Präsentationen und Vorträge

Präsentationen und Vorträge sind auf unserem Youtube-Kanal zusammengestellt.

Publikationen

2024

Nils Loose, Felix Mächtle, Florian Sieck, and Thomas Eisenbarth,
SWAT: Modular Dynamic Symbolic Execution for Java Applications using Dynamic Instrumentation (Competition Contribution), in Tools and Algorithms for the Construction and Analysis of Systems - 30th International Conference, TACAS 2024, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024, Luxembourg City, Luxembourg, April 6-11, 2024, Proceedings, Part III , Bernd Finkbeiner and Laura Kovács, Eds. Springer, 2024. pp. 399-405.
DOI:10.1007/978-3-031-57256-2_28
Datei: 978-3-031-57256-2_28

2023

Florian Sieck, Zhiyuan Zhang, Sebastian Berndt, Chitchanok Chuengsatiansup, Thomas Eisenbarth, and Yuval Yarom,
TeeJam: Sub-Cache-Line Leakages Strike Back, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , Dez.2023. pp. 457-500.
DOI:10.46586/tches.v2024.i1.457-500
Weblink: https://tches.iacr.org/index.php/TCHES/article/view/11259
Bibtex: BibTeX
@article{Sieck_Zhang_Berndt_Chuengsatiansup_Eisenbarth_Yarom_2023, 
title={TeeJam: Sub-Cache-Line Leakages Strike Back}, 
volume={2024}, 
url={https://tches.iacr.org/index.php/TCHES/article/view/11259}, 
DOI={10.46586/tches.v2024.i1.457-500}, 
number={1}, 
journal={IACR Transactions on Cryptographic Hardware and Embedded Systems}, 
author={Sieck, Florian and Zhang, Zhiyuan and Berndt, Sebastian and Chuengsatiansup, Chitchanok and Eisenbarth, Thomas and Yarom, Yuval}, 
year={2023}, 
month={Dec.}, 
pages={457–500} 
}
Andrija Neskovic, Saleh Mulhem, Alexander Treff, Rainer Buchty, Thomas Eisenbarth, and Mladen Berekovic,
SystemC Model of Power Side-Channel Attacks Against AI Accelerators: Superstition or not?, in 2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD) , IEEE/ACM, Nov.2023. pp. 1-8.
DOI:10.1109/ICCAD57390.2023.10323687
Weblink: https://arxiv.org/abs/2311.13387
Thore Tiemann, Zane Weissman, Thomas Eisenbarth, and Berk Sunar,
IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems, in Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2023 , Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik, Eds. ACM, Jul.2023. pp. 827-840.
DOI:10.1145/3579856.3582838
Weblink: https://arxiv.org/abs/2202.11623
Datei: Dateilink
Bibtex: BibTeX
@inproceedings{tiemann2023iotlbsc,
  author       = {Thore Tiemann and
                  Zane Weissman and
                  Thomas Eisenbarth and
                  Berk Sunar},
  editor       = {Joseph K. Liu and
                  Yang Xiang and
                  Surya Nepal and
                  Gene Tsudik},
  title        = {{IOTLB-SC:} An Accelerator-Independent Leakage Source in Modern Cloud
                  Systems},
  booktitle    = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
                  2023},
  pages        = {827--840},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579856.3582838},
  doi          = {10.1145/3579856.3582838}
}
Thore Tiemann, Sebastian Berndt, Thomas Eisenbarth, and Maciej Liskiewicz,
"Act natural!": Exchanging Private Messages on Public Blockchains, in 8th IEEE European Symposium on Security and Privacy, EuroS&P 2023 , IEEE, 2023. pp. 292-308.
DOI:10.1109/EuroSP57164.2023.00026
Weblink: https://doi.ieeecomputersociety.org/10.1109/EuroSP57164.2023.00026
Weblink: https://eprint.iacr.org/2021/1073
Datei: Dateilink
Bibtex: BibTeX
@inproceedings{tiemann2023actnatural,
  author       = {Thore Tiemann and
                  Sebastian Berndt and
                  Thomas Eisenbarth and
                  Maciej Liskiewicz},
  title        = {"Act natural!": Exchanging Private Messages on Public Blockchains},
  booktitle    = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023, Delft, Netherlands, July 3-7, 2023},
  pages        = {292--308},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSP57164.2023.00026},
  doi          = {10.1109/EUROSP57164.2023.00026}
}
Jan Wichelmann, Anna Pätschke, Luca Wilke, and Thomas Eisenbarth,
Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software, in 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023 , Joseph A. Calandrino and Carmela Troncoso, Eds. USENIX Association, 2023. pp. 6789-6806.
DOI:10.48550/arXiv.2210.13124
Datei: wichelmann
Sebastian Berndt, Thomas Eisenbarth, Sebastian Faust, Marc Gourjon, Maximilian Orlt, and Okan Seker,
Combined Fault and Leakage Resilience: Composability, Constructions and Compiler, in Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part III , Helena Handschuh and Anna Lysyanskaya, Eds. Cham: Springer, 2023. pp. 377-409.
DOI:10.1007/978-3-031-38548-3_13
ISBN:978-3-031-38548-3
Datei: 978-3-031-38548-3_13
Nils Loose, Felix Mächtle, Claudius Pott, Volodymyr Bezsmertnyi, and Thomas Eisenbarth,
Madvex: Instrumentation-based Adversarial Attacks on Machine Learning Malware Detection, in Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) - 20th International Conference , Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati, Eds. Springer, 2023. pp. 69-88.
DOI:10.1007/978-3-031-35504-2_4
Weblink: https://arxiv.org/abs/2305.02559
Jan Wichelmann, Christopher Peredy, Florian Sieck, Anna Pätschke, and Thomas Eisenbarth,
MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V, in Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) - 20th International Conference , Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati, Eds. Springer, 2023. pp. 3-23.
DOI:10.1007/978-3-031-35504-2_1
Weblink: https://arxiv.org/abs/2305.00584
Claudius Pott, Berk Gulmezoglu, and Thomas Eisenbarth,
Overcoming the Pitfalls of HPC-based Cryptojacking Detection in Presence of GPUs, in Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2023, Charlotte, NC, USA, April 24-26, 2023 , Mohamed Shehab and Maribel Fernandez and Ninghui Li, Eds. ACM, 2023. pp. 177-188.
DOI:10.1145/3577923.3583655
Datei: 3577923.3583655
Pascal Bemmann, Sebastian Berndt, Denis Diemert, Thomas Eisenbarth, and Tibor Jager,
Subversion-Resilient Authenticated Encryption Without Random Oracles, in Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part II , Mehdi Tibouchi and Xiaofeng Wang, Eds. Springer, 2023. pp. 460-483.
DOI:10.1007/978-3-031-33491-7_17
Datei: 978-3-031-33491-7_17

2022

Moritz Kirschte, Sebastian Meiser, Saman Ardalan, and Esfandiar Mohammadi,
Distributed DP-Helmet: Scalable Differentially Private Non-interactive Averaging of Single Layers, arXiv , Nov. 2022.
DOI:10.48550/arXiv.2211.02003
Datei: 2211.02003
Mengyuan Li, Luca Wilke, Jan Wichelmann, Thomas Eisenbarth, Radu Teodorescu, and Yinqian Zhang,
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP, in 2022 IEEE Symposium on Security and Privacy (SP) , San Francisco, CA, USA: IEEE, Mai2022. pp. 337-351.
DOI:10.1109/SP46214.2022.9833768
Weblink: https://doi.ieeecomputersociety.org/10.1109/SP46214.2022.9833768
Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving, and Thomas Eisenbarth,
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols, in Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security , ACM, 2022. pp. 712-726.
DOI:10.1145/3488932.3517387
ISBN:9781450391405
Datei: 3488932.3517387
Jan Wichelmann, Florian Sieck, Anna Pätschke, and Thomas Eisenbarth,
Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications, in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022 , Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi, Eds. ACM, 2022. pp. 2915-2929.
DOI:10.1145/3548606.3560654
Datei: 3548606.3560654

2021

Diego F. Aranha, Sebastian Berndt, Thomas Eisenbarth, Okan Seker, Akira Takahashi, Luca Wilke, and Greg Zaverucha,
Side-Channel Protections for Picnic Signatures, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 4, pp. 239-282, Aug. 2021.
DOI:10.46586/tches.v2021.i4.239-282
Datei: 9066
Claudius Pott, Philipp Jungklass, David Jacek Csejka, Thomas Eisenbarth, and Marco Siebert,
Firmware Security Module: A Framework for Trusted Computing in Automotive Multiprocessors, Journal of Hardware and Systems Security , pp. 103-113, Apr. 2021.
DOI:10.1007/s41635-021-00114-4
Datei: s41635-021-00114-4
Okan Seker, Thomas Eisenbarth, and Maciej Liskiewicz,
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 2, pp. 61-105, Feb. 2021. Cryptology ePrint Archive, Report 2020/443.
DOI:10.46586/tches.v2021.i2.61-105
Datei: 8788
Johannes Müller, Mohammad Rahmani Fadiheh, Anna Lena Duque Antón, Thomas Eisenbarth, Dominik Stoffel, and Wolfgang Kunz,
A Formal Approach to Confidentiality Verification in SoCs at the Register Transfer Level, in 58th ACM/IEEE Design Automation Conference, DAC 2021, San Francisco, CA, USA, December 5-9, 2021 , IEEE, 2021. pp. 991-996.
DOI:10.1109/DAC18074.2021.9586248
Datei: DAC18074.2021.9586248
Samira Briongos, Ida Bruhns, Pedro Malagón, Thomas Eisenbarth, and José Manuel Moya,
Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged Cache Attacks, in IEEE European Symposium on Security and Privacy, EuroS&P 2021 , IEEE, 2021. pp. 683-700.
DOI:10.1109/EuroSP51992.2021.00051
Weblink: https://doi.ieeecomputersociety.org/10.1109/EuroSP51992.2021.00051
Tim Gellersen, Okan Seker, and Thomas Eisenbarth,
Differential Power Analysis of the Picnic Signature Scheme, in Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings , Jung Hee Cheon and Jean-Pierre Tillich, Eds. Springer, 2021. pp. 177-194.
DOI:10.1007/978-3-030-81293-5_10
Datei: 978-3-030-81293-5_10
Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, and Aniket Kate,
Divide and Funnel: a Scaling Technique for Mix-Networks, IACR Cryptol. ePrint Arch. , pp. 1685, 2021.
Datei: 1685
Jan Wichelmann, Sebastian Berndt, Claudius Pott, and Thomas Eisenbarth,
Help, My Signal has Bad Device! - Breaking the Signal Messenger's Post-Compromise Security Through a Malicious Device, in Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings , Leyla Bilge and Lorenzo Cavallaro and Giancarlo Pellegrino and Nuno Neves, Eds. Springer, 2021. pp. 88-105.
DOI:10.1007/978-3-030-80825-9_5
Datei: 978-3-030-80825-9_5
David M. Sommer, Lukas Abfalterer, Sheila Zingg, and Esfandiar Mohammadi,
Learning Numeric Optimal Differentially Private Truncated Additive Mechanisms, CoRR , vol. abs/2107.12957, 2021.
Datei: 2107.12957
Sebastian Berndt, Max A. Deppert, Klaus Jansen, and Lars Rohwedder,
Load Balancing: The Long Road from Theory to Practice, CoRR , vol. abs/2107.13638, 2021.
Datei: 2107.13638