• Postal addressShow on map

    Ratzeburger Allee 160, Gebäude 64, 2. OG

    23562 Lübeck

    Germany

Filter
Conference contribution

Search results

  • 2024

    Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments

    Dipta, D. R., Tiemann, T., Gülmezoğlu, B., Marin, E. & Eisenbarth, T., 2024, 9th IEEE European Symposium on Security and Privacy (EuroS&P 2024), July 8-12, 2024, Vienna, Austria.

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Estimation of indoor occupancy level based on machine learning and multimodal environmental data

    Siecinski, S., Mohammadi, E. & Grzegorzek, M., 25.06.2024, 2024 IEEE 22nd Mediterranean Electrotechnical Conference (MELECON). IEEE, p. 868-872 5 p. (2024 IEEE 22nd Mediterranean Electrotechnical Conference, MELECON 2024).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • 2022

    A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP

    Li, M., Wilke, L., Wichelmann, J., Eisenbarth, T., Teodorescu, R. & Zhang, Y., 01.05.2022, 2022 2022 IEEE Symposium on Security and Privacy (SP) (SP). Los Alamitos, CA, USA: IEEE Computer Society, p. 1541-1541 1 p.

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • 2021

    A Formal Approach to Confidentiality Verification in SoCs at the Register Transfer Level

    Muller, J., Fadiheh, M. R., Anton, A. L. D., Eisenbarth, T., Stoffel, D. & Kunz, W., 05.12.2021, 2021 58th ACM/IEEE Design Automation Conference (DAC). p. 991-996

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged Cache Attacks

    Briongos, S., Bruhns, I., Malagón, P., Eisenbarth, T. & Moya, J. M., 09.2021, 2021 IEEE European Symposium on Security and Privacy (EuroS P). IEEE, p. 683-700

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Help, My Signal has Bad Device! Breaking the Signal Messenger’s Post-Compromise Security Through a Malicious Device

    Wichelmann, J., Berndt, S., Pott, C. & Eisenbarth, T., 2021, Detection of Intrusions and Malware, and Vulnerability Assessment. Springer International Publishing, p. 88-105

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Nano Security: From Nano-Electronics to Secure Systems

    Polian, I., Altmann, F., Arul, T., Boit, C., Brederlow, R., Davi, L., Drechsler, R., Du, N., Eisenbarth, T., Guneysu, T., Hermann, S., Hiller, M., Leupers, R., Merchant, F., Mussenbrock, T., Katzenbeisser, S., Kumar, A., Kunz, W., Mikolajick, T. & Pachauri, V. & 3 others, Seifert, J. P., Torres, F. S. & Trommer, J., 01.02.2021, 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, p. 1334-1339

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Robust Online Algorithms for Dynamic Choosing Problems

    Berndt, S., Grage, K., Jansen, K., Johannsen, L. & Kosche, M., 2021, Connecting with Computability. Springer International Publishing, p. 38-49

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation

    Wilke, L., Wichelmann, J., Sieck, F. & Eisenbarth, T., 05.2021, 2021 IEEE Security and Privacy Workshops (SPW). p. 456-466

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Util::Lookup: Exploiting Key Decoding in Cryptographic Libraries

    Sieck, F., Berndt, S., Wichelmann, J. & Eisenbarth, T., 12.11.2021, CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2456–2473

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • 2020

    Microarchitectural Isolation Guarantees Through Execution Based Signatures

    Briongos, S., Malagon, P., Moya, J. M. & Eisenbarth, T., 18.11.2020, 2020 XXXV Conference on Design of Circuits and Integrated Systems (DCIS). IEEE, p. 1-6

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • SEVurity: No security without integrity: Ng integrity-free memory encryption with minimal assumptions

    Wilke, L. C., Wichelmann, J., Morbitzer, M. & Eisenbarth, T., 05.2020, 2020 IEEE Symposium on Security and Privacy (SP). IEEE, p. 1483-1496 14 p. 9152717. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis

    Seker, O., Berndt, S., Wilke, L. C. & Eisenbarth, T., 30.10.2020, Cryptology ePrint Archive: Report 2020/544. Association for Computing Machinery, p. 1033-1049 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • 2019

    Deniable Upload and Download via Passive Participation

    Sommer, D., Dhar, A., Malisa, L., Mohammadi, E., Ronzani, D. & Capkun, S., 01.02.2019, 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19). Boston, MA: USENIX Association, p. 649-666 18 p.

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • IT Security in Lübeck – The design of a modern and future-proof security curriculum

    Stelzner, M. & Eisenbarth, T., 29.01.2019, 2018 12th European Workshop on Microelectronics Education (EWME). IEEE, p. 79-82 4 p. 8629494. (IEEE Proceedings).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks

    Islam, S., Moghimi, A., Bruhns, I., Krebbel, M., Gulmezoglu, B., Eisenbarth, T. & Sunar, B., 2019, 28th USENIX Security Symposium (USENIX Security 19). Santa Clara, CA: USENIX Association

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Undermining User Privacy on Mobile Devices Using AI

    Gulmezoglu, B., Zankl, A., Tol, M. C., Islam, S., Eisenbarth, T. & Sunar, B., 2019, Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. New York, NY, USA: ACM, p. 214-227 14 p. (Asia CCS '19).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • 2018

    CacheShield: Detecting Cache Attacks through Self-Observation

    Briongos, S., Malagón, P., Irazoqui, G. & Eisenbarth, T., 13.03.2018, CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, p. 224-235 12 p. (ACM Conference on Data and Application Security and Privacy).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • MASCAT: Preventing Microarchitectural Attacks Before Distribution

    Irazoqui, G., Eisenbarth, T. & Sunar, B., 13.03.2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, p. 377-388 12 p. (ACM Conference on Data and Application Security and Privacy).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations in SGX

    Moghimi, A., Eisenbarth, T. & Sunar, B., 07.03.2018, Topics in Cryptology -- CT-RSA 2018. Smart, N. P. (ed.). Cham: Springer International Publishing, Vol. 10808. p. 21-44 24 p. (Lecture Notes in Computer Science ; vol. 10808).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • 2017

    AutoLock: Why Cache Attacks on ARM Are Harder Than You Think

    Green, M., Rodrigues-Lima, L., Irazoqui, G., Heyszl, J., Eisenbarth, T. & Zankl, A., 08.2017, 26th USENIX Security Symposium (USENIX Security 17). Vancouver, BC: USENIX Association, p. 1075-1091 17 p.

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Cache-Based Application Detection in the Cloud Using Machine Learning

    Gulmezoglu, B., Eisenbarth, T. & Sunar, B., 02.04.2017, Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. New York, NY, USA: ACM, p. 288-300 13 p. (ASIA CCS '17).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • CacheZoom: How SGX Amplifies the Power of Cache Attacks

    Moghimi, A., Irazoqui, G. & Eisenbarth, T., 25.08.2017, Cryptographic Hardware and Embedded Systems – CHES 2017. Fischer, W. & Homma, N. (eds.). Springer Verlag, Vol. 10529. p. 69-90 22 p. (Lecture Notes in Computer Science; vol. 10529).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Hit by the Bus: QoS Degradation Attack on Android

    Inci, M. S., Eisenbarth, T. & Sunar, B., 02.04.2017, Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. New York, NY, USA: ACM, p. 716-727 12 p. (Proceedings of ASIA CCS ).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • PerfWeb: How to Violate Web Privacy with Hardware Performance Events

    Gülmezoglu, B., Eisenbarth, T., Sunar, B. & Zankl, A., 12.08.2017, Computer Security – ESORICS 2017. Foley, S. N., Gollmann, D. & Snekkenes, E. (eds.). Springer Verlag, Vol. 10493. p. 80-97 18 p. (Lecture Notes in Computer Science; vol. 10493).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • μLeech: A side-channel evaluation platform for IoT

    Moukarzel, M., Eisenbarth, T. & Sunar, B., 01.08.2017, 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS). p. 25-28 4 p.

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • 2016

    A honeypot system for wearable networks

    Leonard, A. M., Cai, H., Venkatasubramanian, K. K., Ali, M. & Eisenbarth, T., 01.09.2016, 2016 IEEE 37th Sarnoff Symposium. IEEE, p. 199-201 3 p. (Proceedings of Sarnoff Symposium).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Cache Attacks Enable Bulk Key Recovery on the Cloud

    Inci, M. S., Gulmezoglu, B., Irazoqui, G., Eisenbarth, T. & Sunar, B., 04.08.2016, Cryptographic Hardware and Embedded Systems – CHES 2016. Gierlichs, B. & Poschmann, A. Y. (eds.). Springer Verlag, Vol. 9813. p. 368-388 21 p. (Lecture Notes in Computer Science; vol. 9813).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Co-location Detection on the Cloud

    Inci, M. S., Gulmezoglu, B., Eisenbarth, T. & Sunar, B., 23.07.2016, Constructive Side-Channel Analysis and Secure Design. Standaert, F.-X. & Oswald, E. (eds.). Springer Verlag, Vol. 9689. p. 19-34 16 p. (Lecture Notes in Computer Science; vol. 9689).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Cross Processor Cache Attacks

    Irazoqui, G., Eisenbarth, T. & Sunar, B., 2016, Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. New York, NY, USA: ACM, p. 353-364 12 p. (ASIA CCS '16).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Differential Power Analysis of a McEliece Cryptosystem

    Chen, C., Eisenbarth, T., Steinwandt, R. & Von Maurich, I., 09.01.2016, Applied Cryptography and Network Security. Malkin, T., Kolesnikov, V., Lewko, A. B. & Polychronakis, M. (eds.). Springer International Publishing, Vol. 9092. p. 538-556 19 p.

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Efficient, Adversarial Neighbor Discovery Using Logical Channels on Microsoft Azure

    Inci, M. S., Irazoqui, G., Eisenbarth, T. & Sunar, B., 12.2016, Proceedings of the 32nd Annual Conference on Computer Security Applications. New York, NY, USA: ACM, p. 436-447 12 p. (ACSAC '16).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs

    Chen, C., Inci, M. S., Taha, M. & Eisenbarth, T., 07.03.2016, Smart Card Research and Advanced Applications. Lemke-Rust, K. & Tunstall, M. (eds.). Springer Verlag, Vol. 10146. p. 73-88 16 p. (Lecture Notes in Computer Science; vol. 10146).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • 2015

    A Faster and More Realistic Flush+Reload Attack on AES

    Gülmezoğlu, B., Inci, M. S., Irazoqui, G., Eisenbarth, T. & Sunar, B., 17.07.2015, Constructive Side-Channel Analysis and Secure Design. Mangard, S. & Poschmann, A. Y. (eds.). Springer Berlin Heidelberg, Vol. 9064. p. 111-126 16 p. (Lecture Notes in Computer Science; vol. 9064).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Balanced Encoding to Mitigate Power Analysis: A Case Study

    Chen, C., Eisenbarth, T., Shahverdi, A. & Ye, X., 17.03.2015, Smart Card Research and Advanced Applications. Joye, M. & Moradi, A. (eds.). Cham: Springer International Publishing, Vol. 8968. p. 49-63 15 p. (Lecture Notes in Computer Science; vol. 8968).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Bounded, yet Sufficient? How to Determine Whether Limited Side Channel Information Enables Key Recovery

    Ye, X., Eisenbarth, T. & Martin, W., 17.03.2015, Smart Card Research and Advanced Applications. Joye, M. & Moradi, A. (eds.). Cham: Springer International Publishing, Vol. 8968. p. 215-232 18 p. (Lecture Notes in Computer Science; vol. 8968).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Faster Leakage Detection and Exploitation

    Ye, X., Taha, M., Chen, C. & Eisenbarth, T., 16.10.2015, TrustED '15 Proceedings of the 5th International Workshop on Trustworthy Embedded Devices. ACM, p. 21-29 9 p. (Proceedings of the International Workshop on Trustworthy Embedded Devices).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Lucky 13 Strikes Back

    Irazoqui, G., Inci, M. S., Eisenbarth, T. & Sunar, B., 14.04.2015, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015. New York, NY, USA: ACM, p. 85-96 12 p. (Proceedings of the ACM Symposium on Information, Computer and Communications Security).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Masking Large Keys in Hardware: A Masked Implementation of McEliece

    Chen, C., Eisenbarth, T., Von Maurich, I. & Steinwandt, R., 08.2015, Selected Areas in Cryptography - SAC 2015 . Springer Verlag, Vol. 9566. p. 293-309 17 p. (Lecture Notes in Computer Science; vol. 9566).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Near Collision Side Channel Attacks

    Ege, B., Eisenbarth, T. & Batina, L., 08.2015, Selected Areas in Cryptography – SAC 2015. Dunkelman, O. & Keliher, L. (eds.). Springer Verlag, Vol. 9566. p. 277-292 16 p. (Lecture Notes in Computer Science; vol. 9566).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Power analysis of the t-private logic style for FPGAs

    Goddard, Z. N., LaJeunesse, N. & Eisenbarth, T., 02.07.2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, p. 68-71 4 p. (Authorized distributor of all IEEE proceedings).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES

    Irazoqui, G., Eisenbarth, T. & Sunar, B., 20.07.2015, 2015 IEEE Symposium on Security and Privacy. IEEE, p. 591-604 14 p. (IEEE Symposium on Security and Privacy).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Silent Simon: A threshold implementation under 100 slices

    Shahverdi, A., Taha, M. & Eisenbarth, T., 02.07.2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, p. 1-6 6 p. (Authorized distributor of all IEEE proceedings).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Systematic Reverse Engineering of Cache Slice Selection in Intel Processors

    Eisenbarth, T., Irazoqui, G. & Sunar, B., 26.10.2015, 2015 Euromicro Conference on Digital System Design. IEEE, p. 629-636 8 p. ( IEEE Proceedings).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • 2014

    Fine Grain Cross-VM Attacks on Xen and VMware

    Irazoqui, G., Inci, M. S., Eisenbarth, T. & Sunar, B., 07.04.2014, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing. IEEE, p. 737-744 8 p. ( IEEE Proceedings).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Non-Linear Collision Analysis

    Ye, X., Chen, C. & Eisenbarth, T., 15.11.2014, Radio Frequency Identification: Security and Privacy Issues. Saxena, N. & Sadeghi, A.-R. (eds.). Cham: Springer International Publishing, Vol. 8651. p. 198-214 17 p. (Lecture Notes in Computer Science; vol. 8651).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • On the Vulnerability of Low Entropy Masking Schemes

    Ye, X. & Eisenbarth, T., 26.06.2014, Smart Card Research and Advanced Applications. Francillon, A. & Rohatgi, P. (eds.). Cham: Springer International Publishing, Vol. 8419. p. 44-60 17 p. (Lecture Notes in Computer Science; vol. 8419).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince

    Doröz, Y., Shahverdi, A., Eisenbarth, T. & Sunar, B., 08.10.2014, Financial Cryptography and Data Security. Böhme, R., Brenner, M., Moore, T. & Smith, M. (eds.). Berlin, Heidelberg: Springer Berlin Heidelberg, Vol. 8438. p. 208-220 13 p. (Lecture Notes in Computer Science; vol. 8438).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Wait a minute! A fast, Cross-VM attack on AES

    Irazoqui, G., Inci, M. S., Eisenbarth, T. & Sunar, B., 09.2014, Research in Attacks, Intrusions and Defenses. Stavrou, A., Bos, H. & Portokalidis, G. (eds.). Springer Berlin Heidelberg, Vol. 8688. p. 299-319 21 p. (Lecture Notes in Computer Science; vol. 8688).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • 2012

    Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices

    Eisenbarth, T., Gong, Z., Güneysu, T., Heyse, S., Indesteege, S., Kerckhof, S., Koeune, F., Nad, T., Plos, T., Regazzoni, F., Standaert, F.-X. & van Oldeneel tot Oldenzeel, L., 07.2012, Progress in Cryptology - AFRICACRYPT 2012. Mitrokotsa, A. & Vaudenay, S. (eds.). Berlin, Heidelberg: Springer Berlin Heidelberg, Vol. 7374. p. 172-187 16 p. (Lecture Notes in Computer Science; vol. 7374).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review