Publikationen

2021

  • Okan Seker, Thomas Eisenbarth and Maciej Liskiewicz,
    A White-Box Masking Scheme Resisting Computational and Algebraic Attacks , IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 2, pp. 61-105, 2021. Cryptology ePrint Archive, Report 2020/443.
    DOI:10.46586/tches.v2021.i2.61-105
    Datei: https://tches.iacr.org/index.php/TCHES/article/view/8788

  • Sebastian Berndt, Klaus Jansen and Kim-Manuel Klein,
    New Bounds for the Vertices of the Integer Hull in SOSA@SODA , SIAM, 2021.

  • Sebastian Berndt, Klaus Jansen and Alexandra Lassota,
    Tightness of Sensitivity and Proximity Bounds for Integer Programs in SOFSEM (accepted) , 2021.

  • 2020

  • Daniel Moghimi, Berk Sunar, Thomas Eisenbarth and Nadia Heninger,
    TPM-FAIL: TPM meets Timing and Lattice Attacks in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, 2020.
    Datei: https://tpm.fail/

  • Max Bannach, Sebastian Berndt, Marten Maack, Matthias Mnich, Alexandra Lassota, Malin Rau and Malte Skambath,
    Solving Packing Problems with Few Small Items Using Rainbow Matchings in MFCS 2020 , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020.

  • Okan Seker, Sebastian Berndt, Luca Wilke and Thomas Eisenbarth,
    SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis in CCS , ACM, 2020. pp. 1033--1049.
    DOI:10.1145/3372297.3417889
    Datei: https://dl.acm.org/doi/10.1145/3372297.3417889

  • Luca Wilke, Jan Wichelmann, Mathias Morbitzer and Thomas Eisenbarth,
    SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions in 2020 IEEE Symposium on Security and Privacy (SP) , Los Alamitos, CA, USA: IEEE Computer Society, 2020. pp. 1431-1444.
    Datei: https://uzl-its.github.io/SEVurity/

  • Samira Briongos, Pedro Malagon, Jose M. Moya and Thomas Eisenbarth,
    RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks in 29th USENIX Security Symposium (USENIX Security 20) , USENIX Association, 2020. pp. 1967--1984.
    ISBN:978-1-939133-17-5
    Datei: https://www.usenix.org/conference/usenixsecurity20/presentation/briongos

  • Max Bannach, Sebastian Berndt, Martin Schuster and Marcel Wienöbst,
    PACE Solver Description: PID (star) in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 28:1--28:4.

  • Max Bannach, Sebastian Berndt, Martin Schuster and Marcel Wienöbst,
    PACE Solver Description: Fluid in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 27:1--27:3.

  • Sebastian Berndt and Maciej Liskiewicz,
    On the universal steganography of optimal rate , Inf. Comput. , vol. 275, pp. 104632, 2020.

  • Samira Briongos, Pedro Malag'on, Jose Manuel Moya and Thomas Eisenbarth,
    Microarchitectural Isolation Guarantees Through Execution Based Signatures in XXXV Conference on Design of Circuits and Integrated Systems, DCIS, 2020, Segovia, Spain, November 18-20, 2020 , IEEE, 2020. pp. 1--6.
    DOI:10.1109/DCIS51330.2020.9268660
    Datei: https://doi.org/10.1109/DCIS51330.2020.9268660

  • Zane Weissman, Thore Tiemann, Daniel Moghimi, Evan Custodio, Thomas Eisenbarth and Berk Sunar,
    JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms , IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2020, no. 3, pp. 169-195, 2020.
    DOI:10.13154/tches.v2020.i3.169-195
    Datei: https://tches.iacr.org/index.php/TCHES/article/view/8587

  • Tim Gellersen, Okan Seker and Thomas Eisenbarth,
    Differential Power Analysis of the Picnic Signature Scheme , 2020. Cryptology ePrint Archive, Report 2020/267.
    Datei: https://eprint.iacr.org/2020/267

  • Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi and Aniket Kate,
    Comprehensive Anonymity Trilemma: User Coordination is not enough in Proceedings on Privacy Enhancing Technologies (PETS/PoPETS) 2020.3 , Sciendo, 2020.
    Datei: https://content.sciendo.com/view/journals/popets/2020/3/article-p356.xml

  • Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving and Thomas Eisenbarth,
    ASAP: Algorithm Substitution Attacks on Cryptographic Protocols , IACR Cryptol. ePrint Arch. , vol. 2020, pp. 1452, 2020.
    Datei: https://eprint.iacr.org/2020/1452

  • 2019

  • Berk Gulmezoglu, Andreas Zankl, M. Caner Tol, Saad Islam, Thomas Eisenbarth and Berk Sunar,
    Undermining User Privacy on Mobile Devices Using AI in Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2019. pp. 214--227.
    DOI:10.1145/3321705.3329804
    ISBN:978-1-4503-6752-3
    Datei: http://doi.acm.org/10.1145/3321705.3329804

  • Saad Islam, Ahmad Moghimi, Ida Bruhns, Moritz Krebbel, Berk Gulmezoglu, Thomas Eisenbarth and Berk Sunar,
    SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks in 28th USENIX Security Symposium (USENIX Security 19) , Santa Clara, CA: USENIX Association, 2019.
    Datei: https://www.usenix.org/conference/usenixsecurity19/presentation/islam

  • Damien Desfontaines, Elisabeth Krahmer and Esfandiar Mohammadi,
    Passive and active attackers in noiseless privacy , CoRR , vol. abs/1905.00650, 2019.
    Datei: http://arxiv.org/abs/1905.00650

  • David Sommer, Sebastian Meiser and Esfandiar Mohammadi,
    Privacy Loss Classes: The Central Limit Theorem in Differential Privacy , Proceedings on Privacy Enhancing Technologies , vol. 2019, no. 2, pp. 245 - 269, 2019. Sciendo.
    DOI:https://doi.org/10.2478/popets-2019-0029
    Datei: https://content.sciendo.com/view/journals/popets/2019/2/article-p245.xml

  • David Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani and Srdjan Capkun,
    Deniable Upload and Download via Passive Participation in 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) , Boston, MA: USENIX Association, 2019. pp. 649--666.
    ISBN:978-1-931971-49-2
    Datei: https://www.usenix.org/conference/nsdi19/presentation/sommer

  • Berk Gulmezoglu, Ahmad Moghimi, Thomas Eisenbarth and Berk Sunar,
    FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning , arXiv e-prints , 2019.
    Datei: https://ui.adsabs.harvard.edu/abs/2019arXiv190703651G

  • 2018

  • Ahmad Moghimi, Jan Wichelmann, Thomas Eisenbarth and Berk Sunar,
    MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations , International Journal of Parallel Programming , 2018.
    Datei: https://doi.org/10.1007/s10766-018-0611-9

  • Marc Stelzner and Thomas Eisenbarth,
    IT Security in Lübeck - The design of a modern and future-proof security curriculum in 2018 12th European Workshop on Microelectronics Education (EWME) , 2018. pp. 79-82.
    DOI:10.1109/EWME.2018.8629494
    Datei: https://ieeexplore.ieee.org/document/8629494

  • Jan Wichelmann, Ahmad Moghimi, Thomas Eisenbarth and Berk Sunar,
    MicroWalk: A Framework for Finding Side Channels in Binaries in Proceedings of the 34th Annual Computer Security Applications Conference , New York, NY, USA: ACM, 2018. pp. 161--173.
    DOI:10.1145/3274694.3274741
    Datei: http://doi.acm.org/10.1145/3274694.3274741