Präsentationen und Vorträge
Präsentationen und Vorträge sind auf unserem Youtube-Kanal zusammengestellt.
Publikationen
2021
Sebastian
Berndt,
Kilian
Grage,
Klaus
Jansen,
Lukas
Johannsen, and
Maria
Kosche,
Robust Online Algorithms for Dynamic Choosing Problems, in Connecting with Computability - 17th Conference on Computability in Europe, CiE 2021, Virtual Event, Ghent, July 5-9, 2021, Proceedings , Liesbeth De Mol and Andreas Weiermann and Florin Manea and David Fern{\'{a}}ndez{-}Duque, Eds. Springer, 2021. pp. 38--49.
Robust Online Algorithms for Dynamic Choosing Problems, in Connecting with Computability - 17th Conference on Computability in Europe, CiE 2021, Virtual Event, Ghent, July 5-9, 2021, Proceedings , Liesbeth De Mol and Andreas Weiermann and Florin Manea and David Fern{\'{a}}ndez{-}Duque, Eds. Springer, 2021. pp. 38--49.
DOI: | 10.1007/978-3-030-80049-9_4 |
Datei: | 978-3-030-80049-9_4 |
Eike
Petersen,
Yannik
Potdevin,
Esfandiar
Mohammadi,
Stephan
Zidowitz,
Sabrina
Breyer,
Dirk
Nowotka,
Sandra
Henn,
Ludwig
Pechmann,
Martin
Leucker,
Philipp
Rostalski, and
Christian
Herzog,
Responsible and Regulatory Conform Machine Learning for Medicine: A Survey of Technical Challenges and Solutions, CoRR , vol. abs/2107.09546, 2021.
Responsible and Regulatory Conform Machine Learning for Medicine: A Survey of Technical Challenges and Solutions, CoRR , vol. abs/2107.09546, 2021.
Datei: | 2107.09546 |
Sebastian
Berndt,
Klaus
Jansen, and
Kim{-}Manuel
Klein,
New Bounds for the Vertices of the Integer Hull, in 4th Symposium on Simplicity in Algorithms, {SOSA} 2021, Virtual Conference, January 11-12, 2021 , Hung Viet Le and Valerie King, Eds. {SIAM}, 2021. pp. 25--36.
New Bounds for the Vertices of the Integer Hull, in 4th Symposium on Simplicity in Algorithms, {SOSA} 2021, Virtual Conference, January 11-12, 2021 , Hung Viet Le and Valerie King, Eds. {SIAM}, 2021. pp. 25--36.
DOI: | 10.1137/1.9781611976496.3 |
Datei: | 1.9781611976496.3 |
Sebastian
Berndt,
Klaus
Jansen, and
Alexandra
Lassota,
Tightness of Sensitivity and Proximity Bounds for Integer Linear Programs, in {SOFSEM} 2021: Theory and Practice of Computer Science - 47th International Conference on Current Trends in Theory and Practice of Computer Science, {SOFSEM} 2021, Bolzano-Bozen, Italy, January 25-29, 2021, Proceedings , Tom{\'{a}}s Bures and Riccardo Dondi and Johann Gamper and Giovanna Guerrini and Tomasz Jurdzinski and Claus Pahl and Florian Sikora and Prudence W. H. Wong, Eds. Springer, 2021. pp. 349--360.
Tightness of Sensitivity and Proximity Bounds for Integer Linear Programs, in {SOFSEM} 2021: Theory and Practice of Computer Science - 47th International Conference on Current Trends in Theory and Practice of Computer Science, {SOFSEM} 2021, Bolzano-Bozen, Italy, January 25-29, 2021, Proceedings , Tom{\'{a}}s Bures and Riccardo Dondi and Johann Gamper and Giovanna Guerrini and Tomasz Jurdzinski and Claus Pahl and Florian Sikora and Prudence W. H. Wong, Eds. Springer, 2021. pp. 349--360.
DOI: | 10.1007/978-3-030-67731-2_25 |
Datei: | 978-3-030-67731-2_25 |
Sebastian
Berndt,
Max A.
Deppert,
Klaus
Jansen, and
Lars
Rohwedder,
Load Balancing: The Long Road from Theory to Practice, CoRR , vol. abs/2107.13638, 2021.
Load Balancing: The Long Road from Theory to Practice, CoRR , vol. abs/2107.13638, 2021.
Datei: | 2107.13638 |
Jan
Wichelmann,
Sebastian
Berndt,
Claudius
Pott, and
Thomas
Eisenbarth,
Help, My Signal has Bad Device! - Breaking the Signal Messenger's Post-Compromise Security Through a Malicious Device, in Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings , Leyla Bilge and Lorenzo Cavallaro and Giancarlo Pellegrino and Nuno Neves, Eds. Springer, 2021. pp. 88--105.
Help, My Signal has Bad Device! - Breaking the Signal Messenger's Post-Compromise Security Through a Malicious Device, in Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings , Leyla Bilge and Lorenzo Cavallaro and Giancarlo Pellegrino and Nuno Neves, Eds. Springer, 2021. pp. 88--105.
DOI: | 10.1007/978-3-030-80825-9_5 |
Datei: | 978-3-030-80825-9_5 |
Claudius
Pott,
Philipp
Jungklass,
David Jacek
Csejka,
Thomas
Eisenbarth, and
Marco
Siebert,
Firmware Security Module: A Framework for Trusted Computing in Automotive Multiprocessors, Journal of Hardware and Systems Security , 2021.
Firmware Security Module: A Framework for Trusted Computing in Automotive Multiprocessors, Journal of Hardware and Systems Security , 2021.
DOI: | 10.1007/s41635-021-00114-4 |
Datei: | s41635-021-00114-4 |
Debajyoti
Das,
Sebastian
Meiser,
Esfandiar
Mohammadi, and
Aniket
Kate,
Divide and Funnel: a Scaling Technique for Mix-Networks, IACR Cryptol. ePrint Arch. , pp. 1685, 2021.
Divide and Funnel: a Scaling Technique for Mix-Networks, IACR Cryptol. ePrint Arch. , pp. 1685, 2021.
Datei: | 1685 |
Tim
Gellersen,
Okan
Seker, and
Thomas
Eisenbarth,
Differential Power Analysis of the Picnic Signature Scheme, in Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings , Jung Hee Cheon and Jean-Pierre Tillich, Eds. Springer, 2021. pp. 177--194.
Differential Power Analysis of the Picnic Signature Scheme, in Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings , Jung Hee Cheon and Jean-Pierre Tillich, Eds. Springer, 2021. pp. 177--194.
DOI: | 10.1007/978-3-030-81293-5_10 |
Datei: | 978-3-030-81293-5_10 |
Samira
Briongos,
Ida
Bruhns,
Pedro
Malagón,
Thomas
Eisenbarth, and
José Manuel
Moya,
Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged Cache Attacks, in IEEE European Symposium on Security and Privacy, EuroS&P 2021, Vienna, Austria, September 6-10, 2021 , IEEE, 2021. pp. 683--700.
Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged Cache Attacks, in IEEE European Symposium on Security and Privacy, EuroS&P 2021, Vienna, Austria, September 6-10, 2021 , IEEE, 2021. pp. 683--700.
DOI: | 10.1109/EuroSP51992.2021.00051 |
Datei: | EuroSP51992.2021.00051 |
Okan
Seker,
Thomas
Eisenbarth, and
Maciej
Liskiewicz,
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 2, pp. 61-105, 2021. Cryptology ePrint Archive, Report 2020/443.
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 2, pp. 61-105, 2021. Cryptology ePrint Archive, Report 2020/443.
DOI: | 10.46586/tches.v2021.i2.61-105 |
Datei: | 8788 |
Johannes
Müller,
Mohammad Rahmani
Fadiheh,
Anna Lena
Duque Antón,
Thomas
Eisenbarth,
Dominik
Stoffel, and
Wolfgang
Kunz,
A Formal Approach to Confidentiality Verification in SoCs at the Register Transfer Level, in 58th ACM/IEEE Design Automation Conference, DAC 2021, San Francisco, CA, USA, December 5-9, 2021 , IEEE, 2021. pp. 991--996.
A Formal Approach to Confidentiality Verification in SoCs at the Register Transfer Level, in 58th ACM/IEEE Design Automation Conference, DAC 2021, San Francisco, CA, USA, December 5-9, 2021 , IEEE, 2021. pp. 991--996.
DOI: | 10.1109/DAC18074.2021.9586248 |
Datei: | DAC18074.2021.9586248 |
David M.
Sommer,
Lukas
Abfalterer,
Sheila
Zingg, and
Esfandiar
Mohammadi,
Learning Numeric Optimal Differentially Private Truncated Additive Mechanisms, CoRR , vol. abs/2107.12957, 2021.
Learning Numeric Optimal Differentially Private Truncated Additive Mechanisms, CoRR , vol. abs/2107.12957, 2021.
Datei: | 2107.12957 |
2020
Samira
Briongos,
Pedro
Malagon,
Jose M.
Moya, and
Thomas
Eisenbarth,
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks, in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, 2020. pp. 1967--1984.
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks, in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, 2020. pp. 1967--1984.
ISBN: | 978-1-939133-17-5 |
Datei: | briongos |
Daniel
Moghimi,
Berk
Sunar,
Thomas
Eisenbarth, and
Nadia
Heninger,
TPM-FAIL: TPM meets Timing and Lattice Attacks, in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, 2020. pp. 2057--2073.
TPM-FAIL: TPM meets Timing and Lattice Attacks, in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, 2020. pp. 2057--2073.
ISBN: | 978-1-939133-17-5 |
Weblink: | https://tpm.fail/ |
Datei: | moghimi-tpm |
Max
Bannach,
Sebastian
Berndt,
Marten
Maack,
Matthias
Mnich,
Alexandra
Lassota,
Malin
Rau, and
Malte
Skambath,
Solving Packing Problems with Few Small Items Using Rainbow Matchings, in MFCS 2020 , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020.
Solving Packing Problems with Few Small Items Using Rainbow Matchings, in MFCS 2020 , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020.
Okan
Seker,
Sebastian
Berndt,
Luca
Wilke, and
Thomas
Eisenbarth,
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis, in CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security , Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna, Eds. ACM, 2020. pp. 1033--1049.
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis, in CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security , Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna, Eds. ACM, 2020. pp. 1033--1049.
DOI: | 10.1145/3372297.3417889 |
Datei: | 3372297.3417889 |
Luca
Wilke,
Jan
Wichelmann,
Mathias
Morbitzer, and
Thomas
Eisenbarth,
SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions, in 2020 IEEE Symposium on Security and Privacy (SP) , Los Alamitos, CA, USA: IEEE Computer Society, 2020. pp. 1431-1444.
SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions, in 2020 IEEE Symposium on Security and Privacy (SP) , Los Alamitos, CA, USA: IEEE Computer Society, 2020. pp. 1431-1444.
DOI: | 10.1109/SP40000.2020.00080 |
Weblink: | https://uzl-its.github.io/SEVurity/ |
Samira
Briongos,
Pedro
Malag'on,
Jose Manuel
Moya, and
Thomas
Eisenbarth,
Microarchitectural Isolation Guarantees Through Execution Based Signatures, in XXXV Conference on Design of Circuits and Integrated Systems, DCIS, 2020, Segovia, Spain, November 18-20, 2020 , IEEE, 2020. pp. 1--6.
Microarchitectural Isolation Guarantees Through Execution Based Signatures, in XXXV Conference on Design of Circuits and Integrated Systems, DCIS, 2020, Segovia, Spain, November 18-20, 2020 , IEEE, 2020. pp. 1--6.
DOI: | 10.1109/DCIS51330.2020.9268660 |
Datei: | DCIS51330.2020.9268660 |
Max
Bannach,
Sebastian
Berndt,
Martin
Schuster, and
Marcel
Wienöbst,
PACE Solver Description: PID (star), in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 28:1--28:4.
PACE Solver Description: PID (star), in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 28:1--28:4.
Max
Bannach,
Sebastian
Berndt,
Martin
Schuster, and
Marcel
Wienöbst,
PACE Solver Description: Fluid, in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 27:1--27:3.
PACE Solver Description: Fluid, in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 27:1--27:3.
Sebastian
Berndt, and
Maciej
Liskiewicz,
On the universal steganography of optimal rate, Inf. Comput. , vol. 275, pp. 104632, 2020.
On the universal steganography of optimal rate, Inf. Comput. , vol. 275, pp. 104632, 2020.
Zane
Weissman,
Thore
Tiemann,
Daniel
Moghimi,
Evan
Custodio,
Thomas
Eisenbarth, and
Berk
Sunar,
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2020, no. 3, pp. 169-195, 2020. https://tches.iacr.org/index.php/TCHES/article/view/8587 .
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2020, no. 3, pp. 169-195, 2020. https://tches.iacr.org/index.php/TCHES/article/view/8587 .
DOI: | 10.13154/tches.v2020.i3.169-195 |
Weblink: | https://tches.iacr.org/index.php/TCHES/article/view/8587 |
Debajyoti
Das,
Sebastian
Meiser,
Esfandiar
Mohammadi, and
Aniket
Kate,
Comprehensive Anonymity Trilemma: User Coordination is not enough, in Proceedings on Privacy Enhancing Technologies (PETS/PoPETS) 2020.3 , Sciendo, 2020.
Comprehensive Anonymity Trilemma: User Coordination is not enough, in Proceedings on Privacy Enhancing Technologies (PETS/PoPETS) 2020.3 , Sciendo, 2020.
DOI: | 10.2478/popets-2020-0056 |
Datei: | article-p356.xml |
2019
Saad
Islam,
Ahmad
Moghimi,
Ida
Bruhns,
Moritz
Krebbel,
Berk
Gulmezoglu,
Thomas
Eisenbarth, and
Berk
Sunar,
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks, in 28th USENIX Security Symposium (USENIX Security 19) , Santa Clara, CA: USENIX Association, 2019. pp. 621--637.
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks, in 28th USENIX Security Symposium (USENIX Security 19) , Santa Clara, CA: USENIX Association, 2019. pp. 621--637.
ISBN: | 978-1-939133-06-9 |
Datei: | islam |