Prof. Dr.-Ing. Thomas Eisenbarth
Institutsdirektor
Ratzeburger Allee 160
23562 Lübeck
Gebäude 64, 1. OG,
Raum 043
| Email: | thomas.eisenbarth(at)uni-luebeck.de |
| Phone: | +49 451 3101 6600 |
| Fax: | +49 451 3101 6604 |
Kurzbiographie
Thomas Eisenbarth ist Professor für IT-Sicherheit an der Universität zu Lübeck. Er studierte bis 2006 Elektro- und Informationstechnik an der Ruhr-Universität Bochum und promovierte anschließend bis 2009 am Horst-Görtz-Institut für IT-Sicherheit. Ab 2010 forschte er als Assistant Professor am Center for Cryptography and Information Security (CCIS) der Florida Atlantic University. 2012 wechselte er an das Worcester Polytechnic Institute (WPI). Seit August 2017 ist er Direktor des Instituts für IT-Sicherheit an der Universität zu Lübeck.
Seit Oktober 2024 ist er Vorsitzender der MINT-Sektionen.
Seine Forschungsinteressen umfassen:
- Sichere Systeme, Softwaresicherheit und Code-Analyse
- Angewandte Kryptografie & Seitenkanalanalyse
- Trustworthy AI
Konferenz- und Workshoporganisation
- CHES 2022 Program Co-Chair
- CARDIS 2021 General Chair
- CARDIS 2020 General Chair
- SPACE 2017 TPC Co-chair
- CARDIS 2017 TPC Co-chair
- LightSEC 2014 TPC Co-chair
- CHES 2013 General Co-Chair
- WESS 2013 TPC Co-chair
Programmausschuss-Mitgliedschaften
- 2026: ACM CCS, USENIX Security
- 2025: EuroS&P, CHES, ACM CCS, USENIX Security
- 2024: SysTEX, ACM CCS, USENIX Security
- 2023: ACM CCS, USENIX Security, CRYPTO
- 2022: USENIX Security, IEEE Security & Privacy, RWC
- 2021: EuroCRYPT, USENIX Security
- 2020: CRYPTO, EuroCRYPT
- 2019: CARDIS, CHES, PQCrypto, DATE
- 2018: Kangacrypt, CHES, PQCrypto
- 2017: AsiaCRYPT, CHES, VLSISoC, COSADE, SEMS
- 2016: RFIDsec, AsiaCRYPT, CARDIS, TrustED, COSADE, TRUDEVICE
- 2015: CARDIS, CHES, Latincrypt, RFIDsec, COSADE, TrustED
- 2014: CHES, ReConFig, CARDIS, M2MSec, WESS, RFIDsec
- 2013: RFIDsec, ICICS
- 2012: CHES
- 2010: ISC
Publikationen
2024
SWAT: Modular Dynamic Symbolic Execution for Java Applications using Dynamic Instrumentation (Competition Contribution), in Tools and Algorithms for the Construction and Analysis of Systems - 30th International Conference, TACAS 2024, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024, Luxembourg City, Luxembourg, April 6-11, 2024, Proceedings, Part III , Bernd Finkbeiner and Laura Kovács, Eds. Springer, 2024. pp. 399-405.
| DOI: | 10.1007/978-3-031-57256-2_28 |
| Datei: | 978-3-031-57256-2_28 |
2023
TeeJam: Sub-Cache-Line Leakages Strike Back, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , Dez.2023. pp. 457-500.
| DOI: | 10.46586/tches.v2024.i1.457-500 |
| Weblink: | https://tches.iacr.org/index.php/TCHES/article/view/11259 |
| Bibtex: | @article{Sieck_Zhang_Berndt_Chuengsatiansup_Eisenbarth_Yarom_2023,
title={TeeJam: Sub-Cache-Line Leakages Strike Back},
volume={2024},
url={https://tches.iacr.org/index.php/TCHES/article/view/11259},
DOI={10.46586/tches.v2024.i1.457-500},
number={1},
journal={IACR Transactions on Cryptographic Hardware and Embedded Systems},
author={Sieck, Florian and Zhang, Zhiyuan and Berndt, Sebastian and Chuengsatiansup, Chitchanok and Eisenbarth, Thomas and Yarom, Yuval},
year={2023},
month={Dec.},
pages={457–500}
} |
SystemC Model of Power Side-Channel Attacks Against AI Accelerators: Superstition or not?, in 2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD) , IEEE/ACM, Nov.2023. pp. 1-8.
| DOI: | 10.1109/ICCAD57390.2023.10323687 |
| Weblink: | https://arxiv.org/abs/2311.13387 |
IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems, in Proceedings of the 18th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2023 , Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik, Eds. ACM, Jul.2023. pp. 827-840.
| DOI: | 10.1145/3579856.3582838 |
| Weblink: | https://arxiv.org/abs/2202.11623 |
| Datei: | |
| Bibtex: | @inproceedings{tiemann2023iotlbsc,
author = {Thore Tiemann and
Zane Weissman and
Thomas Eisenbarth and
Berk Sunar},
editor = {Joseph K. Liu and
Yang Xiang and
Surya Nepal and
Gene Tsudik},
title = {{IOTLB-SC:} An Accelerator-Independent Leakage Source in Modern Cloud
Systems},
booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
2023},
pages = {827--840},
publisher = {{ACM}},
year = {2023},
url = {https://doi.org/10.1145/3579856.3582838},
doi = {10.1145/3579856.3582838}
} |
"Act natural!": Exchanging Private Messages on Public Blockchains, in 8th IEEE European Symposium on Security and Privacy, EuroS&P 2023 , IEEE, 2023. pp. 292-308.
| DOI: | 10.1109/EuroSP57164.2023.00026 |
| Weblink: | https://doi.ieeecomputersociety.org/10.1109/EuroSP57164.2023.00026 |
| Weblink: | https://eprint.iacr.org/2021/1073 |
| Datei: | Dateilink |
| Bibtex: | @inproceedings{tiemann2023actnatural,
author = {Thore Tiemann and
Sebastian Berndt and
Thomas Eisenbarth and
Maciej Liskiewicz},
title = {"Act natural!": Exchanging Private Messages on Public Blockchains},
booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
2023, Delft, Netherlands, July 3-7, 2023},
pages = {292--308},
publisher = {{IEEE}},
year = {2023},
url = {https://doi.org/10.1109/EuroSP57164.2023.00026},
doi = {10.1109/EUROSP57164.2023.00026}
} |
Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software, in 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023 , Joseph A. Calandrino and Carmela Troncoso, Eds. USENIX Association, 2023. pp. 6789-6806.
| DOI: | 10.48550/arXiv.2210.13124 |
| Datei: | wichelmann |
Combined Fault and Leakage Resilience: Composability, Constructions and Compiler, in Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part III , Helena Handschuh and Anna Lysyanskaya, Eds. Cham: Springer, 2023. pp. 377-409.
| DOI: | 10.1007/978-3-031-38548-3_13 |
| ISBN: | 978-3-031-38548-3 |
| Datei: | 978-3-031-38548-3_13 |
Madvex: Instrumentation-based Adversarial Attacks on Machine Learning Malware Detection, in Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) - 20th International Conference , Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati, Eds. Springer, 2023. pp. 69-88.
| DOI: | 10.1007/978-3-031-35504-2_4 |
| Weblink: | https://arxiv.org/abs/2305.02559 |
MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V, in Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) - 20th International Conference , Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati, Eds. Springer, 2023. pp. 3-23.
| DOI: | 10.1007/978-3-031-35504-2_1 |
| Weblink: | https://arxiv.org/abs/2305.00584 |
Overcoming the Pitfalls of HPC-based Cryptojacking Detection in Presence of GPUs, in Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2023, Charlotte, NC, USA, April 24-26, 2023 , Mohamed Shehab and Maribel Fernandez and Ninghui Li, Eds. ACM, 2023. pp. 177-188.
| DOI: | 10.1145/3577923.3583655 |
| Datei: | 3577923.3583655 |
Subversion-Resilient Authenticated Encryption Without Random Oracles, in Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part II , Mehdi Tibouchi and Xiaofeng Wang, Eds. Springer, 2023. pp. 460-483.
| DOI: | 10.1007/978-3-031-33491-7_17 |
| Datei: | 978-3-031-33491-7_17 |
2022
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP, in 2022 IEEE Symposium on Security and Privacy (SP) , San Francisco, CA, USA: IEEE, Mai2022. pp. 337-351.
| DOI: | 10.1109/SP46214.2022.9833768 |
| Weblink: | https://doi.ieeecomputersociety.org/10.1109/SP46214.2022.9833768 |
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols, in Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security , ACM, 2022. pp. 712-726.
| DOI: | 10.1145/3488932.3517387 |
| ISBN: | 9781450391405 |
| Datei: | 3488932.3517387 |
Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications, in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022 , Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi, Eds. ACM, 2022. pp. 2915-2929.
| DOI: | 10.1145/3548606.3560654 |
| Datei: | 3548606.3560654 |
2021
Side-Channel Protections for Picnic Signatures, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 4, pp. 239-282, Aug. 2021.
| DOI: | 10.46586/tches.v2021.i4.239-282 |
| Datei: | 9066 |
Firmware Security Module: A Framework for Trusted Computing in Automotive Multiprocessors, Journal of Hardware and Systems Security , pp. 103-113, Apr. 2021.
| DOI: | 10.1007/s41635-021-00114-4 |
| Datei: | s41635-021-00114-4 |
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 2, pp. 61-105, Feb. 2021. Cryptology ePrint Archive, Report 2020/443.
| DOI: | 10.46586/tches.v2021.i2.61-105 |
| Datei: | 8788 |
A Formal Approach to Confidentiality Verification in SoCs at the Register Transfer Level, in 58th ACM/IEEE Design Automation Conference, DAC 2021, San Francisco, CA, USA, December 5-9, 2021 , IEEE, 2021. pp. 991-996.
| DOI: | 10.1109/DAC18074.2021.9586248 |
| Datei: | DAC18074.2021.9586248 |
Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged Cache Attacks, in IEEE European Symposium on Security and Privacy, EuroS&P 2021 , IEEE, 2021. pp. 683-700.
| DOI: | 10.1109/EuroSP51992.2021.00051 |
| Weblink: | https://doi.ieeecomputersociety.org/10.1109/EuroSP51992.2021.00051 |
Differential Power Analysis of the Picnic Signature Scheme, in Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings , Jung Hee Cheon and Jean-Pierre Tillich, Eds. Springer, 2021. pp. 177-194.
| DOI: | 10.1007/978-3-030-81293-5_10 |
| Datei: | 978-3-030-81293-5_10 |
Help, My Signal has Bad Device! - Breaking the Signal Messenger's Post-Compromise Security Through a Malicious Device, in Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings , Leyla Bilge and Lorenzo Cavallaro and Giancarlo Pellegrino and Nuno Neves, Eds. Springer, 2021. pp. 88-105.
| DOI: | 10.1007/978-3-030-80825-9_5 |
| Datei: | 978-3-030-80825-9_5 |
Nano Security: From Nano-Electronics to Secure Systems, in Design, Automation & Test in Europe Conference & Exhibition, DATE 2021, Grenoble, France, February 1-5, 2021 , IEEE, 2021. pp. 1334-1339.
| DOI: | 10.23919/DATE51398.2021.9474187 |
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation, in 2021 IEEE Security and Privacy Workshops (SPW) , 2021. pp. 456-466.
| DOI: | 10.1109/SPW53761.2021.00064 |
| Weblink: | https://doi.ieeecomputersociety.org/10.1109/SPW53761.2021.00064 |
| Weblink: | https://uzl-its.github.io/undeserved-trust/ |
| Datei: |
Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries, in CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security , Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi, Eds. ACM, 2021. pp. 2456-2473.
| DOI: | 10.1145/3460120.3484783 |
| Datei: | 3460120.3484783 |
2020
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks, in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, Aug.2020. pp. 1967-1984.
| ISBN: | 978-1-939133-17-5 |
| Datei: | briongos |

- Mitarbeiter*innen
- Thomas Eisenbarth
- Esfandiar Mohammadi
- Sebastian Berndt
- Paula Arnold
- Joseph Bienhüls
- Jeremy Boy
- Till Eifert
- Mohamed ElGhamrawy
- Tim Gellersen
- Jonah Heller
- Kristoffer Hempel
- Eike Hoffmann
- Timothy Imort
- Moritz Kirschte
- Niklas Klinger
- Marven Kummerfeldt
- Johannes Liebenow
- Nils Loose
- Felix Mächtle
- Felix Maurer
- Sebastian Meiser
- Akhil Narahari
- Anna Pätschke
- Pajam Pauls
- Thorsten Peinemann
- Christopher Peredy
- Marcel Pflaeging
- Tammo Polle
- Claudius Pott
- Anja Rabich
- Jonas Sander
- Ines Schiebahn
- Yara Schütt
- Jan-Niclas Serr
- Florian Sieck
- Annika Strang
- Thore Tiemann
- Alexander Treff
- Jan Wichelmann
