M. Sc. Jan Wichelmann

Wissenschaftlicher Mitarbeiter


Ratzeburger Allee 160
23562 Lübeck
Gebäude 64, 1. OG, Raum 105

Email:j.wichelmann(at)uni-luebeck.de
Phone:+49 451 3101 6606
Fax:+49 451 3101 6604

Publikationen

2023

  • Jan Wichelmann, Anna Pätschke, Luca Wilke and Thomas Eisenbarth,
    Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software in 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023 , Joseph A. Calandrino and Carmela Troncoso, Eds. USENIX Association, 2023.
    DOI:10.48550/arXiv.2210.13124
    Datei: https://www.usenix.org/conference/usenixsecurity23/presentation/wichelmann

  • Jan Wichelmann, Christopher Peredy, Florian Sieck, Anna Pätschke and Thomas Eisenbarth,
    MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V in Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) - 20th International Conference , Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati, Eds. Springer, 2023. pp. 3-23.
    DOI:10.1007/978-3-031-35504-2_1
    Weblink: https://arxiv.org/abs/2305.00584

  • 2022

  • Mengyuan Li, Luca Wilke, Jan Wichelmann, Thomas Eisenbarth, Radu Teodorescu and Yinqian Zhang,
    A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP in 2022 IEEE Symposium on Security and Privacy (SP) , San Francisco, CA, USA: IEEE, 2022. pp. 337-351.
    DOI:10.1109/SP46214.2022.9833768
    Datei: https://doi.ieeecomputersociety.org/10.1109/SP46214.2022.9833768

  • Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving and Thomas Eisenbarth,
    ASAP: Algorithm Substitution Attacks on Cryptographic Protocols in Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security , ACM, 2022. pp. 712-726.
    DOI:10.1145/3488932.3517387
    ISBN:9781450391405
    Datei: https://dl.acm.org/doi/pdf/10.1145/3488932.3517387

  • Jan Wichelmann, Florian Sieck, Anna Pätschke and Thomas Eisenbarth,
    Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022 , Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi, Eds. ACM, 2022. pp. 2915--2929.
    DOI:10.1145/3548606.3560654
    Datei: https://doi.org/10.1145/3548606.3560654

  • 2021

  • Jan Wichelmann, Sebastian Berndt, Claudius Pott and Thomas Eisenbarth,
    Help, My Signal has Bad Device! - Breaking the Signal Messenger's Post-Compromise Security Through a Malicious Device in Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings , Leyla Bilge and Lorenzo Cavallaro and Giancarlo Pellegrino and Nuno Neves, Eds. Springer, 2021. pp. 88--105.
    DOI:10.1007/978-3-030-80825-9_5
    Datei: https://doi.org/10.1007/978-3-030-80825-9_5

  • Luca Wilke, Jan Wichelmann, Florian Sieck and Thomas Eisenbarth,
    undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation in 2021 IEEE Security and Privacy Workshops (SPW) , 2021. pp. 456-466.
    DOI:10.1109/SPW53761.2021.00064
    Datei: https://uzl-its.github.io/undeserved-trust/

  • Florian Sieck, Sebastian Berndt, Jan Wichelmann and Thomas Eisenbarth,
    Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries in CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security , Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi, Eds. ACM, 2021. pp. 2456--2473.
    DOI:10.1145/3460120.3484783
    Datei: https://doi.org/10.1145/3460120.3484783

  • 2020

  • Luca Wilke, Jan Wichelmann, Mathias Morbitzer and Thomas Eisenbarth,
    SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions in 2020 IEEE Symposium on Security and Privacy (SP) , Los Alamitos, CA, USA: IEEE Computer Society, 2020. pp. 1431-1444.
    DOI:10.1109/SP40000.2020.00080
    Weblink: https://uzl-its.github.io/SEVurity/

  • 2018

  • Ahmad Moghimi, Jan Wichelmann, Thomas Eisenbarth and Berk Sunar,
    MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations , International Journal of Parallel Programming , 2018.
    Datei: https://doi.org/10.1007/s10766-018-0611-9

  • Jan Wichelmann, Ahmad Moghimi, Thomas Eisenbarth and Berk Sunar,
    MicroWalk: A Framework for Finding Side Channels in Binaries in Proceedings of the 34th Annual Computer Security Applications Conference , New York, NY, USA: ACM, 2018. pp. 161--173.
    DOI:10.1145/3274694.3274741
    Datei: http://doi.acm.org/10.1145/3274694.3274741