Prof. Dr.-Ing. Thomas Eisenbarth
Institutsdirektor
Ratzeburger Allee 160
23562 Lübeck
Gebäude 64, 1. OG,
Raum 043
Email: | thomas.eisenbarth(at)uni-luebeck.de |
Phone: | +49 451 3101 6600 |
Fax: | +49 451 3101 6604 |
Kurzbiographie
Thomas Eisenbarth ist Professor für IT Sicherheit an der Universität zu Lübeck. Er studierte bis 2006 Elektro- und Informationstechnik an der Ruhr Universität Bochum, wo er bis 2009 am Horst Görtz Institut für IT-Sicherheit promovierte. Ab 2010 forschte er als Assistant Professor am Center for Cryptography and Information Security (CCIS) an der Florida Atlantic University. 2012 wechselte er an das Worcester Polytechnic Institute (WPI). Seit August 2017 ist er als Direktor des Instituts für IT Sicherheit an der Universität zu Lübeck.
Seine Forschungsinteressen umfassen:
- Systemsicherheit und Sichere Mikroarchitekturen
- Angewandte Kryptografie
- Seitenkanalangriffe, physische Sicherheit und Gegenmaßnahmen
- Sicherheit von Cloud und virtualisierten Systemen
Publikationen
2017
uLeech: A side-channel evaluation platform for IoT, in 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS) , 2017. pp. 25-28.
DOI: | 10.1109/MWSCAS.2017.8052851 |
Datei: | 8052851 |
PerfWeb: How to Violate Web Privacy with Hardware Performance Events, in Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II , 2017. pp. 80--97.
Datei: | 978-3-319-66399-9_5 |
Lightweight Side Channel Resistance: Threshold Implementations of Simon, IEEE Transactions on Computers , vol. 66, no. 4, pp. 661-671, 2017.
Datei: | TC.2016.2614504 |
Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries, CoRR , vol. abs/1709.01552, 2017.
Datei: | 1709.01552 |
Hit by the Bus: QoS Degradation Attack on Android, in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2017. pp. 716--727.
ISBN: | 978-1-4503-4944-4 |
Datei: | 3052973.3053028 |
CacheZoom: How SGX Amplifies the Power of Cache Attacks, in Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings , 2017. pp. 69--90.
Datei: | 978-3-319-66787-4_4 |
Cache-Based Application Detection in the Cloud Using Machine Learning, in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2017. pp. 288--300.
ISBN: | 978-1-4503-4944-4 |
Datei: | 3052973.3053036 |
AutoLock: Why Cache Attacks on ARM Are Harder Than You Think, in 26th USENIX Security Symposium (USENIX Security 17) , Vancouver, BC: USENIX Association, 2017. pp. 1075--1091.
ISBN: | 978-1-931971-40-9 |
Datei: | green |
2016
Efficient, Adversarial Neighbor Discovery Using Logical Channels on Microsoft Azure, in Proceedings of the 32nd Annual Conference on Computer Security Applications , New York, NY, USA: ACM, 2016. pp. 436--447.
DOI: | 10.1145/2991079.2991113 |
ISBN: | 978-1-4503-4771-6 |
Datei: | NeighborDiscoveryAzure%20ACSAC2016.pdf |
SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs, in Smart Card Research and Advanced Applications - 15th International Conference, CARDIS 2016, Cannes, France, November 7-9, 2016, Revised Selected Papers , 2016. pp. 73--88.
DOI: | 10.1007/978-3-319-54669-8_5 |
Datei: | 978-3-319-54669-8_5 |
Simpler, Faster, and More Robust T-Test Based Leakage Detection, Standaert, Francois-Xavier and Oswald, Elisabeth, Eds. Cham: Springer International Publishing, 2016, pp. 163--183.
ISBN: | 978-3-319-43283-0 |
Datei: | 978-3-319-43283-0_10 |
Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem, IEEE Trans. Information Forensics and Security , vol. 11, no. 6, pp. 1093--1105, 2016.
Datei: | TIFS.2015.2509944 |
A honeypot system for wearable networks, in 2016 IEEE 37th Sarnoff Symposium , 2016. pp. 199-201.
Datei: | SARNOF.2016.7846755 |
Cross-VM Cache Attacks on AES, IEEE Trans. Multi-Scale Computing Systems , vol. 2, no. 3, pp. 211--222, 2016.
Datei: | TMSCS.2016.2550438 |
A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile---and Why It Is Not, Cheon, Jung Hee and Takagi, Tsuyoshi, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016, pp. 819--843.
ISBN: | 978-3-662-53887-6 |
Datei: | 10.1007%2F978-3-662-53887-6_30 |
Cross Processor Cache Attacks, in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2016. pp. 353--364.
DOI: | 10.1145/2897845.2897867 |
ISBN: | 978-1-4503-4233-9 |
Datei: | 2897845.2897867 |
Cache Attacks Enable Bulk Key Recovery on the Cloud, in Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings , 2016. pp. 368--388.
DOI: | 10.1007/978-3-662-53140-2_18 |
Datei: | 978-3-662-53140-2_18 |
Co-location Detection on the Cloud, in Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers , 2016. pp. 19--34.
Datei: | 978-3-319-43283-0_2 |
2015
Masking Large Keys in Hardware: A Masked Implementation of McEliece, in Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers , 2015. pp. 293--309.
Datei: | 978-3-319-31301-6_18 |
Systematic Reverse Engineering of Cache Slice Selection in Intel Processors, in 2015 Euromicro Conference on Digital System Design, DSD 2015, Madeira, Portugal, August 26-28, 2015 , 2015. pp. 629--636.
Datei: | DSD.2015.56 |
SSA: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES, in 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015 , 2015. pp. 591--604.
Datei: | SP.2015.42 |
Power analysis of the t-private logic style for FPGAs, in IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015 , 2015. pp. 68--71.
Datei: | HST.2015.7140239 |
Near Collision Side Channel Attacks, in Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers , 2015. pp. 277--292.
Datei: | 978-3-319-31301-6_17 |
Silent Simon: A threshold implementation under 100 slices, in IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015 , 2015. pp. 1--6.
Datei: | HST.2015.7140227 |
Lucky 13 Strikes Back, in Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015 , 2015. pp. 85--96.
Datei: | 2714576.2714625 |
- Mitarbeiter*innen
- Thomas Eisenbarth
- Esfandiar Mohammadi
- Paula Arnold
- Jeremy Boy
- Finn Burmester
- Till Eifert
- Tim Gellersen
- Jonah Heller
- Kristoffer Hempel
- Timothy Imort
- Moritz Kirschte
- Marven Kummerfeldt
- Johannes Liebenow
- Nils Loose
- Felix Mächtle
- Felix Maurer
- Sebastian Meiser
- Anna Pätschke
- Pajam Pauls
- Thorsten Peinemann
- Christopher Peredy
- Tammo Polle
- Yannik Potdevin
- Claudius Pott
- Anja Rabich
- Jonas Sander
- Ines Schiebahn
- Yara Schütt
- Jan-Niclas Serr
- Florian Sieck
- Annika Strang
- Thore Tiemann
- Alexander Treff
- Jan Wichelmann
- Luca Wilke