Präsentationen und Vorträge

Präsentationen und Vorträge sind auf unserem Youtube-Kanal zusammengestellt.

Publikationen

2020

  • Luca Wilke, Jan Wichelmann, Mathias Morbitzer and Thomas Eisenbarth,
    SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions in 2020 IEEE Symposium on Security and Privacy (SP) , Los Alamitos, CA, USA: IEEE Computer Society, 2020. pp. 1431-1444.
    DOI:10.1109/SP40000.2020.00080
    Datei: https://uzl-its.github.io/SEVurity/

  • Samira Briongos, Pedro Malagon, Jose M. Moya and Thomas Eisenbarth,
    RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, 2020. pp. 1967--1984.
    ISBN:978-1-939133-17-5
    Datei: https://www.usenix.org/conference/usenixsecurity20/presentation/briongos

  • Max Bannach, Sebastian Berndt, Martin Schuster and Marcel Wienöbst,
    PACE Solver Description: PID (star) in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 28:1--28:4.

  • Max Bannach, Sebastian Berndt, Martin Schuster and Marcel Wienöbst,
    PACE Solver Description: Fluid in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 27:1--27:3.

  • Samira Briongos, Pedro Malag'on, Jose Manuel Moya and Thomas Eisenbarth,
    Microarchitectural Isolation Guarantees Through Execution Based Signatures in XXXV Conference on Design of Circuits and Integrated Systems, DCIS, 2020, Segovia, Spain, November 18-20, 2020 , IEEE, 2020. pp. 1--6.
    DOI:10.1109/DCIS51330.2020.9268660
    Datei: https://doi.org/10.1109/DCIS51330.2020.9268660

  • Zane Weissman, Thore Tiemann, Daniel Moghimi, Evan Custodio, Thomas Eisenbarth and Berk Sunar,
    JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms , IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2020, no. 3, pp. 169-195, 2020.
    DOI:10.13154/tches.v2020.i3.169-195
    Datei: https://tches.iacr.org/index.php/TCHES/article/view/8587

  • Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi and Aniket Kate,
    Comprehensive Anonymity Trilemma: User Coordination is not enough in Proceedings on Privacy Enhancing Technologies (PETS/PoPETS) 2020.3 , Sciendo, 2020.
    DOI:10.2478/popets-2020-0056
    Datei: https://content.sciendo.com/view/journals/popets/2020/3/article-p356.xml

  • Sebastian Berndt and Maciej Liskiewicz,
    On the universal steganography of optimal rate , Inf. Comput. , vol. 275, pp. 104632, 2020.

  • 2019

  • David Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani and Srdjan Capkun,
    Deniable Upload and Download via Passive Participation in 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) , Boston, MA: USENIX Association, 2019. pp. 649--666.
    ISBN:978-1-931971-49-2
    Datei: https://www.usenix.org/conference/nsdi19/presentation/sommer

  • Berk Gulmezoglu, Ahmad Moghimi, Thomas Eisenbarth and Berk Sunar,
    FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning , arXiv e-prints , 2019.
    Datei: https://ui.adsabs.harvard.edu/abs/2019arXiv190703651G

  • Damien Desfontaines, Elisabeth Krahmer and Esfandiar Mohammadi,
    Passive and active attackers in noiseless privacy , CoRR , vol. abs/1905.00650, 2019.
    Datei: http://arxiv.org/abs/1905.00650

  • David Sommer, Sebastian Meiser and Esfandiar Mohammadi,
    Privacy Loss Classes: The Central Limit Theorem in Differential Privacy , Proceedings on Privacy Enhancing Technologies , vol. 2019, no. 2, pp. 245 - 269, 2019. Sciendo.
    DOI:https://doi.org/10.2478/popets-2019-0029
    Datei: https://content.sciendo.com/view/journals/popets/2019/2/article-p245.xml

  • Saad Islam, Ahmad Moghimi, Ida Bruhns, Moritz Krebbel, Berk Gulmezoglu, Thomas Eisenbarth and Berk Sunar,
    SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks in 28th USENIX Security Symposium (USENIX Security 19) , Santa Clara, CA: USENIX Association, 2019. pp. 621--637.
    ISBN:978-1-939133-06-9
    Datei: https://www.usenix.org/conference/usenixsecurity19/presentation/islam

  • Berk Gulmezoglu, Andreas Zankl, M. Caner Tol, Saad Islam, Thomas Eisenbarth and Berk Sunar,
    Undermining User Privacy on Mobile Devices Using AI in Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2019. pp. 214--227.
    DOI:10.1145/3321705.3329804
    Datei: http://doi.acm.org/10.1145/3321705.3329804

  • 2018

  • Ahmad Moghimi, Jan Wichelmann, Thomas Eisenbarth and Berk Sunar,
    MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations , International Journal of Parallel Programming , 2018.
    Datei: https://doi.org/10.1007/s10766-018-0611-9

  • Marc Stelzner and Thomas Eisenbarth,
    IT Security in Lübeck - The design of a modern and future-proof security curriculum in 2018 12th European Workshop on Microelectronics Education (EWME) , 2018. pp. 79-82.
    DOI:10.1109/EWME.2018.8629494
    Datei: https://ieeexplore.ieee.org/document/8629494

  • Jan Wichelmann, Ahmad Moghimi, Thomas Eisenbarth and Berk Sunar,
    MicroWalk: A Framework for Finding Side Channels in Binaries in Proceedings of the 34th Annual Computer Security Applications Conference , New York, NY, USA: ACM, 2018. pp. 161--173.
    DOI:10.1145/3274694.3274741
    Datei: http://doi.acm.org/10.1145/3274694.3274741

  • Gorka Irazoqui, Thomas Eisenbarth and Berk Sunar,
    MASCAT: Preventing Microarchitectural Attacks Before Distribution in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018 , 2018. pp. 377--388.
    DOI:10.1145/3176258.3176316
    Datei: http://doi.acm.org/10.1145/3176258.3176316

  • Mehmet Sinan Inci, Thomas Eisenbarth and Berk Sunar,
    DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes , 2018.

  • Elke De Mulder, Thomas Eisenbarth and Patrick Schaumont,
    Identifying and Eliminating Side-Channel Leaks in Programmable Systems , IEEE Design Test , vol. 35, no. 1, pp. 74-89, 2018.
    DOI:10.1109/MDAT.2017.2766166

  • Okan Seker, Abraham Fernandez-Rubio, Thomas Eisenbarth and Rainer Steinwandt,
    Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks , IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2018, no. 3, pp. 394-430, 2018.
    DOI:10.13154/tches.v2018.i3.394-430
    Datei: https://tches.iacr.org/index.php/TCHES/article/view/7281

  • Samira Briongos, Gorka Irazoqui, Pedro Malagon and Thomas Eisenbarth,
    CacheShield: Detecting Cache Attacks through Self-Observation in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018 , 2018. pp. 224--235.
    DOI:10.1145/3176258.3176320
    Datei: http://doi.acm.org/10.1145/3176258.3176320

  • Fergus Dall, Gabrielle De Micheli, Thomas Eisenbarth, Daniel Genkin, Nadia Heninger, Ahmad Moghimi and Yuval Yarom,
    CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks , IACR Trans. Cryptogr. Hardw. Embed. Syst. , vol. 2018, no. 2, pp. 171--191, 2018.
    DOI:10.13154/tches.v2018.i2.171-191
    Datei: https://doi.org/10.13154/tches.v2018.i2.171-191

  • 2017

  • Samira Briongos, Gorka Irazoqui, Pedro Malagon and Thomas Eisenbarth,
    CacheShield: Protecting Legacy Processes Against Cache Attacks , 09 2017.
    Datei: https://arxiv.org/abs/1709.01795v1

  • Berk Gulmezoglu, Thomas Eisenbarth and Berk Sunar,
    Cache-Based Application Detection in the Cloud Using Machine Learning in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2017. pp. 288--300.
    ISBN:978-1-4503-4944-4
    Datei: http://doi.acm.org/10.1145/3052973.3053036