technologies
,
vol. 2019,
no. 2,
pp. 245 - 269,
2019.
Sciendo.
DOI: | https://doi.org/10.2478/popets-2019-0029 |
Datei: | https://content.sciendo.com/view/journals/popets/2019/2/article-p245.xml |
David
Sommer,
Aritra
Dhar,
Luka
Malisa,
Esfandiar
Mohammadi,
Daniel
Ronzani and
Srdjan
Capkun,
Deniable Upload and Download via Passive Participation
in 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19)
,
Boston, MA:
USENIX Association,
2019.
pp. 649--666.
ISBN: | 978-1-931971-49-2 |
Datei: | https://www.usenix.org/conference/nsdi19/presentation/sommer |
Berk
Gulmezoglu,
Ahmad
Moghimi,
Thomas
Eisenbarth and
Berk
Sunar,
FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning
,
arXiv e-prints
,
2019.
Datei: | https://ui.adsabs.harvard.edu/abs/2019arXiv190703651G |
2018
Ahmad
Moghimi,
Jan
Wichelmann,
Thomas
Eisenbarth and
Berk
Sunar,
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations
,
International Journal of Parallel Programming
,
2018.
Datei: | https://doi.org/10.1007/s10766-018-0611-9 |
Marc
Stelzner and
Thomas
Eisenbarth,
IT Security in Lübeck - The design of a modern and future-proof security curriculum
in 2018 12th European Workshop on Microelectronics Education (EWME)
,
2018.
pp. 79-82.
DOI: | 10.1109/EWME.2018.8629494 |
Datei: | https://ieeexplore.ieee.org/document/8629494 |
Jan
Wichelmann,
Ahmad
Moghimi,
Thomas
Eisenbarth and
Berk
Sunar,
MicroWalk: A Framework for Finding Side Channels in Binaries
in Proceedings of the 34th Annual Computer Security Applications Conference
,
New York, NY, USA:
ACM,
2018.
pp. 161--173.
DOI: | 10.1145/3274694.3274741 |
Datei: | http://doi.acm.org/10.1145/3274694.3274741 |