Prof. Dr.-Ing. Thomas Eisenbarth

Institutsdirektor


Ratzeburger Allee 160
23562 Lübeck
Gebäude 64, 1. OG, Raum 043

Email:thomas.eisenbarth(at)uni-luebeck.de
Phone:+49 451 3101 6600
Fax:+49 451 3101 6604

Kurzbiographie

Thomas Eisenbarth ist Professor für IT Sicherheit an der Universität zu Lübeck. Er studierte bis 2006 Elektro- und Informationstechnik an der Ruhr Universität Bochum, wo er bis 2009 am Horst Görtz Institut für IT-Sicherheit promovierte. Ab 2010 forschte er als Assistant Professor am Center for Cryptography and Information Security (CCIS) an der Florida Atlantic University. 2012 wechselte er an das Worcester Polytechnic Institute (WPI). Seit August 2017 ist er als Direktor des Instituts für IT Sicherheit an der Universität zu Lübeck.

Seine Forschungsinteressen umfassen:

  • Systemsicherheit und Sichere Mikroarchitekturen
  • Angewandte Kryptografie
  • Seitenkanalangriffe, physische Sicherheit und Gegenmaßnahmen
  • Sicherheit von Cloud und virtualisierten Systemen

Publikationen

2016

  • Gorka Irazoqui, Thomas Eisenbarth and Berk Sunar,
    Cross Processor Cache Attacks in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2016. pp. 353--364.
    DOI:10.1145/2897845.2897867
    ISBN:978-1-4503-4233-9
    Datei: http://doi.acm.org/10.1145/2897845.2897867

  • A. M. Leonard, H. Cai, K. K. Venkatasubramanian, M. Ali and Thomas Eisenbarth,
    A honeypot system for wearable networks in 2016 IEEE 37th Sarnoff Symposium , 2016. pp. 199-201.
    Datei: https://doi.org/10.1109/SARNOF.2016.7846755

  • Mehmet Sinan Inci, Berk Gulmezoglu, Thomas Eisenbarth and Berk Sunar,
    Co-location Detection on the Cloud in Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers , 2016. pp. 19--34.
    Datei: https://doi.org/10.1007/978-3-319-43283-0_2

  • Cong Chen, Mohammad Farmani and Thomas Eisenbarth,
    A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile---and Why It Is Not , Cheon, Jung Hee and Takagi, Tsuyoshi, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016, pp. 819--843.
    ISBN:978-3-662-53887-6
    Datei: https://link.springer.com/chapter/10.1007%2F978-3-662-53887-6_30

  • Mehmet Sinan Inci, Berk Gulmezoglu, Gorka Irazoqui, Thomas Eisenbarth and Berk Sunar,
    Cache Attacks Enable Bulk Key Recovery on the Cloud in Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings , 2016. pp. 368--388.
    DOI:10.1007/978-3-662-53140-2_18
    Datei: https://doi.org/10.1007/978-3-662-53140-2_18

  • 2015

  • Cong Chen, Thomas Eisenbarth, Ingo Maurich and Rainer Steinwandt,
    Masking Large Keys in Hardware: A Masked Implementation of McEliece in Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers , 2015. pp. 293--309.
    Datei: https://doi.org/10.1007/978-3-319-31301-6_18

  • Gorka Irazoqui, Thomas Eisenbarth and Berk Sunar,
    Systematic Reverse Engineering of Cache Slice Selection in Intel Processors in 2015 Euromicro Conference on Digital System Design, DSD 2015, Madeira, Portugal, August 26-28, 2015 , 2015. pp. 629--636.
    Datei: https://doi.org/10.1109/DSD.2015.56

  • Gorka Irazoqui, Thomas Eisenbarth and Berk Sunar,
    SSA: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES in 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015 , 2015. pp. 591--604.
    Datei: https://doi.org/10.1109/SP.2015.42

  • Zachary N. Goddard, Nicholas LaJeunesse and Thomas Eisenbarth,
    Power analysis of the t-private logic style for FPGAs in IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015 , 2015. pp. 68--71.
    Datei: https://doi.org/10.1109/HST.2015.7140239

  • Baris Ege, Thomas Eisenbarth and Lejla Batina,
    Near Collision Side Channel Attacks in Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers , 2015. pp. 277--292.
    Datei: https://doi.org/10.1007/978-3-319-31301-6_17

  • Aria Shahverdi, Mostafa Taha and Thomas Eisenbarth,
    Silent Simon: A threshold implementation under 100 slices in IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015 , 2015. pp. 1--6.
    Datei: https://doi.org/10.1109/HST.2015.7140227

  • Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth and Berk Sunar,
    Lucky 13 Strikes Back in Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015 , 2015. pp. 85--96.
    Datei: http://doi.acm.org/10.1145/2714576.2714625

  • Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth and Berk Sunar,
    Know Thy Neighbor: Crypto Library Detection in Cloud , PoPETs , vol. 2015, no. 1, pp. 25--40, 2015.
    Datei: http://www.degruyter.com/view/j/popets.2015.1.issue-1/popets-2015-0003/popets-2015-0003.xml

  • Thomas Eisenbarth, Yunsi Fei and Dimitrios Serpanos,
    Guest Editorial: Special Section on Embedded System Security , IEEE Embedded Systems Letters , vol. 7, no. 1, pp. 1-2, 2015.
    Datei: https://doi.org/10.1109/LES.2015.2404940

  • Xin Ye, Mostafa Taha, Cong Chen and Thomas Eisenbarth,
    Faster Leakage Detection and Exploitation in Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015 , 2015. pp. 21--29.
    DOI:10.1145/2808414.2808419
    Datei: https://www.researchgate.net/publication/301419853_Faster_Leakage_Detection_and_Exploitation

  • Cong Chen, Thomas Eisenbarth, Ingo Maurich and Rainer Steinwandt,
    Differential Power Analysis of a McEliece Cryptosystem in Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers , 2015. pp. 538--556.
    DOI:10.1007/978-3-319-28166-7_26
    Datei: http://eprint.iacr.org/2014/534

  • Berk Gulmezoglu, Mehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth and Berk Sunar,
    A Faster and More Realistic Flush+Reload Attack on AES in Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers , 2015. pp. 111--126.
    Datei: https://doi.org/10.1007/978-3-319-21476-4_8

  • Thomas Eisenbarth, Aaron Meyerowitz and Rainer Steinwandt,
    On the security margin of MAC striping , Inf. Process. Lett. , vol. 115, no. 11, pp. 899--902, 2015.
    Datei: https://doi.org/10.1016/j.ipl.2015.05.009

  • 2014

  • Cong Cong Chen, Thomas Eisenbarth, Aria Shahverdi and Xin Ye,
    Balanced Encoding to Mitigate Power Analysis: A Case Study , IACR Cryptology ePrint Archive , vol. 2014, pp. 952, 2014.
    Datei: http://eprint.iacr.org/2014/952

  • Xin Ye, Thomas Eisenbarth and William Martin,
    Bounded, yet Sufficient? How to Determine Whether Limited Side Channel Information Enables Key Recovery in Smart Card Research and Advanced Applications - 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers , 2014. pp. 215--232.
    Datei: https://doi.org/10.1007/978-3-319-16763-3_13

  • Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth and Berk Sunar,
    Fine Grain Cross-VM Attacks on Xen and VMware in 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, BDCloud 2014, Sydney, Australia, December 3-5, 2014 , 2014. pp. 737--744.
    DOI:10.1109/BDCloud.2014.102
    Datei: http://eprint.iacr.org/2014/248

  • Xin Ye, Cong Chen and Thomas Eisenbarth,
    Non-Linear Collision Analysis in Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers , 2014. pp. 198--214.
    Datei: https://doi.org/10.1007/978-3-319-13066-8_13

  • Yarkin Doröz, Aria Shahverdi, Thomas Eisenbarth and Berk Sunar,
    Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince in Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers , 2014. pp. 208--220.
    Datei: https://doi.org/10.1007/978-3-662-44774-1_17

  • Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth and Berk Sunar,
    Wait a minute! A fast, Cross-VM attack on AES , IACR Cryptology ePrint Archive , vol. 2014, pp. 435, 2014.
    Datei: http://eprint.iacr.org/2014/435

  • 2013

  • Thomas Eisenbarth, Ingo Maurich, Christof Paar and Xin Ye,
    A Performance Boost for Hash-Based Signatures in Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday , 2013. pp. 166--182.
    Datei: https://doi.org/10.1007/978-3-642-42001-6_13