Präsentationen und Vorträge

Präsentationen und Vorträge sind auf unserem Youtube-Kanal zusammengestellt.

Publikationen

2023

  • Thore Tiemann, Zane Weissman, Thomas Eisenbarth and Berk Sunar,
    IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems in Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security , ACM, 2023.

  • 2022

  • Moritz Kirschte, Sebastian Meiser, Saman Ardalan and Esfandiar Mohammadi,
    Single SMPC Invocation DPHelmet: Differentially Private Distributed Learning on a Large Scale , arXiv , Nov. 2022.
    DOI:10.48550/ARXIV.2211.02003
    Datei: https://arxiv.org/abs/2211.02003

  • Jan Wichelmann, Florian Sieck, Anna Pätschke and Thomas Eisenbarth,
    Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022 , Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi, Eds. ACM, 2022. pp. 2915--2929.
    DOI:10.1145/3548606.3560654
    Datei: https://doi.org/10.1145/3548606.3560654

  • Mengyuan Li, Luca Wilke, Jan Wichelmann, Thomas Eisenbarth, Radu Teodorescu and Yinqian Zhang,
    A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP in 2022 2022 IEEE Symposium on Security and Privacy (SP) (SP) , Los Alamitos, CA, USA: IEEE Computer Society, 2022. pp. 1541-1541.
    DOI:10.1109/SP46214.2022.00112
    Datei: https://doi.ieeecomputersociety.org/10.1109/SP46214.2022.00112

  • Jan Wichelmann, Anna Pätschke, Luca Wilke and Thomas Eisenbarth,
    Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software , arXiv e-prints , 2022. https://arxiv.org/abs/2210.13124 .
    DOI:https://doi.org/10.48550/arXiv.2210.13124
    Weblink: https://arxiv.org/abs/2210.13124

  • Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving and Thomas Eisenbarth,
    ASAP: Algorithm Substitution Attacks on Cryptographic Protocols in Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security , ACM, 2022. pp. 712-726.
    DOI:10.1145/3488932.3517387
    ISBN:9781450391405
    Datei: https://dl.acm.org/doi/pdf/10.1145/3488932.3517387

  • 2021

  • Sebastian Berndt, Max A. Deppert, Klaus Jansen and Lars Rohwedder,
    Load Balancing: The Long Road from Theory to Practice , CoRR , vol. abs/2107.13638, 2021.
    Datei: https://arxiv.org/abs/2107.13638

  • Florian Sieck, Sebastian Berndt, Jan Wichelmann and Thomas Eisenbarth,
    Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries in CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security , Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi, Eds. ACM, 2021. pp. 2456--2473.
    DOI:10.1145/3460120.3484783
    Datei: https://doi.org/10.1145/3460120.3484783

  • Luca Wilke, Jan Wichelmann, Florian Sieck and Thomas Eisenbarth,
    undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation in 2021 IEEE Security and Privacy Workshops (SPW) , 2021. pp. 456-466.
    DOI:10.1109/SPW53761.2021.00064
    Datei: https://uzl-its.github.io/undeserved-trust/

  • Sebastian Berndt, Klaus Jansen and Alexandra Lassota,
    Tightness of Sensitivity and Proximity Bounds for Integer Linear Programs in {SOFSEM} 2021: Theory and Practice of Computer Science - 47th International Conference on Current Trends in Theory and Practice of Computer Science, {SOFSEM} 2021, Bolzano-Bozen, Italy, January 25-29, 2021, Proceedings , Tom{\'{a}}s Bures and Riccardo Dondi and Johann Gamper and Giovanna Guerrini and Tomasz Jurdzinski and Claus Pahl and Florian Sikora and Prudence W. H. Wong, Eds. Springer, 2021. pp. 349--360.
    DOI:10.1007/978-3-030-67731-2_25
    Datei: https://doi.org/10.1007/978-3-030-67731-2_25

  • Diego F. Aranha, Sebastian Berndt, Thomas Eisenbarth, Okan Seker, Akira Takahashi, Luca Wilke and Greg Zaverucha,
    Side-Channel Protections for Picnic Signatures , IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 4, pp. 239-282, 2021.
    DOI:10.46586/tches.v2021.i4.239-282
    Datei: https://tches.iacr.org/index.php/TCHES/article/view/9066

  • Sebastian Berndt, Kilian Grage, Klaus Jansen, Lukas Johannsen and Maria Kosche,
    Robust Online Algorithms for Dynamic Choosing Problems in Connecting with Computability - 17th Conference on Computability in Europe, CiE 2021, Virtual Event, Ghent, July 5-9, 2021, Proceedings , Liesbeth De Mol and Andreas Weiermann and Florin Manea and David Fern{\'{a}}ndez{-}Duque, Eds. Springer, 2021. pp. 38--49.
    DOI:10.1007/978-3-030-80049-9_4
    Datei: https://doi.org/10.1007/978-3-030-80049-9_4

  • Eike Petersen, Yannik Potdevin, Esfandiar Mohammadi, Stephan Zidowitz, Sabrina Breyer, Dirk Nowotka, Sandra Henn, Ludwig Pechmann, Martin Leucker, Philipp Rostalski and Christian Herzog,
    Responsible and Regulatory Conform Machine Learning for Medicine: A Survey of Technical Challenges and Solutions , CoRR , vol. abs/2107.09546, 2021.
    Datei: https://arxiv.org/abs/2107.09546

  • Sebastian Berndt, Klaus Jansen and Kim{-}Manuel Klein,
    New Bounds for the Vertices of the Integer Hull in 4th Symposium on Simplicity in Algorithms, {SOSA} 2021, Virtual Conference, January 11-12, 2021 , Hung Viet Le and Valerie King, Eds. {SIAM}, 2021. pp. 25--36.
    DOI:10.1137/1.9781611976496.3
    Datei: https://doi.org/10.1137/1.9781611976496.3

  • Ilia Polian, Frank Altmann, Tolga Arul, Christian Boit, Ralf Brederlow, Lucas Davi, Rolf Drechsler, Nan Du, Thomas Eisenbarth, Tim Güneysu, Sascha Hermann, Matthias Hiller, Rainer Leupers, Farhad Merchant, Thomas Mussenbrock, Stefan Katzenbeisser, Akash Kumar, Wolfgang Kunz, Thomas Mikolajick, Vivek Pachauri, Jean-Pierre Seifert, Frank Sill Torres and Jens Trommer,
    Nano Security: From Nano-Electronics to Secure Systems in Design, Automation & Test in Europe Conference & Exhibition, DATE 2021, Grenoble, France, February 1-5, 2021 , IEEE, 2021. pp. 1334--1339.
    DOI:10.23919/DATE51398.2021.9474187
    Datei: https://doi.org/10.23919/DATE51398.2021.9474187

  • Jan Wichelmann, Sebastian Berndt, Claudius Pott and Thomas Eisenbarth,
    Help, My Signal has Bad Device! - Breaking the Signal Messenger's Post-Compromise Security Through a Malicious Device in Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings , Leyla Bilge and Lorenzo Cavallaro and Giancarlo Pellegrino and Nuno Neves, Eds. Springer, 2021. pp. 88--105.
    DOI:10.1007/978-3-030-80825-9_5
    Datei: https://doi.org/10.1007/978-3-030-80825-9_5

  • Claudius Pott, Philipp Jungklass, David Jacek Csejka, Thomas Eisenbarth and Marco Siebert,
    Firmware Security Module: A Framework for Trusted Computing in Automotive Multiprocessors , Journal of Hardware and Systems Security , 2021.
    DOI:10.1007/s41635-021-00114-4
    Datei: https://doi.org/10.1007/s41635-021-00114-4

  • Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi and Aniket Kate,
    Divide and Funnel: a Scaling Technique for Mix-Networks , IACR Cryptol. ePrint Arch. , pp. 1685, 2021.
    Datei: https://eprint.iacr.org/2021/1685

  • Tim Gellersen, Okan Seker and Thomas Eisenbarth,
    Differential Power Analysis of the Picnic Signature Scheme in Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings , Jung Hee Cheon and Jean-Pierre Tillich, Eds. Springer, 2021. pp. 177--194.
    DOI:10.1007/978-3-030-81293-5_10
    Datei: https://doi.org/10.1007/978-3-030-81293-5_10

  • Samira Briongos, Ida Bruhns, Pedro Malagón, Thomas Eisenbarth and José Manuel Moya,
    Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged Cache Attacks in IEEE European Symposium on Security and Privacy, EuroS&P 2021, Vienna, Austria, September 6-10, 2021 , IEEE, 2021. pp. 683--700.
    DOI:10.1109/EuroSP51992.2021.00051
    Datei: https://doi.org/10.1109/EuroSP51992.2021.00051

  • Okan Seker, Thomas Eisenbarth and Maciej Liskiewicz,
    A White-Box Masking Scheme Resisting Computational and Algebraic Attacks , IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 2, pp. 61-105, 2021. Cryptology ePrint Archive, Report 2020/443.
    DOI:10.46586/tches.v2021.i2.61-105
    Datei: https://tches.iacr.org/index.php/TCHES/article/view/8788

  • Johannes Müller, Mohammad Rahmani Fadiheh, Anna Lena Duque Antón, Thomas Eisenbarth, Dominik Stoffel and Wolfgang Kunz,
    A Formal Approach to Confidentiality Verification in SoCs at the Register Transfer Level in 58th ACM/IEEE Design Automation Conference, DAC 2021, San Francisco, CA, USA, December 5-9, 2021 , IEEE, 2021. pp. 991--996.
    DOI:10.1109/DAC18074.2021.9586248
    Datei: https://doi.org/10.1109/DAC18074.2021.9586248

  • Thore Tiemann, Sebastian Berndt, Thomas Eisenbarth and Maciej Liskiewicz,
    "Act natural!": Having a Private Chat on a Public Blockchain , IACR Cryptol. ePrint Arch. , vol. 2021, pp. 1073, 2021.
    Datei: https://eprint.iacr.org/2021/1073

  • David M. Sommer, Lukas Abfalterer, Sheila Zingg and Esfandiar Mohammadi,
    Learning Numeric Optimal Differentially Private Truncated Additive Mechanisms , CoRR , vol. abs/2107.12957, 2021.
    Datei: https://arxiv.org/abs/2107.12957

  • 2020

  • Samira Briongos, Pedro Malagon, Jose M. Moya and Thomas Eisenbarth,
    RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, 2020. pp. 1967--1984.
    ISBN:978-1-939133-17-5
    Datei: https://www.usenix.org/conference/usenixsecurity20/presentation/briongos