Prof. Dr.-Ing. Thomas Eisenbarth
Institutsdirektor
Ratzeburger Allee 160
23562 Lübeck
Gebäude 64, 1. OG,
Raum 043
| Email: | thomas.eisenbarth(at)uni-luebeck.de |
| Phone: | +49 451 3101 6600 |
| Fax: | +49 451 3101 6604 |
Kurzbiographie
Thomas Eisenbarth ist Professor für IT-Sicherheit an der Universität zu Lübeck. Er studierte bis 2006 Elektro- und Informationstechnik an der Ruhr-Universität Bochum und promovierte anschließend bis 2009 am Horst-Görtz-Institut für IT-Sicherheit. Ab 2010 forschte er als Assistant Professor am Center for Cryptography and Information Security (CCIS) der Florida Atlantic University. 2012 wechselte er an das Worcester Polytechnic Institute (WPI). Seit August 2017 ist er Direktor des Instituts für IT-Sicherheit an der Universität zu Lübeck.
Seit Oktober 2024 ist er Vorsitzender der MINT-Sektionen.
Seine Forschungsinteressen umfassen:
- Sichere Systeme, Softwaresicherheit und Code-Analyse
- Angewandte Kryptografie & Seitenkanalanalyse
- Trustworthy AI
Konferenz- und Workshoporganisation
- CHES 2022 Program Co-Chair
- CARDIS 2021 General Chair
- CARDIS 2020 General Chair
- SPACE 2017 TPC Co-chair
- CARDIS 2017 TPC Co-chair
- LightSEC 2014 TPC Co-chair
- CHES 2013 General Co-Chair
- WESS 2013 TPC Co-chair
Programmausschuss-Mitgliedschaften
- 2026: ACM CCS, USENIX Security
- 2025: EuroS&P, CHES, ACM CCS, USENIX Security
- 2024: SysTEX, ACM CCS, USENIX Security
- 2023: ACM CCS, USENIX Security, CRYPTO
- 2022: USENIX Security, IEEE Security & Privacy, RWC
- 2021: EuroCRYPT, USENIX Security
- 2020: CRYPTO, EuroCRYPT
- 2019: CARDIS, CHES, PQCrypto, DATE
- 2018: Kangacrypt, CHES, PQCrypto
- 2017: AsiaCRYPT, CHES, VLSISoC, COSADE, SEMS
- 2016: RFIDsec, AsiaCRYPT, CARDIS, TrustED, COSADE, TRUDEVICE
- 2015: CARDIS, CHES, Latincrypt, RFIDsec, COSADE, TrustED
- 2014: CHES, ReConFig, CARDIS, M2MSec, WESS, RFIDsec
- 2013: RFIDsec, ICICS
- 2012: CHES
- 2010: ISC
Publikationen
2017
PerfWeb: How to Violate Web Privacy with Hardware Performance Events, in Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II , 2017. pp. 80--97.
| Datei: | 978-3-319-66399-9_5 |
2016
A honeypot system for wearable networks, in 2016 IEEE 37th Sarnoff Symposium , Sep.2016. pp. 199-201.
| Datei: | SARNOF.2016.7846755 |
A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile---and Why It Is Not, Cheon, Jung Hee and Takagi, Tsuyoshi, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016, pp. 819--843.
| ISBN: | 978-3-662-53887-6 |
| Datei: | 10.1007%2F978-3-662-53887-6_30 |
Cache Attacks Enable Bulk Key Recovery on the Cloud, in Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings , 2016. pp. 368--388.
| DOI: | 10.1007/978-3-662-53140-2_18 |
| Datei: | 978-3-662-53140-2_18 |
Co-location Detection on the Cloud, in Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers , 2016. pp. 19--34.
| Datei: | 978-3-319-43283-0_2 |
Cross Processor Cache Attacks, in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2016. pp. 353--364.
| DOI: | 10.1145/2897845.2897867 |
| ISBN: | 978-1-4503-4233-9 |
| Datei: | 2897845.2897867 |
Cross-VM Cache Attacks on AES, IEEE Trans. Multi-Scale Computing Systems , vol. 2, no. 3, pp. 211--222, 2016.
| Datei: | TMSCS.2016.2550438 |
Efficient, Adversarial Neighbor Discovery Using Logical Channels on Microsoft Azure, in Proceedings of the 32nd Annual Conference on Computer Security Applications , New York, NY, USA: ACM, 2016. pp. 436--447.
| DOI: | 10.1145/2991079.2991113 |
| ISBN: | 978-1-4503-4771-6 |
| Datei: |
Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem, IEEE Trans. Information Forensics and Security , vol. 11, no. 6, pp. 1093--1105, 2016.
| Datei: | TIFS.2015.2509944 |
Simpler, Faster, and More Robust T-Test Based Leakage Detection, Standaert, Francois-Xavier and Oswald, Elisabeth, Eds. Cham: Springer International Publishing, 2016, pp. 163--183.
| ISBN: | 978-3-319-43283-0 |
| Datei: | 978-3-319-43283-0_10 |
SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs, in Smart Card Research and Advanced Applications - 15th International Conference, CARDIS 2016, Cannes, France, November 7-9, 2016, Revised Selected Papers , 2016. pp. 73--88.
| DOI: | 10.1007/978-3-319-54669-8_5 |
| Datei: | 978-3-319-54669-8_5 |
2015
Guest Editorial: Special Section on Embedded System Security, IEEE Embedded Systems Letters , vol. 7, no. 1, pp. 1-2, Mä. 2015.
| Datei: | LES.2015.2404940 |
A Faster and More Realistic Flush+Reload Attack on AES, in Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers , 2015. pp. 111--126.
| Datei: | 978-3-319-21476-4_8 |
Differential Power Analysis of a McEliece Cryptosystem, in Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers , 2015. pp. 538--556.
| DOI: | 10.1007/978-3-319-28166-7_26 |
| Datei: | 534 |
Faster Leakage Detection and Exploitation, in Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015 , 2015. pp. 21--29.
| DOI: | 10.1145/2808414.2808419 |
| Datei: | 301419853_Faster_Leakage_Detection_and_Exploitation |
Know Thy Neighbor: Crypto Library Detection in Cloud, PoPETs , vol. 2015, no. 1, pp. 25--40, 2015.
| Datei: | popets-2015-0003.xml |
Lucky 13 Strikes Back, in Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015 , 2015. pp. 85--96.
| Datei: | 2714576.2714625 |
Masking Large Keys in Hardware: A Masked Implementation of McEliece, in Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers , 2015. pp. 293--309.
| Datei: | 978-3-319-31301-6_18 |
Near Collision Side Channel Attacks, in Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers , 2015. pp. 277--292.
| Datei: | 978-3-319-31301-6_17 |
On the security margin of MAC striping, Inf. Process. Lett. , vol. 115, no. 11, pp. 899--902, 2015.
| Datei: | j.ipl.2015.05.009 |
Power analysis of the t-private logic style for FPGAs, in IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015 , 2015. pp. 68--71.
| Datei: | HST.2015.7140239 |
Silent Simon: A threshold implementation under 100 slices, in IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015 , 2015. pp. 1--6.
| Datei: | HST.2015.7140227 |
SSA: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES, in 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015 , 2015. pp. 591--604.
| Datei: | SP.2015.42 |
Systematic Reverse Engineering of Cache Slice Selection in Intel Processors, in 2015 Euromicro Conference on Digital System Design, DSD 2015, Madeira, Portugal, August 26-28, 2015 , 2015. pp. 629--636.
| Datei: | DSD.2015.56 |
2014
Balanced Encoding to Mitigate Power Analysis: A Case Study, IACR Cryptology ePrint Archive , vol. 2014, pp. 952, 2014.
| Datei: | 952 |

- Mitarbeiter*innen
- Thomas Eisenbarth
- Esfandiar Mohammadi
- Sebastian Berndt
- Paula Arnold
- Joseph Bienhüls
- Jeremy Boy
- Till Eifert
- Mohamed ElGhamrawy
- Tim Gellersen
- Jonah Heller
- Kristoffer Hempel
- Eike Hoffmann
- Timothy Imort
- Moritz Kirschte
- Niklas Klinger
- Marven Kummerfeldt
- Johannes Liebenow
- Nils Loose
- Felix Mächtle
- Felix Maurer
- Sebastian Meiser
- Akhil Narahari
- Anna Pätschke
- Pajam Pauls
- Thorsten Peinemann
- Christopher Peredy
- Marcel Pflaeging
- Tammo Polle
- Claudius Pott
- Anja Rabich
- Jonas Sander
- Ines Schiebahn
- Yara Schütt
- Jan-Niclas Serr
- Florian Sieck
- Annika Strang
- Thore Tiemann
- Alexander Treff
- Jan Wichelmann
