


default search action
Thomas Eisenbarth 0001
Person information
- affiliation: University of Lübeck, Germany
- affiliation (former): Worcester Polytechnic Institute, MA, USA
- affiliation (former): Florida Atlantic University, FL, USA
- affiliation (Ph.D.): Ruhr University Bochum, Germany
Other persons with the same name
- Thomas Eisenbarth 0002 — University of Augsburg, Germany
- Thomas Eisenbarth 0003 — University of Stuttgart, Germany
- Thomas Eisenbarth 0004 — TU Munich, Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j27]Roland Stenger
, Steffen Busse
, Jonas Sander, Thomas Eisenbarth
, Sebastian J. F. Fudickar
:
Evaluating the Impact of Face Anonymization Methods on Computer Vision Tasks: A Trade-Off Between Privacy and Utility. IEEE Access 13: 11070-11079 (2025) - [j26]Jonas Sander, Sebastian Berndt, Ida Bruhns, Thomas Eisenbarth:
Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2025(1): 420-449 (2025) - 2024
- [j25]Ida Bruhns
, Sebastian Berndt
, Jonas Sander
, Thomas Eisenbarth
:
Slalom at the Carnival: Privacy-preserving Inference with Masks from Public Knowledge. IACR Commun. Cryptol. 1(3): 40 (2024) - [j24]Luca Wilke
, Jan Wichelmann, Anja Rabich, Thomas Eisenbarth
:
SEV-Step A Single-Stepping Framework for AMD-SEV. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1): 180-206 (2024) - [j23]Florian Sieck, Zhiyuan Zhang, Sebastian Berndt, Chitchanok Chuengsatiansup, Thomas Eisenbarth
, Yuval Yarom:
TeeJam: Sub-Cache-Line Leakages Strike Back. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1): 457-500 (2024) - [j22]Paula Arnold, Sebastian Berndt, Thomas Eisenbarth
, Maximilian Orlt:
Polynomial sharings on two secrets: Buy one, get one free. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 671-706 (2024) - [c90]Georg T. Becker
, Thomas Eisenbarth
, Hannes Federrath
, Mathias Fischer
, Nils Loose
, Simon Ott
, Joana Pecholt
, Stephan Marwedel
, Dominik Meyer
, Jan Stijohann
, Anum Talpur
, Matthias Vallentin
:
SOVEREIGN - Towards a Holistic Approach to Critical Infrastructure Protection. ARES 2024: 144:1-144:9 - [c89]Iliana Fayolle
, Jan Wichelmann
, Anja Köhl, Walter Rudametkin
, Thomas Eisenbarth
, Clémentine Maurice
:
Semi-automated and Easily Interpretable Side-Channel Analysis for Modern JavaScript. CANS (2) 2024: 25-46 - [c88]Luca Wilke
, Florian Sieck
, Thomas Eisenbarth
:
TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX. CCS 2024: 79-93 - [c87]Volodymyr Bezsmertnyi, Jean-Michel Cioranesco, Thomas Eisenbarth
:
Duplication-Based Fault Tolerance for RISC-V Embedded Software. ESORICS (4) 2024: 86-104 - [c86]Debopriya Roy Dipta, Thore Tiemann, Berk Gülmezoglu
, Eduard Marin, Thomas Eisenbarth
:
Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments. EuroS&P 2024: 327-344 - [c85]Zane Weissman
, Thore Tiemann
, Thomas Eisenbarth
, Berk Sunar
:
Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms. ICISS 2024: 3-24 - [c84]Jan Wichelmann, Anja Rabich, Anna Pätschke, Thomas Eisenbarth
:
Obelix: Mitigating Side-Channels Through Dynamic Obfuscation. SP 2024: 4182-4199 - [c83]Nils Loose, Felix Mächtle, Florian Sieck, Thomas Eisenbarth
:
SWAT: Modular Dynamic Symbolic Execution for Java Applications using Dynamic Instrumentation (Competition Contribution). TACAS (3) 2024: 399-405 - [i69]Debopriya Roy Dipta, Thore Tiemann, Berk Gülmezoglu, Eduard Marin, Thomas Eisenbarth:
Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments. CoRR abs/2404.10715 (2024) - [i68]Felix Mächtle, Jan-Niclas Serr, Nils Loose, Jonas Sander, Thomas Eisenbarth:
OCEAN: Open-World Contrastive Authorship Identification. CoRR abs/2412.05049 (2024) - [i67]Paula Arnold, Sebastian Berndt, Thomas Eisenbarth, Maximilian Orlt:
Polynomial sharings on two secrets: Buy one, get one free. IACR Cryptol. ePrint Arch. 2024: 1025 (2024) - 2023
- [c82]Pascal Bemmann, Sebastian Berndt, Denis Diemert, Thomas Eisenbarth
, Tibor Jager:
Subversion-Resilient Authenticated Encryption Without Random Oracles. ACNS 2023: 460-483 - [c81]Thore Tiemann
, Zane Weissman
, Thomas Eisenbarth
, Berk Sunar
:
IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems. AsiaCCS 2023: 827-840 - [c80]Claudius Pott
, Berk Gülmezoglu
, Thomas Eisenbarth
:
Overcoming the Pitfalls of HPC-based Cryptojacking Detection in Presence of GPUs. CODASPY 2023: 177-188 - [c79]Sebastian Berndt, Thomas Eisenbarth
, Sebastian Faust, Marc Gourjon, Maximilian Orlt, Okan Seker:
Combined Fault and Leakage Resilience: Composability, Constructions and Compiler. CRYPTO (3) 2023: 377-409 - [c78]Jan Wichelmann, Christopher Peredy, Florian Sieck, Anna Pätschke
, Thomas Eisenbarth
:
MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V. DIMVA 2023: 3-23 - [c77]Nils Loose
, Felix Mächtle, Claudius Pott, Volodymyr Bezsmertnyi, Thomas Eisenbarth
:
Madvex: Instrumentation-Based Adversarial Attacks on Machine Learning Malware Detection. DIMVA 2023: 69-88 - [c76]Thore Tiemann
, Sebastian Berndt, Thomas Eisenbarth
, Maciej Liskiewicz:
"Act natural!": Exchanging Private Messages on Public Blockchains. EuroS&P 2023: 292-308 - [c75]Andrija Neskovic
, Saleh Mulhem, Alexander Treff
, Rainer Buchty, Thomas Eisenbarth
, Mladen Berekovic:
SystemC Model of Power Side-Channel Attacks Against AI Accelerators: Superstition or not? ICCAD 2023: 1-8 - [c74]Jan Wichelmann, Anna Pätschke
, Luca Wilke
, Thomas Eisenbarth
:
Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software. USENIX Security Symposium 2023: 6789-6806 - [i66]Jonas Sander, Sebastian Berndt, Ida Bruhns, Thomas Eisenbarth:
DASH: Accelerating Distributed Private Machine Learning Inference with Arithmetic Garbled Circuits. CoRR abs/2302.06361 (2023) - [i65]Jan Wichelmann, Christopher Peredy, Florian Sieck, Anna Pätschke, Thomas Eisenbarth:
MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V. CoRR abs/2305.00584 (2023) - [i64]Nils Loose, Felix Mächtle, Claudius Pott, Volodymyr Bezsmertnyi, Thomas Eisenbarth:
Madvex: Instrumentation-based Adversarial Attacks on Machine Learning Malware Detection. CoRR abs/2305.02559 (2023) - [i63]Luca Wilke, Jan Wichelmann, Anja Rabich, Thomas Eisenbarth:
SEV-Step: A Single-Stepping Framework for AMD-SEV. CoRR abs/2307.14757 (2023) - [i62]Andrija Neskovic
, Saleh Mulhem, Alexander Treff, Rainer Buchty, Thomas Eisenbarth, Mladen Berekovic:
SystemC Model of Power Side-Channel Attacks Against AI Accelerators: Superstition or not? CoRR abs/2311.13387 (2023) - [i61]Zane Weissman, Thore Tiemann, Thomas Eisenbarth, Berk Sunar:
Microarchitectural Security of AWS Firecracker VMM for Serverless Cloud Platforms. CoRR abs/2311.15999 (2023) - [i60]Philipp Schmitz, Tobias Jauch
, Alex Wezel, Mohammad Rahmani Fadiheh, Thore Tiemann, Jonah Heller, Thomas Eisenbarth, Dominik Stoffel, Wolfgang Kunz:
Okapi: A Lightweight Architecture for Secure Speculation Exploiting Locality of Memory Accesses. CoRR abs/2312.08156 (2023) - [i59]Pascal Bemmann, Sebastian Berndt, Denis Diemert, Thomas Eisenbarth, Tibor Jager:
Subversion-Resilient Authenticated Encryption without Random Oracles. IACR Cryptol. ePrint Arch. 2023: 764 (2023) - [i58]Sebastian Berndt, Thomas Eisenbarth, Sebastian Faust, Marc Gourjon, Maximilian Orlt, Okan Seker:
Combined Fault and Leakage Resilience: Composability, Constructions and Compiler. IACR Cryptol. ePrint Arch. 2023: 1143 (2023) - 2022
- [c73]Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving, Thomas Eisenbarth
:
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols. AsiaCCS 2022: 712-726 - [c72]Jan Wichelmann, Florian Sieck, Anna Pätschke
, Thomas Eisenbarth
:
Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications. CCS 2022: 2915-2929 - [c71]Mengyuan Li, Luca Wilke
, Jan Wichelmann, Thomas Eisenbarth
, Radu Teodorescu, Yinqian Zhang:
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP. SP 2022: 337-351 - [i57]Thore Tiemann, Zane Weissman, Thomas Eisenbarth, Berk Sunar:
IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems. CoRR abs/2202.11623 (2022) - [i56]Jan Wichelmann, Florian Sieck, Anna Pätschke, Thomas Eisenbarth:
Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications. CoRR abs/2208.14942 (2022) - [i55]Jan Wichelmann, Anna Pätschke, Luca Wilke, Thomas Eisenbarth:
Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software. CoRR abs/2210.13124 (2022) - 2021
- [j21]Claudius Pott
, Philipp Jungklass, David Jacek Csejka, Thomas Eisenbarth, Marco Siebert:
Firmware Security Module. J. Hardw. Syst. Secur. 5(2): 103-113 (2021) - [j20]Okan Seker, Thomas Eisenbarth
, Maciej Liskiewicz:
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(2): 61-105 (2021) - [j19]Diego F. Aranha
, Sebastian Berndt, Thomas Eisenbarth
, Okan Seker, Akira Takahashi
, Luca Wilke
, Greg Zaverucha
:
Side-Channel Protections for Picnic Signatures. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 239-282 (2021) - [c70]Florian Sieck
, Sebastian Berndt, Jan Wichelmann
, Thomas Eisenbarth
:
Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries. CCS 2021: 2456-2473 - [c69]Johannes Müller, Mohammad Rahmani Fadiheh, Anna Lena Duque Antón
, Thomas Eisenbarth
, Dominik Stoffel, Wolfgang Kunz:
A Formal Approach to Confidentiality Verification in SoCs at the Register Transfer Level. DAC 2021: 991-996 - [c68]Ilia Polian, Frank Altmann
, Tolga Arul, Christian Boit, Ralf Brederlow
, Lucas Davi, Rolf Drechsler
, Nan Du
, Thomas Eisenbarth
, Tim Güneysu, Sascha Hermann, Matthias Hiller, Rainer Leupers, Farhad Merchant, Thomas Mussenbrock
, Stefan Katzenbeisser, Akash Kumar
, Wolfgang Kunz, Thomas Mikolajick
, Vivek Pachauri
, Jean-Pierre Seifert, Frank Sill Torres, Jens Trommer
:
Nano Security: From Nano-Electronics to Secure Systems. DATE 2021: 1334-1339 - [c67]Jan Wichelmann
, Sebastian Berndt, Claudius Pott, Thomas Eisenbarth
:
Help, My Signal has Bad Device! - Breaking the Signal Messenger's Post-Compromise Security Through a Malicious Device. DIMVA 2021: 88-105 - [c66]Samira Briongos, Ida Bruhns, Pedro Malagón, Thomas Eisenbarth
, José Manuel Moya
:
Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged Cache Attacks. EuroS&P 2021: 683-700 - [c65]Tim Gellersen, Okan Seker, Thomas Eisenbarth
:
Differential Power Analysis of the Picnic Signature Scheme. PQCrypto 2021: 177-194 - [c64]Luca Wilke
, Jan Wichelmann
, Florian Sieck
, Thomas Eisenbarth
:
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation. SP (Workshops) 2021: 456-466 - [i54]Luca Wilke, Jan Wichelmann, Florian Sieck, Thomas Eisenbarth:
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation. CoRR abs/2106.15387 (2021) - [i53]Florian Sieck, Sebastian Berndt, Jan Wichelmann, Thomas Eisenbarth:
Util: : Lookup: Exploiting key decoding in cryptographic libraries. CoRR abs/2108.04600 (2021) - [i52]Jan Wichelmann, Sebastian Berndt, Claudius Pott, Thomas Eisenbarth:
Help, my Signal has bad Device! Breaking the Signal Messenger's Post-CompromiseSecurity through a Malicious Device. IACR Cryptol. ePrint Arch. 2021: 626 (2021) - [i51]Diego F. Aranha, Sebastian Berndt, Thomas Eisenbarth, Okan Seker, Akira Takahashi, Luca Wilke, Greg Zaverucha
:
Side-Channel Protections for Picnic Signatures. IACR Cryptol. ePrint Arch. 2021: 735 (2021) - [i50]Thore Tiemann, Sebastian Berndt, Thomas Eisenbarth, Maciej Liskiewicz:
"Act natural!": Having a Private Chat on a Public Blockchain. IACR Cryptol. ePrint Arch. 2021: 1073 (2021) - 2020
- [j18]Zane Weissman, Thore Tiemann, Daniel Moghimi, Evan Custodio, Thomas Eisenbarth
, Berk Sunar:
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 169-195 (2020) - [c63]Okan Seker, Sebastian Berndt, Luca Wilke
, Thomas Eisenbarth
:
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis. CCS 2020: 1033-1049 - [c62]Samira Briongos, Pedro Malagón, José Manuel Moya, Thomas Eisenbarth
:
Microarchitectural Isolation Guarantees Through Execution Based Signatures. DCIS 2020: 1-6 - [c61]Luca Wilke
, Jan Wichelmann
, Mathias Morbitzer
, Thomas Eisenbarth
:
SEVurity: No Security Without Integrity : Breaking Integrity-Free Memory Encryption with Minimal Assumptions. SP 2020: 1483-1496 - [c60]Samira Briongos, Pedro Malagón, José Manuel Moya, Thomas Eisenbarth:
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks. USENIX Security Symposium 2020: 1967-1984 - [c59]Daniel Moghimi, Berk Sunar, Thomas Eisenbarth, Nadia Heninger:
TPM-FAIL: TPM meets Timing and Lattice Attacks. USENIX Security Symposium 2020: 2057-2073 - [i49]Luca Wilke, Jan Wichelmann, Mathias Morbitzer
, Thomas Eisenbarth:
SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions. CoRR abs/2004.11071 (2020) - [i48]Samira Briongos, Ida Bruhns, Pedro Malagón, Thomas Eisenbarth, José Manuel Moya:
CACHE SNIPER : Accurate timing control of cache evictions. CoRR abs/2008.12188 (2020) - [i47]Tim Gellersen, Okan Seker, Thomas Eisenbarth:
Differential Power Analysis of the Picnic Signature Scheme. IACR Cryptol. ePrint Arch. 2020: 267 (2020) - [i46]Okan Seker, Thomas Eisenbarth, Maciej Liskiewicz:
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks. IACR Cryptol. ePrint Arch. 2020: 443 (2020) - [i45]Okan Seker, Sebastian Berndt, Thomas Eisenbarth:
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis. IACR Cryptol. ePrint Arch. 2020: 544 (2020) - [i44]Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving, Thomas Eisenbarth:
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols. IACR Cryptol. ePrint Arch. 2020: 1452 (2020)
2010 – 2019
- 2019
- [j17]Ahmad Moghimi
, Jan Wichelmann
, Thomas Eisenbarth
, Berk Sunar:
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations. Int. J. Parallel Program. 47(4): 538-570 (2019) - [c58]Berk Gülmezoglu
, Andreas Zankl
, M. Caner Tol
, Saad Islam, Thomas Eisenbarth
, Berk Sunar:
Undermining User Privacy on Mobile Devices Using AI. AsiaCCS 2019: 214-227 - [c57]Saad Islam, Ahmad Moghimi, Ida Bruhns, Moritz Krebbel, Berk Gülmezoglu, Thomas Eisenbarth, Berk Sunar:
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks. USENIX Security Symposium 2019: 621-637 - [i43]Saad Islam, Ahmad Moghimi, Ida Bruhns, Moritz Krebbel, Berk Gülmezoglu, Thomas Eisenbarth, Berk Sunar:
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks. CoRR abs/1903.00446 (2019) - [i42]Samira Briongos, Pedro Malagón, José Manuel Moya, Thomas Eisenbarth:
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks. CoRR abs/1904.06278 (2019) - [i41]Berk Gülmezoglu
, Ahmad Moghimi, Thomas Eisenbarth, Berk Sunar:
FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning. CoRR abs/1907.03651 (2019) - [i40]Daniel Moghimi, Berk Sunar, Thomas Eisenbarth, Nadia Heninger:
TPM-FAIL: TPM meets Timing and Lattice Attacks. CoRR abs/1911.05673 (2019) - [i39]Zane Weissman, Thore Tiemann, Daniel Moghimi, Evan Custodio, Thomas Eisenbarth, Berk Sunar:
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms. CoRR abs/1912.11523 (2019) - 2018
- [j16]Elke De Mulder, Thomas Eisenbarth
, Patrick Schaumont
:
Identifying and Eliminating Side-Channel Leaks in Programmable Systems. IEEE Des. Test 35(1): 74-89 (2018) - [j15]Fergus Dall, Gabrielle De Micheli
, Thomas Eisenbarth
, Daniel Genkin, Nadia Heninger, Ahmad Moghimi, Yuval Yarom:
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2): 171-191 (2018) - [j14]Okan Seker, Abraham Fernandez-Rubio, Thomas Eisenbarth
, Rainer Steinwandt:
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 394-430 (2018) - [c56]Jan Wichelmann
, Ahmad Moghimi, Thomas Eisenbarth
, Berk Sunar:
MicroWalk: A Framework for Finding Side Channels in Binaries. ACSAC 2018: 161-173 - [c55]Samira Briongos, Gorka Irazoqui, Pedro Malagón, Thomas Eisenbarth
:
CacheShield: Detecting Cache Attacks through Self-Observation. CODASPY 2018: 224-235 - [c54]Gorka Irazoqui, Thomas Eisenbarth
, Berk Sunar:
MASCAT: Preventing Microarchitectural Attacks Before Distribution. CODASPY 2018: 377-388 - [c53]Ahmad Moghimi
, Thomas Eisenbarth
, Berk Sunar:
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations in SGX. CT-RSA 2018: 21-44 - [c52]Marc Stelzner, Thomas Eisenbarth
:
IT Security in Lübeck - The design of a modern and future-proof security curriculum. EWME 2018: 79-82 - [e3]Thomas Eisenbarth, Yannick Teglia:
Smart Card Research and Advanced Applications - 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13-15, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10728, Springer 2018, ISBN 978-3-319-75207-5 [contents] - [i38]Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar:
DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes. CoRR abs/1808.01352 (2018) - [i37]Jan Wichelmann, Ahmad Moghimi, Thomas Eisenbarth, Berk Sunar:
MicroWalk: A Framework for Finding Side Channels in Binaries. CoRR abs/1808.05575 (2018) - [i36]Berk Gülmezoglu, Andreas Zankl, Caner Tol
, Saad Islam, Thomas Eisenbarth, Berk Sunar:
Undermining User Privacy on Mobile Devices Using AI. CoRR abs/1811.11218 (2018) - 2017
- [j13]Aria Shahverdi, Mostafa Taha, Thomas Eisenbarth
:
Lightweight Side Channel Resistance: Threshold Implementations of Simon. IEEE Trans. Computers 66(4): 661-671 (2017) - [c51]Berk Gülmezoglu
, Thomas Eisenbarth
, Berk Sunar:
Cache-Based Application Detection in the Cloud Using Machine Learning. AsiaCCS 2017: 288-300 - [c50]Mehmet Sinan Inci, Thomas Eisenbarth
, Berk Sunar:
Hit by the Bus: QoS Degradation Attack on Android. AsiaCCS 2017: 716-727 - [c49]Ahmad Moghimi, Gorka Irazoqui, Thomas Eisenbarth
:
CacheZoom: How SGX Amplifies the Power of Cache Attacks. CHES 2017: 69-90 - [c48]Berk Gülmezoglu
, Andreas Zankl
, Thomas Eisenbarth
, Berk Sunar:
PerfWeb: How to Violate Web Privacy with Hardware Performance Events. ESORICS (2) 2017: 80-97 - [c47]Michael Moukarzel, Thomas Eisenbarth
, Berk Sunar:
μLeech: A side-channel evaluation platform for IoT. MWSCAS 2017: 25-28 - [c46]Marc Green, Leandro Rodrigues Lima, Andreas Zankl
, Gorka Irazoqui, Johann Heyszl, Thomas Eisenbarth:
AutoLock: Why Cache Attacks on ARM Are Harder Than You Think. USENIX Security Symposium 2017: 1075-1091 - [e2]Sk Subidh Ali, Jean-Luc Danger, Thomas Eisenbarth:
Security, Privacy, and Applied Cryptography Engineering - 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings. Lecture Notes in Computer Science 10662, Springer 2017, ISBN 978-3-319-71500-1 [contents] - [i35]Ahmad Moghimi, Gorka Irazoqui, Thomas Eisenbarth:
CacheZoom: How SGX Amplifies The Power of Cache Attacks. CoRR abs/1703.06986 (2017) - [i34]Marc Green, Leandro Rodrigues Lima, Andreas Zankl, Gorka Irazoqui, Johann Heyszl, Thomas Eisenbarth:
AutoLock: Why Cache Attacks on ARM Are Harder Than You Think. CoRR abs/1703.09763 (2017) - [i33]Berk Gülmezoglu, Andreas Zankl, Thomas Eisenbarth, Berk Sunar:
PerfWeb: How to Violate Web Privacy with Hardware Performance Events. CoRR abs/1705.04437 (2017) - [i32]Gorka Irazoqui, Kai Cong, Xiaofei Guo, Hareesh Khattri, Arun K. Kanuparthi, Thomas Eisenbarth, Berk Sunar:
Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries. CoRR abs/1709.01552 (2017) - [i31]Samira Briongos, Gorka Irazoqui, Pedro Malagón, Thomas Eisenbarth:
CacheShield: Protecting Legacy Processes Against Cache Attacks. CoRR abs/1709.01795 (2017) - [i30]Ahmad Moghimi, Thomas Eisenbarth, Berk Sunar:
MemJam: A False Dependency Attack against Constant-Time Crypto Implementations. CoRR abs/1711.08002 (2017) - [i29]Berk Gülmezoglu, Thomas Eisenbarth, Berk Sunar:
Cache-Base Application Detection in the Cloud Using Machine Learning. IACR Cryptol. ePrint Arch. 2017: 245 (2017) - [i28]Okan Seker, Thomas Eisenbarth, Rainer Steinwandt:
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks. IACR Cryptol. ePrint Arch. 2017: 269 (2017) - [i27]Ahmad Moghimi, Gorka Irazoqui, Thomas Eisenbarth:
CacheZoom: How SGX Amplifies The Power of Cache Attacks. IACR Cryptol. ePrint Arch. 2017: 618 (2017) - 2016
- [j12]Cong Chen, Thomas Eisenbarth
, Ingo von Maurich, Rainer Steinwandt:
Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem. IEEE Trans. Inf. Forensics Secur. 11(6): 1093-1105 (2016) - [j11]Berk Gülmezoglu
, Mehmet Sinan Inci
, Gorka Irazoqui, Thomas Eisenbarth
, Berk Sunar:
Cross-VM Cache Attacks on AES. IEEE Trans. Multi Scale Comput. Syst. 2(3): 211-222 (2016) - [c45]Mehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar:
Efficient, adversarial neighbor discovery using logical channels on Microsoft Azure. ACSAC 2016: 436-447 - [c44]Cong Chen, Mohammad Farmani
, Thomas Eisenbarth
:
A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile - and Why It Is Not. ASIACRYPT (1) 2016: 819-843 - [c43]Cong Chen, Mehmet Sinan Inci, Mostafa Taha, Thomas Eisenbarth
:
SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs. CARDIS 2016: 73-88 - [c42]Gorka Irazoqui, Thomas Eisenbarth
, Berk Sunar:
Cross Processor Cache Attacks. AsiaCCS 2016: 353-364 - [c41]Mehmet Sinan Inci, Berk Gülmezoglu
, Gorka Irazoqui, Thomas Eisenbarth
, Berk Sunar:
Cache Attacks Enable Bulk Key Recovery on the Cloud. CHES 2016: 368-388 - [c40]Mehmet Sinan Inci, Berk Gülmezoglu
, Thomas Eisenbarth
, Berk Sunar:
Co-location Detection on the Cloud. COSADE 2016: 19-34 - [c39]A. Adam Ding
, Cong Chen, Thomas Eisenbarth
:
Simpler, Faster, and More Robust T-Test Based Leakage Detection. COSADE 2016: 163-183 - [c38]A. M. Leonard, Hang Cai, Krishna K. Venkatasubramanian, M. Ali, Thomas Eisenbarth
:
A honeypot system for wearable networks. Sarnoff Symposium 2016: 199-201 - [i26]Mehmet Sinan Inci, Berk Gülmezoglu, Thomas Eisenbarth, Berk Sunar:
Co-location detection on the Cloud. IACR Cryptol. ePrint Arch. 2016: 284 (2016) - [i25]Cong Chen, Mohammad Farmani, Thomas Eisenbarth:
A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile-and Why it is Not. IACR Cryptol. ePrint Arch. 2016: 434 (2016) - [i24]