Prof. Dr.-Ing. Thomas Eisenbarth
Institutsdirektor
Ratzeburger Allee 160
23562 Lübeck
Gebäude 64, 1. OG,
Raum 043
| Email: | thomas.eisenbarth(at)uni-luebeck.de |
| Phone: | +49 451 3101 6600 |
| Fax: | +49 451 3101 6604 |
Kurzbiographie
Thomas Eisenbarth ist Professor für IT Sicherheit an der Universität zu Lübeck. Er studierte bis 2006 Elektro- und Informationstechnik an der Ruhr Universität Bochum, wo er bis 2009 am Horst Görtz Institut für IT-Sicherheit promovierte. Ab 2010 forschte er als Assistant Professor am Center for Cryptography and Information Security (CCIS) an der Florida Atlantic University. 2012 wechselte er an das Worcester Polytechnic Institute (WPI). Seit August 2017 ist er als Direktor des Instituts für IT Sicherheit an der Universität zu Lübeck.
Seit Oktober 2024 ist er der Vorsitzende der MINT Sektionen.
Seine Forschungsinteressen umfassen:
- Systemsicherheit , Softwaresicherheit und Code-Analyse
- Angewandte Kryptografie
- Sichere Vortualisierung, Mikroarchitekturen und Trusted Execution Envorinments
- Seitenkanalangriffe, physische Sicherheit und Gegenmaßnahmen
Konferenz- und Workshoporganisation
- CHES 2022 Program Co-Chair
- CARDIS 2021 General Chair
- CARDIS 2020 General Chair
- SPACE 2017 TPC Co-chair
- CARDIS 2017 TPC Co-chair
- LightSEC 2014 TPC Co-chair
- CHES 2013 General Co-Chair
- WESS 2013 TPC Co-chair
Programmausschuss-Mitgliedschaften
- 2025: EuroS&P, CHES, ACM CCS, USENIX Security
- 2024: SysTEX, ACM CCS, USENIX Security
- 2023: ACM CCS, USENIX Security, CRYPTO
- 2022: USENIX Security, IEEE Security & Privacy, RWC
- 2021: EuroCRYPT, USENIX Security
- 2020: CRYPTO, EuroCRYPT
- 2019: CARDIS, CHES, PQCrypto, DATE
- 2018: Kangacrypt, CHES, PQCrypto
- 2017: AsiaCRYPT, CHES, VLSISoC, COSADE, SEMS
- 2016: RFIDsec, AsiaCRYPT, CARDIS, TrustED, COSADE, TRUDEVICE
- 2015: CARDIS, CHES, Latincrypt, RFIDsec, COSADE, TrustED
- 2014: CHES, ReConFig, CARDIS, M2MSec, WESS, RFIDsec
- 2013: RFIDsec, ICICS
- 2012: CHES
- 2010: ISC
Publikationen
2025
Non-omniscient backdoor injection with a single poison sample: Proving the one-poison hypothesis for linear regression and linear classification, arXiv , Aug. 2025.
| DOI: | 10.48550/arXiv.2508.05600 |
| Datei: | 2508.05600 |
Lightweight Authenticated Integration and In-Field Secure Operation of System-in-Package, ACM Trans. Des. Autom. Electron. Syst. , Jun. 2025. Association for Computing Machinery.
| DOI: | 10.1145/3745780 |
| Datei: | 3745780 |
AutoStub: Genetic Programming-Based Stub Creation for Symbolic Execution, in Proceedings of the 18th ACM/IEEE International Workshop on Search-Based and Fuzz Testing, SBFT 2025 , 2025.
Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2025, pp. 420-449, 2025. IACR.
| DOI: | 10.46586/tches.v2025.i1.420-449 |
Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms, in Information Systems Security , Patil, Vishwas T. and Krishnan, Ram and Shyamasundar, Rudrapatna K., Eds. Springer Nature Switzerland, 2025. pp. 3-24.
| DOI: | 10.1007/978-3-031-80020-7_1 |
| ISBN: | 978-3-031-80020-7 |
| Weblink: | https://doi.org/10.48550/arXiv.2311.15999 |
| Bibtex: | @inproceedings{weissman2025firecracker,
author = {Weissman, Zane and
Tiemann, Thore and
Eisenbarth, Thomas and
Sunar, Berk},
title = {Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms},
booktitle = {Information Systems Security},
editor = {Patil, Vishwas T. and
Krishnan, Ram and
Shyamasundar, Rudrapatna K.},
year = {2025},
pages = {3--24},
publisher = {Springer Nature Switzerland},
isbn = {978-3-031-80020-7},
doi = {10.1007/978-3-031-80020-7_1},
} |
OCEAN: Open-World Contrastive Authorship Identification, in Applied Cryptography and Network Security (ACNS) 2025 , 2025.
| Weblink: | https://arxiv.org/abs/2412.05049 |
| Bibtex: | @misc{maechtle2024oceanopenworldcontrastiveauthorship,
title={OCEAN: Open-World Contrastive Authorship Identification},
author={Felix Mächtle and Jan-Niclas Serr and Nils Loose and Jonas Sander and Thomas Eisenbarth},
year={2024},
eprint={2412.05049},
archivePrefix={arXiv},
primaryClass={cs.AI},
url={https://arxiv.org/abs/2412.05049},
} |
Okapi: A Lightweight Architecture for Secure Speculation Exploiting Locality of Memory Accesses, in Proceedings of the 20th ACM Asia Conference on Computer and Communications Security (to appear) , ACM, 2025. pp. 1203–1218.
| DOI: | 10.1145/3708821.3733869 |
| Weblink: | https://arxiv.org/abs/2312.08156 |
| Bibtex: | @inproceedings{schmitz2025okapi,
author = {Philipp Schmitz and
Tobias Jauch and
Alex Wezel and
Mohammad R. Fadiheh and
Thore Tiemann and
Jonah Heller and
Thomas Eisenbarth and
Dominik Stoffel and
Wolfgang Kunz},
title = {Okapi: A Lightweight Architecture for Secure
Speculation Exploiting Locality of Memory Accesses},
booktitle = {to appear in Proceedings of the 20th {ACM} Asia Conference on Computer and Communications
Security, {ASIA} {CCS} 2025, Ha Noi, August 25-29, 2025},
publisher = {{ACM}},
year = {2025},
doi = {10.1145/3708821.3733869}
} |
Prompt Pirates Need a Map: Stealing Seeds helps Stealing Prompts, 2025.
| Weblink: | https://arxiv.org/pdf/2509.09488 |
| Bibtex: | @misc{maechtle2025promptpirates,
title={Prompt Pirates Need a Map: Stealing Seeds helps Stealing Prompts},
author={Felix Mächtle and Ashwath Shetty and Jonas Sander and Nils Loose and Sören Pirk and Thomas Eisenbarth},
year={2025},
eprint={2509.09488},
archivePrefix={arXiv},
primaryClass={cs.CR},
url={https://arxiv.org/abs/2509.09488},
} |
SLasH-DSA: Breaking SLH-DSA Using an Extensible End-To-End Rowhammer Framework, arXiv preprint arXiv:2509.13048 , 2025.
| Datei: | 2509.13048 |
Trace Gadgets: Minimizing Code Context for Machine Learning-Based Vulnerability Prediction, 2025.
| Weblink: | https://arxiv.org/pdf/2504.13676 |
| Bibtex: | @article{machtle2025trace,
title={Trace Gadgets: Minimizing Code Context for Machine Learning-Based Vulnerability Prediction},
author={M{\"a}chtle, Felix and Loose, Nils and Schulz, Tim and Sieck, Florian and Serr, Jan-Niclas and M{\"o}ller, Ralf and Eisenbarth, Thomas},
journal={arXiv preprint arXiv:2504.13676},
year={2025}
} |
Zebrafix: Mitigating Memory-Centric Side-Channel Leakage via Interleaving, in 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2025) , IEEE, 2025.
| Datei: | 2502.09139 |
2024
TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security , ACM, Okt.2024.
| DOI: | 10.1145/3658644.3690230 |
| Weblink: | https://uzl-its.github.io/tdxdown/ |
| Bibtex: | @INPROCEEDINGS{tdxdownCCS24,
author = {Luca Wilke and Florian Sieck and Thomas Eisenbarth},
booktitle = {Proceedings of the 2024 ACM SIGSAC Conference
on Computer and Communications Security, {CCS} 2024,
Salt Lake City, UT, USA, October 14--18, 2024},
title = {{TDXdown}: Single-Stepping and Instruction Counting Attacks
against Intel {TDX}},
year = {2024},
doi = {10.1145/3658644.3690230}
}
|
Obelix: Mitigating Side-Channels Through Dynamic Obfuscation, in 2024 IEEE Symposium on Security and Privacy (S&P) , San Francisco, CA, USA: IEEE, Mai2024. pp. 4182-4199.
| DOI: | 10.1109/SP54263.2024.00261 |
| Weblink: | https://doi.ieeecomputersociety.org/10.1109/SP54263.2024.00261 |
Duplication-Based Fault Tolerance for RISC-V Embedded Software, in Computer Security - ESORICS 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part IV , Joaquin Garcia Alfaro, Rafal Kozik, Michal Choras, Sokratis K. Katsikas, Eds. Springer, 2024. pp. 86--104.
| DOI: | 10.1007/978-3-031-70903-6\_5 |
| Weblink: | https://dblp.org/rec/conf/esorics/BezsmertnyiCE24.html |
| Weblink: | https://link.springer.com/chapter/10.1007/978-3-031-70903-6_5 |
| Datei: | 978-3-031-70903-6\_5 |
Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments, in 9th IEEE European Symposium on Security and Privacy, EuroS&P 2024 , IEEE, 2024. pp. 327-344.
| DOI: | 10.1109/EUROSP60621.2024.00025 |
| Weblink: | https://doi.ieeecomputersociety.org/10.1109/EuroSP60621.2024.00025 |
| Weblink: | https://doi.org/10.48550/arXiv.2404.10715 |
| Bibtex: | @inproceedings{DBLP:conf/eurosp/DiptaTGME24,
author = {Debopriya Roy Dipta and
Thore Tiemann and
Berk G{\"{u}}lmezoglu and
Eduard Marin and
Thomas Eisenbarth},
title = {Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox
Environments},
booktitle = {9th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
2024, Vienna, Austria, July 8-12, 2024},
pages = {327--344},
publisher = {{IEEE}},
year = {2024},
url = {https://doi.org/10.1109/EuroSP60621.2024.00025},
doi = {10.1109/EUROSP60621.2024.00025}
} |
Evaluating the Impact of Face Anonymization Methods on Computer Vision Tasks: A Trade-off Between Privacy and Utility, IEEE Access , pp. 1-1, 2024.
| DOI: | 10.1109/ACCESS.2024.3519441 |
| Weblink: | https://ieeexplore.ieee.org/document/10804775 |
| Datei: | ACCESS.2024.3519441 |
Microarchitectural Vulnerabilities Introduced, Exploited, and Accelerated by Heterogeneous FPGA-CPU Platforms, in Security of FPGA-Accelerated Cloud Computing Environments , Szefer, Jakub and Tessier, Russell, Eds. Cham: Springer International Publishing, 2024, pp. 203-237.
| DOI: | 10.1007/978-3-031-45395-3_8 |
| ISBN: | 978-3-031-45395-3 |
| Bibtex: | @inbook{tiemann2024fpgaplatform,
author = {Tiemann, Thore
and Weissman, Zane
and Eisenbarth, Thomas
and Sunar, Berk},
editor = {Szefer, Jakub
and Tessier, Russell},
title = {Microarchitectural Vulnerabilities Introduced,
Exploited, and Accelerated by Heterogeneous
{FPGA-CPU} Platforms},
bookTitle = {Security of FPGA-Accelerated Cloud Computing
Environments},
year = {2024},
publisher = {Springer International Publishing},
pages = {203--237},
isbn = {978-3-031-45395-3},
doi = {10.1007/978-3-031-45395-3_8},
url = {https://doi.org/10.1007/978-3-031-45395-3_8},
} |
Polynomial sharings on two secrets: Buy one, get one free, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 671-706.
| DOI: | 10.46586/tches.v2024.i3.671-706 |
| Datei: | 11691 |
SEV-Step: A Single-Stepping Framework for AMD-SEV, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 180-206.
| DOI: | 10.46586/tches.v2024.i1.180-206 |
| Datei: | 10792 |
Slalom at the Carnival: Privacy-preserving Inference with Masks from Public Knowledge, IACR Commun. Cryptol. , vol. 1, no. 3, pp. 40, 2024.
| DOI: | 10.62056/AKP-49QGXQ |
| Datei: | akp-49qgxq |
SWAT: Modular Dynamic Symbolic Execution for Java Applications using Dynamic Instrumentation (Competition Contribution), in Tools and Algorithms for the Construction and Analysis of Systems - 30th International Conference, TACAS 2024, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024, Luxembourg City, Luxembourg, April 6-11, 2024, Proceedings, Part III , Bernd Finkbeiner and Laura Kovács, Eds. Springer, 2024. pp. 399-405.
| DOI: | 10.1007/978-3-031-57256-2_28 |
| Datei: | 978-3-031-57256-2_28 |
2023
TeeJam: Sub-Cache-Line Leakages Strike Back, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , Dez.2023. pp. 457-500.
| DOI: | 10.46586/tches.v2024.i1.457-500 |
| Weblink: | https://tches.iacr.org/index.php/TCHES/article/view/11259 |
| Bibtex: | @article{Sieck_Zhang_Berndt_Chuengsatiansup_Eisenbarth_Yarom_2023,
title={TeeJam: Sub-Cache-Line Leakages Strike Back},
volume={2024},
url={https://tches.iacr.org/index.php/TCHES/article/view/11259},
DOI={10.46586/tches.v2024.i1.457-500},
number={1},
journal={IACR Transactions on Cryptographic Hardware and Embedded Systems},
author={Sieck, Florian and Zhang, Zhiyuan and Berndt, Sebastian and Chuengsatiansup, Chitchanok and Eisenbarth, Thomas and Yarom, Yuval},
year={2023},
month={Dec.},
pages={457–500}
} |
SystemC Model of Power Side-Channel Attacks Against AI Accelerators: Superstition or not?, in 2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD) , IEEE/ACM, Nov.2023. pp. 1-8.
| DOI: | 10.1109/ICCAD57390.2023.10323687 |
| Weblink: | https://arxiv.org/abs/2311.13387 |
IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems, in Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2023 , Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik, Eds. ACM, Jul.2023. pp. 827-840.
| DOI: | 10.1145/3579856.3582838 |
| Weblink: | https://arxiv.org/abs/2202.11623 |
| Datei: | |
| Bibtex: | @inproceedings{tiemann2023iotlbsc,
author = {Thore Tiemann and
Zane Weissman and
Thomas Eisenbarth and
Berk Sunar},
editor = {Joseph K. Liu and
Yang Xiang and
Surya Nepal and
Gene Tsudik},
title = {{IOTLB-SC:} An Accelerator-Independent Leakage Source in Modern Cloud
Systems},
booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
2023},
pages = {827--840},
publisher = {{ACM}},
year = {2023},
url = {https://doi.org/10.1145/3579856.3582838},
doi = {10.1145/3579856.3582838}
} |
"Act natural!": Exchanging Private Messages on Public Blockchains, in 8th IEEE European Symposium on Security and Privacy, EuroS&P 2023 , IEEE, 2023. pp. 292-308.
| DOI: | 10.1109/EuroSP57164.2023.00026 |
| Weblink: | https://doi.ieeecomputersociety.org/10.1109/EuroSP57164.2023.00026 |
| Weblink: | https://eprint.iacr.org/2021/1073 |
| Datei: | Dateilink |
| Bibtex: | @inproceedings{tiemann2023actnatural,
author = {Thore Tiemann and
Sebastian Berndt and
Thomas Eisenbarth and
Maciej Liskiewicz},
title = {"Act natural!": Exchanging Private Messages on Public Blockchains},
booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
2023, Delft, Netherlands, July 3-7, 2023},
pages = {292--308},
publisher = {{IEEE}},
year = {2023},
url = {https://doi.org/10.1109/EuroSP57164.2023.00026},
doi = {10.1109/EUROSP57164.2023.00026}
} |

- Mitarbeiter*innen
- Thomas Eisenbarth
- Esfandiar Mohammadi
- Sebastian Berndt
- Paula Arnold
- Joseph Bienhüls
- Jeremy Boy
- Till Eifert
- Mohamed ElGhamrawy
- Tim Gellersen
- Jonah Heller
- Kristoffer Hempel
- Eike Hoffmann
- Timothy Imort
- Moritz Kirschte
- Niklas Klinger
- Marven Kummerfeldt
- Johannes Liebenow
- Nils Loose
- Felix Mächtle
- Felix Maurer
- Sebastian Meiser
- Akhil Narahari
- Anna Pätschke
- Pajam Pauls
- Thorsten Peinemann
- Christopher Peredy
- Marcel Pflaeging
- Tammo Polle
- Claudius Pott
- Anja Rabich
- Jonas Sander
- Ines Schiebahn
- Yara Schütt
- Jan-Niclas Serr
- Florian Sieck
- Annika Strang
- Thore Tiemann
- Alexander Treff
- Jan Wichelmann
