Präsentationen und Vorträge

Präsentationen und Vorträge sind auf unserem Youtube-Kanal zusammengestellt.

Publikationen

2021

Samira Briongos, Ida Bruhns, Pedro Malagón, Thomas Eisenbarth, and José Manuel Moya,
Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged Cache Attacks, in IEEE European Symposium on Security and Privacy, EuroS&P 2021 , IEEE, 2021. pp. 683-700.
DOI:10.1109/EuroSP51992.2021.00051
Weblink: https://doi.ieeecomputersociety.org/10.1109/EuroSP51992.2021.00051
Tim Gellersen, Okan Seker, and Thomas Eisenbarth,
Differential Power Analysis of the Picnic Signature Scheme, in Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings , Jung Hee Cheon and Jean-Pierre Tillich, Eds. Springer, 2021. pp. 177-194.
DOI:10.1007/978-3-030-81293-5_10
Datei: 978-3-030-81293-5_10
Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, and Aniket Kate,
Divide and Funnel: a Scaling Technique for Mix-Networks, IACR Cryptol. ePrint Arch. , pp. 1685, 2021.
Datei: 1685
Jan Wichelmann, Sebastian Berndt, Claudius Pott, and Thomas Eisenbarth,
Help, My Signal has Bad Device! - Breaking the Signal Messenger's Post-Compromise Security Through a Malicious Device, in Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings , Leyla Bilge and Lorenzo Cavallaro and Giancarlo Pellegrino and Nuno Neves, Eds. Springer, 2021. pp. 88-105.
DOI:10.1007/978-3-030-80825-9_5
Datei: 978-3-030-80825-9_5
David M. Sommer, Lukas Abfalterer, Sheila Zingg, and Esfandiar Mohammadi,
Learning Numeric Optimal Differentially Private Truncated Additive Mechanisms, CoRR , vol. abs/2107.12957, 2021.
Datei: 2107.12957
Sebastian Berndt, Max A. Deppert, Klaus Jansen, and Lars Rohwedder,
Load Balancing: The Long Road from Theory to Practice, CoRR , vol. abs/2107.13638, 2021.
Datei: 2107.13638
Ilia Polian, Frank Altmann, Tolga Arul, Christian Boit, Ralf Brederlow, Lucas Davi, Rolf Drechsler, Nan Du, Thomas Eisenbarth, Tim Güneysu, Sascha Hermann, Matthias Hiller, Rainer Leupers, Farhad Merchant, Thomas Mussenbrock, Stefan Katzenbeisser, Akash Kumar, Wolfgang Kunz, Thomas Mikolajick, Vivek Pachauri, Jean-Pierre Seifert, Frank Sill Torres, and Jens Trommer,
Nano Security: From Nano-Electronics to Secure Systems, in Design, Automation & Test in Europe Conference & Exhibition, DATE 2021, Grenoble, France, February 1-5, 2021 , IEEE, 2021. pp. 1334-1339.
DOI:10.23919/DATE51398.2021.9474187
Sebastian Berndt, Klaus Jansen, and Kim{-}Manuel Klein,
New Bounds for the Vertices of the Integer Hull, in 4th Symposium on Simplicity in Algorithms, {SOSA} 2021, Virtual Conference, January 11-12, 2021 , Hung Viet Le and Valerie King, Eds. {SIAM}, 2021. pp. 25--36.
DOI:10.1137/1.9781611976496.3
Datei: 1.9781611976496.3
Eike Petersen, Yannik Potdevin, Esfandiar Mohammadi, Stephan Zidowitz, Sabrina Breyer, Dirk Nowotka, Sandra Henn, Ludwig Pechmann, Martin Leucker, Philipp Rostalski, and Christian Herzog,
Responsible and Regulatory Conform Machine Learning for Medicine: A Survey of Technical Challenges and Solutions, CoRR , vol. abs/2107.09546, 2021.
Datei: 2107.09546
Sebastian Berndt, Kilian Grage, Klaus Jansen, Lukas Johannsen, and Maria Kosche,
Robust Online Algorithms for Dynamic Choosing Problems, in Connecting with Computability - 17th Conference on Computability in Europe, CiE 2021, Virtual Event, Ghent, July 5-9, 2021, Proceedings , Liesbeth De Mol and Andreas Weiermann and Florin Manea and David Fern{\'{a}}ndez{-}Duque, Eds. Springer, 2021. pp. 38--49.
DOI:10.1007/978-3-030-80049-9_4
Datei: 978-3-030-80049-9_4
Sebastian Berndt, Klaus Jansen, and Alexandra Lassota,
Tightness of Sensitivity and Proximity Bounds for Integer Linear Programs, in {SOFSEM} 2021: Theory and Practice of Computer Science - 47th International Conference on Current Trends in Theory and Practice of Computer Science, {SOFSEM} 2021, Bolzano-Bozen, Italy, January 25-29, 2021, Proceedings , Tom{\'{a}}s Bures and Riccardo Dondi and Johann Gamper and Giovanna Guerrini and Tomasz Jurdzinski and Claus Pahl and Florian Sikora and Prudence W. H. Wong, Eds. Springer, 2021. pp. 349--360.
DOI:10.1007/978-3-030-67731-2_25
Datei: 978-3-030-67731-2_25
Luca Wilke, Jan Wichelmann, Florian Sieck, and Thomas Eisenbarth,
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation, in 2021 IEEE Security and Privacy Workshops (SPW) , 2021. pp. 456-466.
DOI:10.1109/SPW53761.2021.00064
Weblink: https://doi.ieeecomputersociety.org/10.1109/SPW53761.2021.00064
Weblink: https://uzl-its.github.io/undeserved-trust/
Datei: undeSErVed-trust-paper.pdf
Florian Sieck, Sebastian Berndt, Jan Wichelmann, and Thomas Eisenbarth,
Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries, in CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security , Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi, Eds. ACM, 2021. pp. 2456-2473.
DOI:10.1145/3460120.3484783
Datei: 3460120.3484783

2020

Samira Briongos, Pedro Malagon, Jose M. Moya, and Thomas Eisenbarth,
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks, in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, Aug.2020. pp. 1967-1984.
ISBN:978-1-939133-17-5
Datei: briongos
Daniel Moghimi, Berk Sunar, Thomas Eisenbarth, and Nadia Heninger,
TPM-FAIL: TPM meets Timing and Lattice Attacks, in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, Aug.2020. pp. 2057-2073.
ISBN:978-1-939133-17-5
Weblink: https://tpm.fail/
Datei: moghimi-tpm
Zane Weissman, Thore Tiemann, Daniel Moghimi, Evan Custodio, Thomas Eisenbarth, and Berk Sunar,
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2020, no. 3, pp. 169-195, Jun. 2020.
DOI:10.13154/tches.v2020.i3.169-195
Datei: Dateilink
Bibtex: BibTeX
@article{weissman2020jackhammer,
  author       = {Zane Weissman and
                  Thore Tiemann and
                  Daniel Moghimi and
                  Evan Custodio and
                  Thomas Eisenbarth and
                  Berk Sunar},
  title        = {JackHammer: Efficient Rowhammer on Heterogeneous {FPGA-CPU} Platforms},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {169--195},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.169-195},
  doi          = {10.13154/TCHES.V2020.I3.169-195}
}
Luca Wilke, Jan Wichelmann, Mathias Morbitzer, and Thomas Eisenbarth,
SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions, in 2020 IEEE Symposium on Security and Privacy (SP) , Los Alamitos, CA, USA: IEEE Computer Society, Mai2020. pp. 1431-1444.
DOI:10.1109/SP40000.2020.00080
Weblink: https://uzl-its.github.io/SEVurity/
Weblink: https://doi.ieeecomputersociety.org/10.1109/SP40000.2020.00080
Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, and Aniket Kate,
Comprehensive Anonymity Trilemma: User Coordination is not enough, in Proceedings on Privacy Enhancing Technologies (PETS/PoPETS) 2020.3 , Sciendo, 2020.
DOI:10.2478/popets-2020-0056
Datei: article-p356.xml
Samira Briongos, Pedro Malag'on, Jose Manuel Moya, and Thomas Eisenbarth,
Microarchitectural Isolation Guarantees Through Execution Based Signatures, in XXXV Conference on Design of Circuits and Integrated Systems, DCIS, 2020, Segovia, Spain, November 18-20, 2020 , IEEE, 2020. pp. 1-6.
DOI:10.1109/DCIS51330.2020.9268660
Datei: DCIS51330.2020.9268660
Sebastian Berndt, and Maciej Liskiewicz,
On the universal steganography of optimal rate, Inf. Comput. , vol. 275, pp. 104632, 2020.
Max Bannach, Sebastian Berndt, Martin Schuster, and Marcel Wienöbst,
PACE Solver Description: Fluid, in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 27:1--27:3.
Max Bannach, Sebastian Berndt, Martin Schuster, and Marcel Wienöbst,
PACE Solver Description: PID (star), in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 28:1--28:4.
Okan Seker, Sebastian Berndt, Luca Wilke, and Thomas Eisenbarth,
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis, in CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security , Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna, Eds. ACM, 2020. pp. 1033-1049.
DOI:10.1145/3372297.3417889
Datei: 3372297.3417889
Max Bannach, Sebastian Berndt, Marten Maack, Matthias Mnich, Alexandra Lassota, Malin Rau, and Malte Skambath,
Solving Packing Problems with Few Small Items Using Rainbow Matchings, in MFCS 2020 , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020.

2019

David Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, and Srdjan Capkun,
Deniable Upload and Download via Passive Participation, in 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) , Boston, MA: USENIX Association, Feb.2019. pp. 649--666.
ISBN:978-1-931971-49-2
Datei: sommer