Prof. Dr.-Ing. Thomas Eisenbarth

Photo of Thomas  Eisenbarth

Institutsdirektor


Ratzeburger Allee 160
23562 Lübeck
Gebäude 64, 1. OG, Raum 043

Email: thomas.eisenbarth(at)uni-luebeck.de
Phone: +49 451 3101 6600
Fax: +49 451 3101 6604

Kurzbiographie

Thomas Eisenbarth ist Professor für IT-Sicherheit an der Universität zu Lübeck. Er studierte bis 2006 Elektro- und Informationstechnik an der Ruhr-Universität Bochum und promovierte anschließend bis 2009 am Horst-Görtz-Institut für IT-Sicherheit. Ab 2010 forschte er als Assistant Professor am Center for Cryptography and Information Security  (CCIS) der Florida Atlantic University. 2012 wechselte er an das Worcester Polytechnic Institute (WPI). Seit August 2017 ist er Direktor des Instituts für IT-Sicherheit an der Universität zu Lübeck.
Seit Oktober 2024 ist er Vorsitzender der MINT-Sektionen.



Seine Forschungsinteressen umfassen:

  • Sichere Systeme, Softwaresicherheit und Code-Analyse
  • Angewandte Kryptografie & Seitenkanalanalyse
  • Trustworthy AI

Konferenz- und Workshoporganisation

Steering Committees

Publikationen

2026

Jonah Heller, Marcel Pflaeging, Thore Tiemann, and Thomas Eisenbarth,
CTRL+ALT+TLB: Exploring Microarchitectural Weird Machines on Translation Look-aside Buffers, in Proceedings of the 21th ACM Asia Conference on Computer and Communications Security (to appear), ASIA CCS 2026 , ACM, 2026.
Bibtex: BibTeX
@inproceedings{heller2026ctrlalttlb,
  author       = {Jonah Heller and
                  Marcel Pflaeging and
                  Thore Tiemann and
                  Thomas Eisenbarth},
  title        = {CTRL+ALT+TLB: Exploring Microarchitectural Weird Machines on Translation Look-aside Buffers},
  booktitle    = {Proceedings of the 21th {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2026, Bangalore, India, June 1-5, 2026},
  publisher    = {{ACM}},
  year         = {2026},
  timestamp    = {Wed, 24 Nov 2025 09:46:47 +0100}
}

2025

Thorsten Peinemann, Paula Arnold, Sebastian Berndt, Thomas Eisenbarth, and Esfandiar Mohammadi,
Non-omniscient backdoor injection with a single poison sample: Proving the one-poison hypothesis for linear regression and linear classification, arXiv , Aug. 2025.
DOI:10.48550/arXiv.2508.05600
Datei: 2508.05600
Christian Ewert, Andrija Neskovic, Carsten Heinz, Felix Muuss, Alexander Treff, Marc Gourjon, Rainer Buchty, Thomas Eisenbarth, Andreas Koch, Mladen Berekovic, and Saleh Mulhem,
Lightweight Authenticated Integration and In-Field Secure Operation of System-in-Package, ACM Trans. Des. Autom. Electron. Syst. , Jun. 2025. Association for Computing Machinery.
DOI:10.1145/3745780
Datei: 3745780
Jens Alich, Thomas Eisenbarth, Hossein Hadipour, Gregor Leander, Felix Mächtle, Yevhen Perehuda, Shahram Rasoolzadeh, Jonas Sander, and Cihangir Tezcan,
Attacks and Remedies for Randomness in AI: Cryptanalysis of PHILOX and THREEFRY, 2025. Cryptology ePrint Archive, Paper 2025/2161.
Datei: 2161
Felix Mächtle, Nils Loose, Jan-Niclas Serr, Jonas Sander, and Thomas Eisenbarth,
AutoStub: Genetic Programming-Based Stub Creation for Symbolic Execution, in Proceedings of the 18th ACM/IEEE International Workshop on Search-Based and Fuzz Testing, SBFT 2025 , 2025.
Qifan Wang, Jonas Sander, Minmin Jiang, Thomas Eisenbarth, and David F. Oswald,
BarkBeetle: Stealing Decision Tree Models with Fault Injection, CoRR , vol. abs/2507.06986, 2025.
DOI:10.48550/ARXIV.2507.06986
Datei: arXiv.2507.06986
Jonas Sander, Sebastian Berndt, Ida Bruhns, and Thomas Eisenbarth,
Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2025, pp. 420-449, 2025. IACR.
DOI:10.46586/tches.v2025.i1.420-449
Zane Weissman, Thore Tiemann, Thomas Eisenbarth, and Berk Sunar,
Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms, in Information Systems Security , Patil, Vishwas T. and Krishnan, Ram and Shyamasundar, Rudrapatna K., Eds. Springer Nature Switzerland, 2025. pp. 3-24.
DOI:10.1007/978-3-031-80020-7_1
ISBN:978-3-031-80020-7
Weblink: https://doi.org/10.48550/arXiv.2311.15999
Bibtex: BibTeX
@inproceedings{weissman2025firecracker,
  author    = {Weissman, Zane and
               Tiemann, Thore and
               Eisenbarth, Thomas and
               Sunar, Berk},
  title     = {Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms},
  booktitle = {Information Systems Security},
  editor    = {Patil, Vishwas T. and
               Krishnan, Ram and
               Shyamasundar, Rudrapatna K.},
  year      = {2025},
  pages     = {3--24},
  publisher = {Springer Nature Switzerland},
  isbn      = {978-3-031-80020-7},
  doi       = {10.1007/978-3-031-80020-7_1},
}
Felix Mächtle, Jan-Niclas Serr, Nils Loose, Jonas Sander, and Thomas Eisenbarth,
OCEAN: Open-World Contrastive Authorship Identification, in Applied Cryptography and Network Security (ACNS) 2025 , 2025.
Weblink: https://arxiv.org/abs/2412.05049
Bibtex: BibTeX
@misc{maechtle2024oceanopenworldcontrastiveauthorship,
      title={OCEAN: Open-World Contrastive Authorship Identification}, 
      author={Felix Mächtle and Jan-Niclas Serr and Nils Loose and Jonas Sander and Thomas Eisenbarth},
      year={2024},
      eprint={2412.05049},
      archivePrefix={arXiv},
      primaryClass={cs.AI},
      url={https://arxiv.org/abs/2412.05049}, 
}
Philipp Schmitz, Tobias Jauch, Alex Wezel, Mohammad R. Fadiheh, Thore Tiemann, Jonah Heller, Thomas Eisenbarth, Dominik Stoffel, and Wolfgang Kunz,
Okapi: Efficiently Safeguarding Speculative Data Accesses in Sandboxed Environments, in Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2025 , ACM, 2025. pp. 1203–1218.
DOI:10.1145/3708821.3733869
Weblink: https://arxiv.org/abs/2312.08156
Bibtex: BibTeX
@inproceedings{schmitz2025okapi,
  author       = {Philipp Schmitz and
                  Tobias Jauch and
                  Alex Wezel and
                  Mohammad Rahmani Fadiheh and
                  Thore Tiemann and
                  Jonah Heller and
                  Thomas Eisenbarth and
                  Dominik Stoffel and
                  Wolfgang Kunz},
  title        = {Okapi: Efficiently Safeguarding Speculative Data Accesses in Sandboxed
                  Environments},
  booktitle    = {Proceedings of the 20th {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2025, Hanoi, Vietnam, August 25-29, 2025},
  pages        = {1203--1218},
  publisher    = {{ACM}},
  year         = {2025},
  url          = {https://doi.org/10.1145/3708821.3733869},
  doi          = {10.1145/3708821.3733869},
  timestamp    = {Wed, 15 Oct 2025 19:23:47 +0200}
}
Felix Mächtle, Ashwath Shetty, Jonas Sander, Nils Loose, Sören Pirk, and Thomas Eisenbarth,
Prompt Pirates Need a Map: Stealing Seeds helps Stealing Prompts, 2025.
Weblink: https://arxiv.org/pdf/2509.09488
Bibtex: BibTeX
@misc{maechtle2025promptpirates,
      title={Prompt Pirates Need a Map: Stealing Seeds helps Stealing Prompts}, 
      author={Felix Mächtle and Ashwath Shetty and Jonas Sander and Nils Loose and Sören Pirk and Thomas Eisenbarth},
      year={2025},
      eprint={2509.09488},
      archivePrefix={arXiv},
      primaryClass={cs.CR},
      url={https://arxiv.org/abs/2509.09488}, 
}
Felix Maurer, Jonas Sander, and Thomas Eisenbarth,
ReDASH: Fast and Efficient Scaling in Arithmetic Garbled Circuits for Secure Outsourced Inference, in Applied Cryptography and Network Security Workshops - ACNS 2025 Satellite Workshops: AIHWS, AIoTS, QSHC, SCI, PrivCrypt, SPIQE, SiMLA, and CIMSS 2025, Munich, Germany, June 23-26, 2025, Revised Selected Papers, Part III , Mark Manulis, Eds. Springer, 2025. pp. 43—51.
DOI:10.1007/978-3-032-01823-6_3
Datei: 978-3-032-01823-6_3
Jonas Sander, and Thomas Eisenbarth,
Silenzio: Secure Non-Interactive Outsourced MLP Training, CoRR , vol. abs/2504.17785, 2025.
DOI:10.48550/ARXIV.2504.17785
Datei: arXiv.2504.17785
Jeremy Boy, Antoon Purnal, Anna Pätschke, Luca Wilke, and Thomas Eisenbarth,
SLasH-DSA: Breaking SLH-DSA Using an Extensible End-To-End Rowhammer Framework, arXiv preprint arXiv:2509.13048 , 2025.
Datei: 2509.13048
Felix Mächtle, Nils Loose, Tim Schulz, Florian Sieck, Jan-Niclas Serr, Ralf Möller, and Thomas Eisenbarth,
Trace Gadgets: Minimizing Code Context for Machine Learning-Based Vulnerability Prediction, 2025.
Weblink: https://arxiv.org/pdf/2504.13676
Bibtex: BibTeX
@article{machtle2025trace,
  title={Trace Gadgets: Minimizing Code Context for Machine Learning-Based Vulnerability Prediction},
  author={M{\"a}chtle, Felix and Loose, Nils and Schulz, Tim and Sieck, Florian and Serr, Jan-Niclas and M{\"o}ller, Ralf and Eisenbarth, Thomas},
  journal={arXiv preprint arXiv:2504.13676},
  year={2025}
}
Anna Pätschke, Jan Wichelmann, and Thomas Eisenbarth,
Zebrafix: Mitigating Memory-Centric Side-Channel Leakage via Interleaving, in 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2025) , IEEE, 2025.
Datei: 2502.09139

2024

Luca Wilke, Florian Sieck, and Thomas Eisenbarth,
TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX, in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security , ACM, Okt.2024.
DOI:10.1145/3658644.3690230
Weblink: https://uzl-its.github.io/tdxdown/
Bibtex: BibTeX
@INPROCEEDINGS{tdxdownCCS24,
  author    = {Luca Wilke and Florian Sieck and Thomas Eisenbarth},
  booktitle = {Proceedings of the 2024 ACM SIGSAC Conference
                on Computer and Communications Security, {CCS} 2024,
                Salt Lake City, UT, USA, October 14--18, 2024},
  title     = {{TDXdown}: Single-Stepping and Instruction Counting Attacks
                against Intel {TDX}},
  year      = {2024},
  doi       = {10.1145/3658644.3690230}
}
Jan Wichelmann, Anja Rabich, Anna Pätschke, and Thomas Eisenbarth,
Obelix: Mitigating Side-Channels Through Dynamic Obfuscation, in 2024 IEEE Symposium on Security and Privacy (S&P) , San Francisco, CA, USA: IEEE, Mai2024. pp. 4182-4199.
DOI:10.1109/SP54263.2024.00261
Weblink: https://doi.ieeecomputersociety.org/10.1109/SP54263.2024.00261
Volodymyr Bezsmertnyi, Jean Michel Cioranesco, and Thomas Eisenbarth,
Duplication-Based Fault Tolerance for RISC-V Embedded Software, in Computer Security - ESORICS 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part IV , Joaquin Garcia Alfaro, Rafal Kozik, Michal Choras, Sokratis K. Katsikas, Eds. Springer, 2024. pp. 86--104.
DOI:10.1007/978-3-031-70903-6_5
Weblink: https://dblp.org/rec/conf/esorics/BezsmertnyiCE24.html
Weblink: https://link.springer.com/chapter/10.1007/978-3-031-70903-6_5
Datei: 978-3-031-70903-6_5
Debopriya Roy Dipta, Thore Tiemann, Berk Gulmezoglu, Eduard Marin, and Thomas Eisenbarth,
Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments, in 9th IEEE European Symposium on Security and Privacy, EuroS&P 2024 , IEEE, 2024. pp. 327-344.
DOI:10.1109/EUROSP60621.2024.00025
Weblink: https://doi.ieeecomputersociety.org/10.1109/EuroSP60621.2024.00025
Weblink: https://doi.org/10.48550/arXiv.2404.10715
Bibtex: BibTeX
@inproceedings{DBLP:conf/eurosp/DiptaTGME24,
  author       = {Debopriya Roy Dipta and
                  Thore Tiemann and
                  Berk G{\"{u}}lmezoglu and
                  Eduard Marin and
                  Thomas Eisenbarth},
  title        = {Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox
                  Environments},
  booktitle    = {9th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2024, Vienna, Austria, July 8-12, 2024},
  pages        = {327--344},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/EuroSP60621.2024.00025},
  doi          = {10.1109/EUROSP60621.2024.00025}
}
Roland Stenger, Steffen Busse, Jonas Sander, Thomas Eisenbarth, and Sebastian Fudickar,
Evaluating the Impact of Face Anonymization Methods on Computer Vision Tasks: A Trade-off Between Privacy and Utility, IEEE Access , pp. 1-1, 2024.
DOI:10.1109/ACCESS.2024.3519441
Weblink: https://ieeexplore.ieee.org/document/10804775
Datei: ACCESS.2024.3519441
Thore Tiemann, Zane Weissman, Thomas Eisenbarth, and Berk Sunar,
Microarchitectural Vulnerabilities Introduced, Exploited, and Accelerated by Heterogeneous FPGA-CPU Platforms, in Security of FPGA-Accelerated Cloud Computing Environments , Szefer, Jakub and Tessier, Russell, Eds. Cham: Springer International Publishing, 2024, pp. 203-237.
DOI:10.1007/978-3-031-45395-3_8
ISBN:978-3-031-45395-3
Bibtex: BibTeX
@inbook{tiemann2024fpgaplatform,
  author      = {Tiemann, Thore
                  and Weissman, Zane
                  and Eisenbarth, Thomas
                  and Sunar, Berk},
  editor      = {Szefer, Jakub
                  and Tessier, Russell},
  title       = {Microarchitectural Vulnerabilities Introduced, 
                  Exploited, and Accelerated by Heterogeneous 
                  {FPGA-CPU} Platforms},
  bookTitle   = {Security of FPGA-Accelerated Cloud Computing 
                  Environments},
  year        = {2024},
  publisher   = {Springer International Publishing},
  pages       = {203--237},
  isbn        = {978-3-031-45395-3},
  doi         = {10.1007/978-3-031-45395-3_8},
  url         = {https://doi.org/10.1007/978-3-031-45395-3_8},
}
Paula Arnold, Sebastian Berndt, Thomas Eisenbarth, and Maximilian Orlt,
Polynomial sharings on two secrets: Buy one, get one free, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 671-706.
DOI:10.46586/tches.v2024.i3.671-706
Datei: 11691
Luca Wilke, Jan Wichelmann, Anja Rabich, and Thomas Eisenbarth,
SEV-Step: A Single-Stepping Framework for AMD-SEV, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 180-206.
DOI:10.46586/tches.v2024.i1.180-206
Datei: 10792
Ida Bruhns, Sebastian Berndt, Jonas Sander, and Thomas Eisenbarth,
Slalom at the Carnival: Privacy-preserving Inference with Masks from Public Knowledge, IACR Commun. Cryptol. , vol. 1, no. 3, pp. 40, 2024.
DOI:10.62056/AKP-49QGXQ
Datei: akp-49qgxq