Präsentationen und Vorträge
Präsentationen und Vorträge sind auf unserem Youtube-Kanal zusammengestellt.
Publikationen
2025
Thorsten
Peinemann,
Paula
Arnold,
Sebastian
Berndt,
Thomas
Eisenbarth, and
Esfandiar
Mohammadi,
Non-omniscient backdoor injection with a single poison sample: Proving the one-poison hypothesis for linear regression and linear classification, arXiv , Aug. 2025.
Non-omniscient backdoor injection with a single poison sample: Proving the one-poison hypothesis for linear regression and linear classification, arXiv , Aug. 2025.
| DOI: | 10.48550/arXiv.2508.05600 |
| Datei: | 2508.05600 |
Christian
Ewert,
Andrija
Neskovic,
Carsten
Heinz,
Felix
Muuss,
Alexander
Treff,
Marc
Gourjon,
Rainer
Buchty,
Thomas
Eisenbarth,
Andreas
Koch,
Mladen
Berekovic, and
Saleh
Mulhem,
Lightweight Authenticated Integration and In-Field Secure Operation of System-in-Package, ACM Trans. Des. Autom. Electron. Syst. , Jun. 2025. Association for Computing Machinery.
Lightweight Authenticated Integration and In-Field Secure Operation of System-in-Package, ACM Trans. Des. Autom. Electron. Syst. , Jun. 2025. Association for Computing Machinery.
| DOI: | 10.1145/3745780 |
| Datei: | 3745780 |
Felix
Mächtle,
Nils
Loose,
Jan-Niclas
Serr,
Jonas
Sander, and
Thomas
Eisenbarth,
AutoStub: Genetic Programming-Based Stub Creation for Symbolic Execution, in Proceedings of the 18th ACM/IEEE International Workshop on Search-Based and Fuzz Testing, SBFT 2025 , 2025.
AutoStub: Genetic Programming-Based Stub Creation for Symbolic Execution, in Proceedings of the 18th ACM/IEEE International Workshop on Search-Based and Fuzz Testing, SBFT 2025 , 2025.
Jonas
Sander,
Sebastian
Berndt,
Ida
Bruhns, and
Thomas
Eisenbarth,
Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2025, pp. 420-449, 2025. IACR.
Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2025, pp. 420-449, 2025. IACR.
| DOI: | 10.46586/tches.v2025.i1.420-449 |
Johannes
Liebenow,
Thorsten
Peinemann, and
Esfandiar
Mohammadi,
DP-HYPE: Distributed Differentially Private Hyperparameter Search, arXiv preprint arXiv:2510.04902 , 2025.
DP-HYPE: Distributed Differentially Private Hyperparameter Search, arXiv preprint arXiv:2510.04902 , 2025.
| Weblink: | https://arxiv.org/abs/2510.04902 |
Zane
Weissman,
Thore
Tiemann,
Thomas
Eisenbarth, and
Berk
Sunar,
Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms, in Information Systems Security , Patil, Vishwas T. and Krishnan, Ram and Shyamasundar, Rudrapatna K., Eds. Springer Nature Switzerland, 2025. pp. 3-24.
Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms, in Information Systems Security , Patil, Vishwas T. and Krishnan, Ram and Shyamasundar, Rudrapatna K., Eds. Springer Nature Switzerland, 2025. pp. 3-24.
| DOI: | 10.1007/978-3-031-80020-7_1 |
| ISBN: | 978-3-031-80020-7 |
| Weblink: | https://doi.org/10.48550/arXiv.2311.15999 |
| Bibtex: | @inproceedings{weissman2025firecracker,
author = {Weissman, Zane and
Tiemann, Thore and
Eisenbarth, Thomas and
Sunar, Berk},
title = {Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms},
booktitle = {Information Systems Security},
editor = {Patil, Vishwas T. and
Krishnan, Ram and
Shyamasundar, Rudrapatna K.},
year = {2025},
pages = {3--24},
publisher = {Springer Nature Switzerland},
isbn = {978-3-031-80020-7},
doi = {10.1007/978-3-031-80020-7_1},
} |
Sebastian
Meiser,
Debajyoti
Das,
Moritz
Kirschte,
Esfandiar
Mohammadi, and
Aniket
Kate,
Mixnets on a tightrope: Quantifying the leakage of mix networks using a provably optimal heuristic adversary, in 2025 IEEE Symposium on Security and Privacy (SP) , Los Alamitos, CA, USA: IEEE Computer Society, 2025. pp. 4457-4475.
Mixnets on a tightrope: Quantifying the leakage of mix networks using a provably optimal heuristic adversary, in 2025 IEEE Symposium on Security and Privacy (SP) , Los Alamitos, CA, USA: IEEE Computer Society, 2025. pp. 4457-4475.
| Datei: | SP61157.2025.00233 |
Felix
Mächtle,
Jan-Niclas
Serr,
Nils
Loose,
Jonas
Sander, and
Thomas
Eisenbarth,
OCEAN: Open-World Contrastive Authorship Identification, in Applied Cryptography and Network Security (ACNS) 2025 , 2025.
OCEAN: Open-World Contrastive Authorship Identification, in Applied Cryptography and Network Security (ACNS) 2025 , 2025.
| Weblink: | https://arxiv.org/abs/2412.05049 |
| Bibtex: | @misc{maechtle2024oceanopenworldcontrastiveauthorship,
title={OCEAN: Open-World Contrastive Authorship Identification},
author={Felix Mächtle and Jan-Niclas Serr and Nils Loose and Jonas Sander and Thomas Eisenbarth},
year={2024},
eprint={2412.05049},
archivePrefix={arXiv},
primaryClass={cs.AI},
url={https://arxiv.org/abs/2412.05049},
} |
Philipp
Schmitz,
Tobias
Jauch,
Alex
Wezel,
Mohammad R.
Fadiheh,
Thore
Tiemann,
Jonah
Heller,
Thomas
Eisenbarth,
Dominik
Stoffel, and
Wolfgang
Kunz,
Okapi: A Lightweight Architecture for Secure Speculation Exploiting Locality of Memory Accesses, in Proceedings of the 20th ACM Asia Conference on Computer and Communications Security (to appear) , ACM, 2025. pp. 1203–1218.
Okapi: A Lightweight Architecture for Secure Speculation Exploiting Locality of Memory Accesses, in Proceedings of the 20th ACM Asia Conference on Computer and Communications Security (to appear) , ACM, 2025. pp. 1203–1218.
| DOI: | 10.1145/3708821.3733869 |
| Weblink: | https://arxiv.org/abs/2312.08156 |
| Bibtex: | @inproceedings{schmitz2025okapi,
author = {Philipp Schmitz and
Tobias Jauch and
Alex Wezel and
Mohammad R. Fadiheh and
Thore Tiemann and
Jonah Heller and
Thomas Eisenbarth and
Dominik Stoffel and
Wolfgang Kunz},
title = {Okapi: A Lightweight Architecture for Secure
Speculation Exploiting Locality of Memory Accesses},
booktitle = {to appear in Proceedings of the 20th {ACM} Asia Conference on Computer and Communications
Security, {ASIA} {CCS} 2025, Ha Noi, August 25-29, 2025},
publisher = {{ACM}},
year = {2025},
doi = {10.1145/3708821.3733869}
} |
Jeremy
Boy,
Antoon
Purnal,
Anna
Pätschke,
Luca
Wilke, and
Thomas
Eisenbarth,
SLasH-DSA: Breaking SLH-DSA Using an Extensible End-To-End Rowhammer Framework, arXiv preprint arXiv:2509.13048 , 2025.
SLasH-DSA: Breaking SLH-DSA Using an Extensible End-To-End Rowhammer Framework, arXiv preprint arXiv:2509.13048 , 2025.
| Datei: | 2509.13048 |
Anna
Pätschke,
Jan
Wichelmann, and
Thomas
Eisenbarth,
Zebrafix: Mitigating Memory-Centric Side-Channel Leakage via Interleaving, in 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2025) , IEEE, 2025.
Zebrafix: Mitigating Memory-Centric Side-Channel Leakage via Interleaving, in 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2025) , IEEE, 2025.
| Datei: | 2502.09139 |
2024
Luca
Wilke,
Florian
Sieck, and
Thomas
Eisenbarth,
TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security , ACM, Okt.2024.
TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security , ACM, Okt.2024.
| DOI: | 10.1145/3658644.3690230 |
| Weblink: | https://uzl-its.github.io/tdxdown/ |
| Bibtex: | @INPROCEEDINGS{tdxdownCCS24,
author = {Luca Wilke and Florian Sieck and Thomas Eisenbarth},
booktitle = {Proceedings of the 2024 ACM SIGSAC Conference
on Computer and Communications Security, {CCS} 2024,
Salt Lake City, UT, USA, October 14--18, 2024},
title = {{TDXdown}: Single-Stepping and Instruction Counting Attacks
against Intel {TDX}},
year = {2024},
doi = {10.1145/3658644.3690230}
}
|
Max
Schulze,
Yorck
Zisgen,
Moritz
Kirschte,
Esfandiar
Mohammadi, and
Agnes
Koschmider,
Differentially Private Inductive Miner, in 2024 6th International Conference on Process Mining (ICPM) , Curran Associates, Sep.2024. pp. 89-96.
Differentially Private Inductive Miner, in 2024 6th International Conference on Process Mining (ICPM) , Curran Associates, Sep.2024. pp. 89-96.
| DOI: | 10.1109/ICPM63005.2024.10680684 |
| ISBN: | 979-8-3503-6503-0 |
| Datei: | 10680684 |
Jan
Wichelmann,
Anja
Rabich,
Anna
Pätschke, and
Thomas
Eisenbarth,
Obelix: Mitigating Side-Channels Through Dynamic Obfuscation, in 2024 IEEE Symposium on Security and Privacy (S&P) , San Francisco, CA, USA: IEEE, Mai2024. pp. 4182-4199.
Obelix: Mitigating Side-Channels Through Dynamic Obfuscation, in 2024 IEEE Symposium on Security and Privacy (S&P) , San Francisco, CA, USA: IEEE, Mai2024. pp. 4182-4199.
| DOI: | 10.1109/SP54263.2024.00261 |
| Weblink: | https://doi.ieeecomputersociety.org/10.1109/SP54263.2024.00261 |
Johannes
Liebenow,
Yara
Schütt,
Tanya
Braun,
Marcel
Gehrke,
Florian
Thaeter, and
Esfandiar
Mohammadi,
DPM: Clustering Sensitive Data through Separation, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, CCS 2024 , ACM, 2024.
DPM: Clustering Sensitive Data through Separation, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, CCS 2024 , ACM, 2024.
| DOI: | 10.48550/arXiv.2307.02969 |
| Datei: | arXiv.2307.02969 |
Volodymyr
Bezsmertnyi,
Jean Michel
Cioranesco, and
Thomas
Eisenbarth,
Duplication-Based Fault Tolerance for RISC-V Embedded Software, in Computer Security - ESORICS 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part IV , Joaquin Garcia Alfaro, Rafal Kozik, Michal Choras, Sokratis K. Katsikas, Eds. Springer, 2024. pp. 86--104.
Duplication-Based Fault Tolerance for RISC-V Embedded Software, in Computer Security - ESORICS 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part IV , Joaquin Garcia Alfaro, Rafal Kozik, Michal Choras, Sokratis K. Katsikas, Eds. Springer, 2024. pp. 86--104.
| DOI: | 10.1007/978-3-031-70903-6\_5 |
| Weblink: | https://dblp.org/rec/conf/esorics/BezsmertnyiCE24.html |
| Weblink: | https://link.springer.com/chapter/10.1007/978-3-031-70903-6_5 |
| Datei: | 978-3-031-70903-6\_5 |
Debopriya Roy
Dipta,
Thore
Tiemann,
Berk
Gulmezoglu,
Eduard
Marin, and
Thomas
Eisenbarth,
Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments, in 9th IEEE European Symposium on Security and Privacy, EuroS&P 2024 , IEEE, 2024. pp. 327-344.
Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments, in 9th IEEE European Symposium on Security and Privacy, EuroS&P 2024 , IEEE, 2024. pp. 327-344.
| DOI: | 10.1109/EUROSP60621.2024.00025 |
| Weblink: | https://doi.ieeecomputersociety.org/10.1109/EuroSP60621.2024.00025 |
| Weblink: | https://doi.org/10.48550/arXiv.2404.10715 |
| Bibtex: | @inproceedings{DBLP:conf/eurosp/DiptaTGME24,
author = {Debopriya Roy Dipta and
Thore Tiemann and
Berk G{\"{u}}lmezoglu and
Eduard Marin and
Thomas Eisenbarth},
title = {Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox
Environments},
booktitle = {9th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
2024, Vienna, Austria, July 8-12, 2024},
pages = {327--344},
publisher = {{IEEE}},
year = {2024},
url = {https://doi.org/10.1109/EuroSP60621.2024.00025},
doi = {10.1109/EUROSP60621.2024.00025}
} |
Roland
Stenger,
Steffen
Busse,
Jonas
Sander,
Thomas
Eisenbarth, and
Sebastian
Fudickar,
Evaluating the Impact of Face Anonymization Methods on Computer Vision Tasks: A Trade-off Between Privacy and Utility, IEEE Access , pp. 1-1, 2024.
Evaluating the Impact of Face Anonymization Methods on Computer Vision Tasks: A Trade-off Between Privacy and Utility, IEEE Access , pp. 1-1, 2024.
| DOI: | 10.1109/ACCESS.2024.3519441 |
| Weblink: | https://ieeexplore.ieee.org/document/10804775 |
| Datei: | ACCESS.2024.3519441 |
Marcel
Gehrke,
Johannes
Liebenow,
Esfandiar
Mohammadi, and
Tanya
Braun,
Lifting in Support of Privacy-Preserving Probabilistic Inference, KI - Künstliche Intelligenz , vol. 38, pp. 225-241, 2024.
Lifting in Support of Privacy-Preserving Probabilistic Inference, KI - Künstliche Intelligenz , vol. 38, pp. 225-241, 2024.
| DOI: | 10.1007/s13218-024-00851-y |
| Datei: | s13218-024-00851-y |
Thore
Tiemann,
Zane
Weissman,
Thomas
Eisenbarth, and
Berk
Sunar,
Microarchitectural Vulnerabilities Introduced, Exploited, and Accelerated by Heterogeneous FPGA-CPU Platforms, in Security of FPGA-Accelerated Cloud Computing Environments , Szefer, Jakub and Tessier, Russell, Eds. Cham: Springer International Publishing, 2024, pp. 203-237.
Microarchitectural Vulnerabilities Introduced, Exploited, and Accelerated by Heterogeneous FPGA-CPU Platforms, in Security of FPGA-Accelerated Cloud Computing Environments , Szefer, Jakub and Tessier, Russell, Eds. Cham: Springer International Publishing, 2024, pp. 203-237.
| DOI: | 10.1007/978-3-031-45395-3_8 |
| ISBN: | 978-3-031-45395-3 |
| Bibtex: | @inbook{tiemann2024fpgaplatform,
author = {Tiemann, Thore
and Weissman, Zane
and Eisenbarth, Thomas
and Sunar, Berk},
editor = {Szefer, Jakub
and Tessier, Russell},
title = {Microarchitectural Vulnerabilities Introduced,
Exploited, and Accelerated by Heterogeneous
{FPGA-CPU} Platforms},
bookTitle = {Security of FPGA-Accelerated Cloud Computing
Environments},
year = {2024},
publisher = {Springer International Publishing},
pages = {203--237},
isbn = {978-3-031-45395-3},
doi = {10.1007/978-3-031-45395-3_8},
url = {https://doi.org/10.1007/978-3-031-45395-3_8},
} |
Paula
Arnold,
Sebastian
Berndt,
Thomas
Eisenbarth, and
Maximilian
Orlt,
Polynomial sharings on two secrets: Buy one, get one free, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 671-706.
Polynomial sharings on two secrets: Buy one, get one free, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 671-706.
| DOI: | 10.46586/tches.v2024.i3.671-706 |
| Datei: | 11691 |
Johannes
Liebenow,
Timothy
Imort,
Yannick
Fuchs,
Marcel
Heisel,
Nadja
Käding,
Jan
Rupp, and
Esfandiar
Mohammadi,
PrivAgE: A Toolchain for Privacy-Preserving Distributed Aggregation on Edge-Devices, KI - Künstliche Intelligenz , vol. 38, pp. 183-188, 2024.
PrivAgE: A Toolchain for Privacy-Preserving Distributed Aggregation on Edge-Devices, KI - Künstliche Intelligenz , vol. 38, pp. 183-188, 2024.
| DOI: | 10.1007/s13218-023-00823-8 |
| Datei: | s13218-023-00823-8 |
Thorsten
Peinemann,
Moritz
Kirschte,
Joshua
Stock,
Carlos
Cotrini, and
Esfandiar
Mohammadi,
S-BDT: Distributed Differentially Private Boosted Decision Trees, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS '24) , New York, NY, USA: Association for Computing Machinery, 2024. pp. 288–302.
S-BDT: Distributed Differentially Private Boosted Decision Trees, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS '24) , New York, NY, USA: Association for Computing Machinery, 2024. pp. 288–302.
| DOI: | 10.1145/3658644.3690301 |
| ISBN: | 9798400706363 |
| Datei: | 2309.12041 |
Luca
Wilke,
Jan
Wichelmann,
Anja
Rabich, and
Thomas
Eisenbarth,
SEV-Step: A Single-Stepping Framework for AMD-SEV, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 180-206.
SEV-Step: A Single-Stepping Framework for AMD-SEV, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 180-206.
| DOI: | 10.46586/tches.v2024.i1.180-206 |
| Datei: | 10792 |
Ida
Bruhns,
Sebastian
Berndt,
Jonas
Sander, and
Thomas
Eisenbarth,
Slalom at the Carnival: Privacy-preserving Inference with Masks from Public Knowledge, IACR Commun. Cryptol. , vol. 1, no. 3, pp. 40, 2024.
Slalom at the Carnival: Privacy-preserving Inference with Masks from Public Knowledge, IACR Commun. Cryptol. , vol. 1, no. 3, pp. 40, 2024.
| DOI: | 10.62056/AKP-49QGXQ |
| Datei: | akp-49qgxq |

- Forschung
- Publikationen
- Dissertationen
- Tools
- Seminar
- Projekte
