Prof. Dr.-Ing. Thomas Eisenbarth
Institutsdirektor
Ratzeburger Allee 160
23562 Lübeck
Gebäude 64, 1. OG,
Raum 043
| Email: | thomas.eisenbarth(at)uni-luebeck.de |
| Phone: | +49 451 3101 6600 |
| Fax: | +49 451 3101 6604 |
Kurzbiographie
Thomas Eisenbarth ist Professor für IT-Sicherheit an der Universität zu Lübeck. Er studierte bis 2006 Elektro- und Informationstechnik an der Ruhr-Universität Bochum und promovierte anschließend bis 2009 am Horst-Görtz-Institut für IT-Sicherheit. Ab 2010 forschte er als Assistant Professor am Center for Cryptography and Information Security (CCIS) der Florida Atlantic University. 2012 wechselte er an das Worcester Polytechnic Institute (WPI). Seit August 2017 ist er Direktor des Instituts für IT-Sicherheit an der Universität zu Lübeck.
Seit Oktober 2024 ist er Vorsitzender der MINT-Sektionen.
Seine Forschungsinteressen umfassen:
- Sichere Systeme, Softwaresicherheit und Code-Analyse
- Angewandte Kryptografie & Seitenkanalanalyse
- Trustworthy AI
Konferenz- und Workshoporganisation
- CHES 2022 Program Co-Chair
- CARDIS 2021 General Chair
- CARDIS 2020 General Chair
- SPACE 2017 TPC Co-chair
- CARDIS 2017 TPC Co-chair
- LightSEC 2014 TPC Co-chair
- CHES 2013 General Co-Chair
- WESS 2013 TPC Co-chair
Programmausschuss-Mitgliedschaften
- 2026: ACM CCS, USENIX Security
- 2025: EuroS&P, CHES, ACM CCS, USENIX Security
- 2024: SysTEX, ACM CCS, USENIX Security
- 2023: ACM CCS, USENIX Security, CRYPTO
- 2022: USENIX Security, IEEE Security & Privacy, RWC
- 2021: EuroCRYPT, USENIX Security
- 2020: CRYPTO, EuroCRYPT
- 2019: CARDIS, CHES, PQCrypto, DATE
- 2018: Kangacrypt, CHES, PQCrypto
- 2017: AsiaCRYPT, CHES, VLSISoC, COSADE, SEMS
- 2016: RFIDsec, AsiaCRYPT, CARDIS, TrustED, COSADE, TRUDEVICE
- 2015: CARDIS, CHES, Latincrypt, RFIDsec, COSADE, TrustED
- 2014: CHES, ReConFig, CARDIS, M2MSec, WESS, RFIDsec
- 2013: RFIDsec, ICICS
- 2012: CHES
- 2010: ISC
Publikationen
2026
CTRL+ALT+TLB: Exploring Microarchitectural Weird Machines on Translation Look-aside Buffers, in Proceedings of the 21th ACM Asia Conference on Computer and Communications Security (to appear), ASIA CCS 2026 , ACM, 2026.
2025
Non-omniscient backdoor injection with a single poison sample: Proving the one-poison hypothesis for linear regression and linear classification, arXiv , Aug. 2025.
| DOI: | 10.48550/arXiv.2508.05600 |
| Datei: | 2508.05600 |
Lightweight Authenticated Integration and In-Field Secure Operation of System-in-Package, ACM Trans. Des. Autom. Electron. Syst. , Jun. 2025. Association for Computing Machinery.
| DOI: | 10.1145/3745780 |
| Datei: | 3745780 |
Attacks and Remedies for Randomness in AI: Cryptanalysis of PHILOX and THREEFRY, 2025. Cryptology ePrint Archive, Paper 2025/2161.
| Datei: | 2161 |
AutoStub: Genetic Programming-Based Stub Creation for Symbolic Execution, in Proceedings of the 18th ACM/IEEE International Workshop on Search-Based and Fuzz Testing, SBFT 2025 , 2025.
BarkBeetle: Stealing Decision Tree Models with Fault Injection, CoRR , vol. abs/2507.06986, 2025.
| DOI: | 10.48550/ARXIV.2507.06986 |
| Datei: | arXiv.2507.06986 |
Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2025, pp. 420-449, 2025. IACR.
| DOI: | 10.46586/tches.v2025.i1.420-449 |
Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms, in Information Systems Security , Patil, Vishwas T. and Krishnan, Ram and Shyamasundar, Rudrapatna K., Eds. Springer Nature Switzerland, 2025. pp. 3-24.
| DOI: | 10.1007/978-3-031-80020-7_1 |
| ISBN: | 978-3-031-80020-7 |
| Weblink: | https://doi.org/10.48550/arXiv.2311.15999 |
| Bibtex: | @inproceedings{weissman2025firecracker,
author = {Weissman, Zane and
Tiemann, Thore and
Eisenbarth, Thomas and
Sunar, Berk},
title = {Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms},
booktitle = {Information Systems Security},
editor = {Patil, Vishwas T. and
Krishnan, Ram and
Shyamasundar, Rudrapatna K.},
year = {2025},
pages = {3--24},
publisher = {Springer Nature Switzerland},
isbn = {978-3-031-80020-7},
doi = {10.1007/978-3-031-80020-7_1},
} |
OCEAN: Open-World Contrastive Authorship Identification, in Applied Cryptography and Network Security (ACNS) 2025 , 2025.
| Weblink: | https://arxiv.org/abs/2412.05049 |
| Bibtex: | @misc{maechtle2024oceanopenworldcontrastiveauthorship,
title={OCEAN: Open-World Contrastive Authorship Identification},
author={Felix Mächtle and Jan-Niclas Serr and Nils Loose and Jonas Sander and Thomas Eisenbarth},
year={2024},
eprint={2412.05049},
archivePrefix={arXiv},
primaryClass={cs.AI},
url={https://arxiv.org/abs/2412.05049},
} |
Okapi: Efficiently Safeguarding Speculative Data Accesses in Sandboxed Environments, in Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2025 , ACM, 2025. pp. 1203–1218.
| DOI: | 10.1145/3708821.3733869 |
| Weblink: | https://arxiv.org/abs/2312.08156 |
| Bibtex: | @inproceedings{schmitz2025okapi,
author = {Philipp Schmitz and
Tobias Jauch and
Alex Wezel and
Mohammad Rahmani Fadiheh and
Thore Tiemann and
Jonah Heller and
Thomas Eisenbarth and
Dominik Stoffel and
Wolfgang Kunz},
title = {Okapi: Efficiently Safeguarding Speculative Data Accesses in Sandboxed
Environments},
booktitle = {Proceedings of the 20th {ACM} Asia Conference on Computer and Communications
Security, {ASIA} {CCS} 2025, Hanoi, Vietnam, August 25-29, 2025},
pages = {1203--1218},
publisher = {{ACM}},
year = {2025},
url = {https://doi.org/10.1145/3708821.3733869},
doi = {10.1145/3708821.3733869},
timestamp = {Wed, 15 Oct 2025 19:23:47 +0200}
} |
Prompt Pirates Need a Map: Stealing Seeds helps Stealing Prompts, 2025.
| Weblink: | https://arxiv.org/pdf/2509.09488 |
| Bibtex: | @misc{maechtle2025promptpirates,
title={Prompt Pirates Need a Map: Stealing Seeds helps Stealing Prompts},
author={Felix Mächtle and Ashwath Shetty and Jonas Sander and Nils Loose and Sören Pirk and Thomas Eisenbarth},
year={2025},
eprint={2509.09488},
archivePrefix={arXiv},
primaryClass={cs.CR},
url={https://arxiv.org/abs/2509.09488},
} |
ReDASH: Fast and Efficient Scaling in Arithmetic Garbled Circuits for Secure Outsourced Inference, in Applied Cryptography and Network Security Workshops - ACNS 2025 Satellite Workshops: AIHWS, AIoTS, QSHC, SCI, PrivCrypt, SPIQE, SiMLA, and CIMSS 2025, Munich, Germany, June 23-26, 2025, Revised Selected Papers, Part III , Mark Manulis, Eds. Springer, 2025. pp. 43—51.
| DOI: | 10.1007/978-3-032-01823-6_3 |
| Datei: | 978-3-032-01823-6_3 |
Silenzio: Secure Non-Interactive Outsourced MLP Training, CoRR , vol. abs/2504.17785, 2025.
| DOI: | 10.48550/ARXIV.2504.17785 |
| Datei: | arXiv.2504.17785 |
SLasH-DSA: Breaking SLH-DSA Using an Extensible End-To-End Rowhammer Framework, arXiv preprint arXiv:2509.13048 , 2025.
| Datei: | 2509.13048 |
Trace Gadgets: Minimizing Code Context for Machine Learning-Based Vulnerability Prediction, 2025.
| Weblink: | https://arxiv.org/pdf/2504.13676 |
| Bibtex: | @article{machtle2025trace,
title={Trace Gadgets: Minimizing Code Context for Machine Learning-Based Vulnerability Prediction},
author={M{\"a}chtle, Felix and Loose, Nils and Schulz, Tim and Sieck, Florian and Serr, Jan-Niclas and M{\"o}ller, Ralf and Eisenbarth, Thomas},
journal={arXiv preprint arXiv:2504.13676},
year={2025}
} |
Zebrafix: Mitigating Memory-Centric Side-Channel Leakage via Interleaving, in 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2025) , IEEE, 2025.
| Datei: | 2502.09139 |
2024
TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security , ACM, Okt.2024.
| DOI: | 10.1145/3658644.3690230 |
| Weblink: | https://uzl-its.github.io/tdxdown/ |
| Bibtex: | @INPROCEEDINGS{tdxdownCCS24,
author = {Luca Wilke and Florian Sieck and Thomas Eisenbarth},
booktitle = {Proceedings of the 2024 ACM SIGSAC Conference
on Computer and Communications Security, {CCS} 2024,
Salt Lake City, UT, USA, October 14--18, 2024},
title = {{TDXdown}: Single-Stepping and Instruction Counting Attacks
against Intel {TDX}},
year = {2024},
doi = {10.1145/3658644.3690230}
}
|
Obelix: Mitigating Side-Channels Through Dynamic Obfuscation, in 2024 IEEE Symposium on Security and Privacy (S&P) , San Francisco, CA, USA: IEEE, Mai2024. pp. 4182-4199.
| DOI: | 10.1109/SP54263.2024.00261 |
| Weblink: | https://doi.ieeecomputersociety.org/10.1109/SP54263.2024.00261 |
Duplication-Based Fault Tolerance for RISC-V Embedded Software, in Computer Security - ESORICS 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part IV , Joaquin Garcia Alfaro, Rafal Kozik, Michal Choras, Sokratis K. Katsikas, Eds. Springer, 2024. pp. 86--104.
| DOI: | 10.1007/978-3-031-70903-6_5 |
| Weblink: | https://dblp.org/rec/conf/esorics/BezsmertnyiCE24.html |
| Weblink: | https://link.springer.com/chapter/10.1007/978-3-031-70903-6_5 |
| Datei: | 978-3-031-70903-6_5 |
Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments, in 9th IEEE European Symposium on Security and Privacy, EuroS&P 2024 , IEEE, 2024. pp. 327-344.
| DOI: | 10.1109/EUROSP60621.2024.00025 |
| Weblink: | https://doi.ieeecomputersociety.org/10.1109/EuroSP60621.2024.00025 |
| Weblink: | https://doi.org/10.48550/arXiv.2404.10715 |
| Bibtex: | @inproceedings{DBLP:conf/eurosp/DiptaTGME24,
author = {Debopriya Roy Dipta and
Thore Tiemann and
Berk G{\"{u}}lmezoglu and
Eduard Marin and
Thomas Eisenbarth},
title = {Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox
Environments},
booktitle = {9th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
2024, Vienna, Austria, July 8-12, 2024},
pages = {327--344},
publisher = {{IEEE}},
year = {2024},
url = {https://doi.org/10.1109/EuroSP60621.2024.00025},
doi = {10.1109/EUROSP60621.2024.00025}
} |
Evaluating the Impact of Face Anonymization Methods on Computer Vision Tasks: A Trade-off Between Privacy and Utility, IEEE Access , pp. 1-1, 2024.
| DOI: | 10.1109/ACCESS.2024.3519441 |
| Weblink: | https://ieeexplore.ieee.org/document/10804775 |
| Datei: | ACCESS.2024.3519441 |
Microarchitectural Vulnerabilities Introduced, Exploited, and Accelerated by Heterogeneous FPGA-CPU Platforms, in Security of FPGA-Accelerated Cloud Computing Environments , Szefer, Jakub and Tessier, Russell, Eds. Cham: Springer International Publishing, 2024, pp. 203-237.
| DOI: | 10.1007/978-3-031-45395-3_8 |
| ISBN: | 978-3-031-45395-3 |
| Bibtex: | @inbook{tiemann2024fpgaplatform,
author = {Tiemann, Thore
and Weissman, Zane
and Eisenbarth, Thomas
and Sunar, Berk},
editor = {Szefer, Jakub
and Tessier, Russell},
title = {Microarchitectural Vulnerabilities Introduced,
Exploited, and Accelerated by Heterogeneous
{FPGA-CPU} Platforms},
bookTitle = {Security of FPGA-Accelerated Cloud Computing
Environments},
year = {2024},
publisher = {Springer International Publishing},
pages = {203--237},
isbn = {978-3-031-45395-3},
doi = {10.1007/978-3-031-45395-3_8},
url = {https://doi.org/10.1007/978-3-031-45395-3_8},
} |
Polynomial sharings on two secrets: Buy one, get one free, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 671-706.
| DOI: | 10.46586/tches.v2024.i3.671-706 |
| Datei: | 11691 |
SEV-Step: A Single-Stepping Framework for AMD-SEV, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 180-206.
| DOI: | 10.46586/tches.v2024.i1.180-206 |
| Datei: | 10792 |
Slalom at the Carnival: Privacy-preserving Inference with Masks from Public Knowledge, IACR Commun. Cryptol. , vol. 1, no. 3, pp. 40, 2024.
| DOI: | 10.62056/AKP-49QGXQ |
| Datei: | akp-49qgxq |

- Mitarbeiter*innen
- Thomas Eisenbarth
- Esfandiar Mohammadi
- Sebastian Berndt
- Paula Arnold
- Joseph Bienhüls
- Jeremy Boy
- Till Eifert
- Mohamed ElGhamrawy
- Tim Gellersen
- Jonah Heller
- Kristoffer Hempel
- Eike Hoffmann
- Timothy Imort
- Moritz Kirschte
- Niklas Klinger
- Marven Kummerfeldt
- Johannes Liebenow
- Nils Loose
- Felix Mächtle
- Felix Maurer
- Sebastian Meiser
- Akhil Narahari
- Anna Pätschke
- Pajam Pauls
- Thorsten Peinemann
- Christopher Peredy
- Marcel Pflaeging
- Tammo Polle
- Claudius Pott
- Anja Rabich
- Jonas Sander
- Ines Schiebahn
- Yara Schütt
- Jan-Niclas Serr
- Florian Sieck
- Annika Strang
- Thore Tiemann
- Alexander Treff
- Jan Wichelmann
