Prof. Dr.-Ing. Thomas Eisenbarth
Institutsdirektor
Ratzeburger Allee 160
23562 Lübeck
Gebäude 64, 1. OG,
Raum 043
| Email: | thomas.eisenbarth(at)uni-luebeck.de |
| Phone: | +49 451 3101 6600 |
| Fax: | +49 451 3101 6604 |
Kurzbiographie
Thomas Eisenbarth ist Professor für IT-Sicherheit an der Universität zu Lübeck. Er studierte bis 2006 Elektro- und Informationstechnik an der Ruhr-Universität Bochum und promovierte anschließend bis 2009 am Horst-Görtz-Institut für IT-Sicherheit. Ab 2010 forschte er als Assistant Professor am Center for Cryptography and Information Security (CCIS) der Florida Atlantic University. 2012 wechselte er an das Worcester Polytechnic Institute (WPI). Seit August 2017 ist er Direktor des Instituts für IT-Sicherheit an der Universität zu Lübeck.
Seit Oktober 2024 ist er Vorsitzender der MINT-Sektionen.
Seine Forschungsinteressen umfassen:
- Sichere Systeme, Softwaresicherheit und Code-Analyse
- Angewandte Kryptografie & Seitenkanalanalyse
- Trustworthy AI
Konferenz- und Workshoporganisation
- CHES 2022 Program Co-Chair
- CARDIS 2021 General Chair
- CARDIS 2020 General Chair
- SPACE 2017 TPC Co-chair
- CARDIS 2017 TPC Co-chair
- LightSEC 2014 TPC Co-chair
- CHES 2013 General Co-Chair
- WESS 2013 TPC Co-chair
Programmausschuss-Mitgliedschaften
- 2026: ACM CCS, USENIX Security
- 2025: EuroS&P, CHES, ACM CCS, USENIX Security
- 2024: SysTEX, ACM CCS, USENIX Security
- 2023: ACM CCS, USENIX Security, CRYPTO
- 2022: USENIX Security, IEEE Security & Privacy, RWC
- 2021: EuroCRYPT, USENIX Security
- 2020: CRYPTO, EuroCRYPT
- 2019: CARDIS, CHES, PQCrypto, DATE
- 2018: Kangacrypt, CHES, PQCrypto
- 2017: AsiaCRYPT, CHES, VLSISoC, COSADE, SEMS
- 2016: RFIDsec, AsiaCRYPT, CARDIS, TrustED, COSADE, TRUDEVICE
- 2015: CARDIS, CHES, Latincrypt, RFIDsec, COSADE, TrustED
- 2014: CHES, ReConFig, CARDIS, M2MSec, WESS, RFIDsec
- 2013: RFIDsec, ICICS
- 2012: CHES
- 2010: ISC
Publikationen
2020
TPM-FAIL: TPM meets Timing and Lattice Attacks, in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, Aug.2020. pp. 2057-2073.
| ISBN: | 978-1-939133-17-5 |
| Weblink: | https://tpm.fail/ |
| Datei: | moghimi-tpm |
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2020, no. 3, pp. 169-195, Jun. 2020.
| DOI: | 10.13154/tches.v2020.i3.169-195 |
| Datei: | Dateilink |
| Bibtex: | @article{weissman2020jackhammer,
author = {Zane Weissman and
Thore Tiemann and
Daniel Moghimi and
Evan Custodio and
Thomas Eisenbarth and
Berk Sunar},
title = {JackHammer: Efficient Rowhammer on Heterogeneous {FPGA-CPU} Platforms},
journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
volume = {2020},
number = {3},
pages = {169--195},
year = {2020},
url = {https://doi.org/10.13154/tches.v2020.i3.169-195},
doi = {10.13154/TCHES.V2020.I3.169-195}
} |
SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions, in 2020 IEEE Symposium on Security and Privacy (SP) , Los Alamitos, CA, USA: IEEE Computer Society, Mai2020. pp. 1431-1444.
| DOI: | 10.1109/SP40000.2020.00080 |
| Weblink: | https://uzl-its.github.io/SEVurity/ |
| Weblink: | https://doi.ieeecomputersociety.org/10.1109/SP40000.2020.00080 |
Microarchitectural Isolation Guarantees Through Execution Based Signatures, in XXXV Conference on Design of Circuits and Integrated Systems, DCIS, 2020, Segovia, Spain, November 18-20, 2020 , IEEE, 2020. pp. 1-6.
| DOI: | 10.1109/DCIS51330.2020.9268660 |
| Datei: | DCIS51330.2020.9268660 |
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis, in CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security , Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna, Eds. ACM, 2020. pp. 1033-1049.
| DOI: | 10.1145/3372297.3417889 |
| Datei: | 3372297.3417889 |
2019
FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning, arXiv e-prints , 2019.
| Datei: | 2019arXiv190703651G |
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks, in 28th USENIX Security Symposium (USENIX Security 19) , Santa Clara, CA: USENIX Association, 2019. pp. 621-637.
| ISBN: | 978-1-939133-06-9 |
| Datei: | islam |
Undermining User Privacy on Mobile Devices Using AI, in Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2019. pp. 214-227.
| DOI: | 10.1145/3321705.3329804 |
| Datei: | 3321705.3329804 |
2018
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations, International Journal of Parallel Programming , Nov. 2018.
| Datei: | s10766-018-0611-9 |
IT Security in Lübeck - The design of a modern and future-proof security curriculum, in 2018 12th European Workshop on Microelectronics Education (EWME) , Sep.2018. pp. 79-82.
| DOI: | 10.1109/EWME.2018.8629494 |
| Datei: | 8629494 |
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2018, no. 3, pp. 394-430, Aug. 2018.
| DOI: | 10.13154/tches.v2018.i3.394-430 |
| Datei: | 7281 |
Identifying and Eliminating Side-Channel Leaks in Programmable Systems, IEEE Design Test , vol. 35, no. 1, pp. 74-89, Feb. 2018.
| DOI: | 10.1109/MDAT.2017.2766166 |
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks, IACR Trans. Cryptogr. Hardw. Embed. Syst. , vol. 2018, no. 2, pp. 171--191, 2018.
| DOI: | 10.13154/tches.v2018.i2.171-191 |
| Datei: | tches.v2018.i2.171-191 |
CacheShield: Detecting Cache Attacks through Self-Observation, in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018 , 2018. pp. 224--235.
| DOI: | 10.1145/3176258.3176320 |
| Datei: | 3176258.3176320 |
DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes, 2018.
| Weblink: | https://dblp.uni-trier.de/rec/journals/corr/abs-1808-01352.html?view=bibtex |
| Datei: | 1808.01352 |
MASCAT: Preventing Microarchitectural Attacks Before Distribution, in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018 , 2018. pp. 377--388.
| DOI: | 10.1145/3176258.3176316 |
| Datei: | 3176258.3176316 |
MicroWalk: A Framework for Finding Side Channels in Binaries, in Proceedings of the 34th Annual Computer Security Applications Conference , New York, NY, USA: ACM, 2018. pp. 161--173.
| DOI: | 10.1145/3274694.3274741 |
| Datei: | 3274694.3274741 |
2017
CacheShield: Protecting Legacy Processes Against Cache Attacks, Sep. 2017.
| Datei: | 1709.01795v1 |
uLeech: A side-channel evaluation platform for IoT, in 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS) , Aug.2017. pp. 25-28.
| DOI: | 10.1109/MWSCAS.2017.8052851 |
| Datei: | 8052851 |
AutoLock: Why Cache Attacks on ARM Are Harder Than You Think, in 26th USENIX Security Symposium (USENIX Security 17) , Vancouver, BC: USENIX Association, 2017. pp. 1075--1091.
| ISBN: | 978-1-931971-40-9 |
| Datei: | green |
Cache-Based Application Detection in the Cloud Using Machine Learning, in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2017. pp. 288--300.
| ISBN: | 978-1-4503-4944-4 |
| Datei: | 3052973.3053036 |
CacheZoom: How SGX Amplifies the Power of Cache Attacks, in Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings , 2017. pp. 69--90.
| Datei: | 978-3-319-66787-4_4 |
Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries, CoRR , vol. abs/1709.01552, 2017.
| Datei: | 1709.01552 |
Hit by the Bus: QoS Degradation Attack on Android, in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2017. pp. 716--727.
| ISBN: | 978-1-4503-4944-4 |
| Datei: | 3052973.3053028 |
Lightweight Side Channel Resistance: Threshold Implementations of Simon, IEEE Transactions on Computers , vol. 66, no. 4, pp. 661-671, 2017.
| Datei: | TC.2016.2614504 |

- Mitarbeiter*innen
- Thomas Eisenbarth
- Esfandiar Mohammadi
- Sebastian Berndt
- Paula Arnold
- Joseph Bienhüls
- Jeremy Boy
- Till Eifert
- Mohamed ElGhamrawy
- Tim Gellersen
- Jonah Heller
- Kristoffer Hempel
- Eike Hoffmann
- Timothy Imort
- Moritz Kirschte
- Niklas Klinger
- Marven Kummerfeldt
- Johannes Liebenow
- Nils Loose
- Felix Mächtle
- Felix Maurer
- Sebastian Meiser
- Akhil Narahari
- Anna Pätschke
- Pajam Pauls
- Thorsten Peinemann
- Christopher Peredy
- Marcel Pflaeging
- Tammo Polle
- Claudius Pott
- Anja Rabich
- Jonas Sander
- Ines Schiebahn
- Yara Schütt
- Jan-Niclas Serr
- Florian Sieck
- Annika Strang
- Thore Tiemann
- Alexander Treff
- Jan Wichelmann
