Publikationen

2018

  • Gorka Irazoqui, Thomas Eisenbarth and Berk Sunar,
    MASCAT: Preventing Microarchitectural Attacks Before Distribution in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018 , 2018. pp. 377--388.
    DOI:10.1145/3176258.3176316
    Datei: http://doi.acm.org/10.1145/3176258.3176316

  • Elke De Mulder, Thomas Eisenbarth and Patrick Schaumont,
    Identifying and Eliminating Side-Channel Leaks in Programmable Systems , IEEE Design Test , vol. 35, no. 1, pp. 74-89, 2018.
    DOI:10.1109/MDAT.2017.2766166

  • Okan Seker, Abraham Fernandez-Rubio, Thomas Eisenbarth and Rainer Steinwandt,
    Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks , IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2018, no. 3, pp. 394-430, 2018.
    DOI:10.13154/tches.v2018.i3.394-430
    Datei: https://tches.iacr.org/index.php/TCHES/article/view/7281

  • Mehmet Sinan Inci, Thomas Eisenbarth and Berk Sunar,
    DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes , 2018.

  • Samira Briongos, Gorka Irazoqui, Pedro Malagon and Thomas Eisenbarth,
    CacheShield: Detecting Cache Attacks through Self-Observation in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018 , 2018. pp. 224--235.
    DOI:10.1145/3176258.3176320
    Datei: http://doi.acm.org/10.1145/3176258.3176320

  • Fergus Dall, Gabrielle De Micheli, Thomas Eisenbarth, Daniel Genkin, Nadia Heninger, Ahmad Moghimi and Yuval Yarom,
    CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks , IACR Trans. Cryptogr. Hardw. Embed. Syst. , vol. 2018, no. 2, pp. 171--191, 2018.
    DOI:10.13154/tches.v2018.i2.171-191
    Datei: https://doi.org/10.13154/tches.v2018.i2.171-191

  • 2017

  • Samira Briongos, Gorka Irazoqui, Pedro Malagon and Thomas Eisenbarth,
    CacheShield: Protecting Legacy Processes Against Cache Attacks , 09 2017.
    Datei: https://arxiv.org/abs/1709.01795v1

  • Berk Gulmezoglu, Thomas Eisenbarth and Berk Sunar,
    Cache-Based Application Detection in the Cloud Using Machine Learning in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2017. pp. 288--300.
    ISBN:978-1-4503-4944-4
    Datei: http://doi.acm.org/10.1145/3052973.3053036

  • Ahmad Moghimi, Gorka Irazoqui and Thomas Eisenbarth,
    CacheZoom: How SGX Amplifies the Power of Cache Attacks in Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings , 2017. pp. 69--90.
    Datei: https://doi.org/10.1007/978-3-319-66787-4_4

  • Gorka Irazoqui, Kai Cong, Xiaofei Guo, Hareesh Khattri, Arun Kanuparthi, Thomas Eisenbarth and Berk Sunar,
    Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries , CoRR , vol. abs/1709.01552, 2017.
    Datei: http://arxiv.org/abs/1709.01552

  • Berk Gulmezoglu, Andreas Zankl, Thomas Eisenbarth and Berk Sunar,
    PerfWeb: How to Violate Web Privacy with Hardware Performance Events in Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II , 2017. pp. 80--97.
    Datei: https://doi.org/10.1007/978-3-319-66399-9_5

  • Michael Moukarzel, Thomas Eisenbarth and Berk Sunar,
    uLeech: A side-channel evaluation platform for IoT in 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS) , 2017. pp. 25-28.
    DOI:10.1109/MWSCAS.2017.8052851
    Datei: https://ieeexplore.ieee.org/abstract/document/8052851