Thomas Eisenbarth

According to our database1, Thomas Eisenbarth authored at least 117 papers between 2007 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations.
International Journal of Parallel Programming, 2019

FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning.
CoRR, 2019

RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks.
CoRR, 2019

SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks.
CoRR, 2019

SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks.
Proceedings of the 28th USENIX Security Symposium, 2019

Undermining User Privacy on Mobile Devices Using AI.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Identifying and Eliminating Side-Channel Leaks in Programmable Systems.
IEEE Design & Test, 2018

Undermining User Privacy on Mobile Devices Using AI.
CoRR, 2018

MicroWalk: A Framework for Finding Side Channels in Binaries.
CoRR, 2018

DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes.
CoRR, 2018

IT Security in Lübeck - The design of a modern and future-proof security curriculum.
Proceedings of the 12th European Workshop on Microelectronics Education, 2018

MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations in SGX.
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018

MASCAT: Preventing Microarchitectural Attacks Before Distribution.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

CacheShield: Detecting Cache Attacks through Self-Observation.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

MicroWalk: A Framework for Finding Side Channels in Binaries.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Lightweight Side Channel Resistance: Threshold Implementations of Simon.
IEEE Trans. Computers, 2017

Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks.
IACR Cryptology ePrint Archive, 2017

CacheZoom: How SGX Amplifies The Power of Cache Attacks.
IACR Cryptology ePrint Archive, 2017

Cache-Base Application Detection in the Cloud Using Machine Learning.
IACR Cryptology ePrint Archive, 2017

MemJam: A False Dependency Attack against Constant-Time Crypto Implementations.
CoRR, 2017

CacheShield: Protecting Legacy Processes Against Cache Attacks.
CoRR, 2017

Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries.
CoRR, 2017

CacheZoom: How SGX Amplifies The Power of Cache Attacks.
CoRR, 2017

PerfWeb: How to Violate Web Privacy with Hardware Performance Events.
CoRR, 2017

AutoLock: Why Cache Attacks on ARM Are Harder Than You Think.
CoRR, 2017

AutoLock: Why Cache Attacks on ARM Are Harder Than You Think.
Proceedings of the 26th USENIX Security Symposium, 2017

PerfWeb: How to Violate Web Privacy with Hardware Performance Events.
Proceedings of the Computer Security - ESORICS 2017, 2017

CacheZoom: How SGX Amplifies the Power of Cache Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

Hit by the Bus: QoS Degradation Attack on Android.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Cache-Based Application Detection in the Cloud Using Machine Learning.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Cross-VM Cache Attacks on AES.
IEEE Trans. Multi-Scale Computing Systems, 2016

Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem.
IEEE Trans. Information Forensics and Security, 2016

MASCAT: Stopping Microarchitectural Attacks Before Execution.
IACR Cryptology ePrint Archive, 2016

Cache Attacks Enable Bulk Key Recovery on the Cloud.
IACR Cryptology ePrint Archive, 2016

Co-location detection on the Cloud.
IACR Cryptology ePrint Archive, 2016

A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile-and Why it is Not.
IACR Cryptology ePrint Archive, 2016

A honeypot system for wearable networks.
Proceedings of the 2016 37th IEEE Sarnoff Symposium, Newark, NJ, USA, 2016

Co-location Detection on the Cloud.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2016

Simpler, Faster, and More Robust T-Test Based Leakage Detection.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2016

Cache Attacks Enable Bulk Key Recovery on the Cloud.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016

Cross Processor Cache Attacks.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs.
Proceedings of the Smart Card Research and Advanced Applications, 2016

A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile - and Why It Is Not.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Efficient, adversarial neighbor discovery using logical channels on Microsoft Azure.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Know Thy Neighbor: Crypto Library Detection in Cloud.
PoPETs, 2015

On the security margin of MAC striping.
Inf. Process. Lett., 2015

Implementation Attacks on Post-Quantum Cryptographic Schemes.
IACR Cryptology ePrint Archive, 2015

Silent Simon: A Threshold Implementation under 100 Slices.
IACR Cryptology ePrint Archive, 2015

Cross Processor Cache Attacks.
IACR Cryptology ePrint Archive, 2015

Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud.
IACR Cryptology ePrint Archive, 2015

Strength in Numbers: Threshold ECDSA to Protect Keys in the Cloud.
IACR Cryptology ePrint Archive, 2015

On the security margin of MAC striping.
IACR Cryptology ePrint Archive, 2015

Near Collision Side Channel Attacks.
IACR Cryptology ePrint Archive, 2015

Simpler, Faster, and More Robust T-test Based Leakage Detection.
IACR Cryptology ePrint Archive, 2015

SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs.
IACR Cryptology ePrint Archive, 2015

Masking Large Keys in Hardware: A Masked Implementation of McEliece.
IACR Cryptology ePrint Archive, 2015

Systematic Reverse Engineering of Cache Slice Selection in Intel Processors.
IACR Cryptology ePrint Archive, 2015

Guest Editorial: Special Section on Embedded System Security.
Embedded Systems Letters, 2015

S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing - and Its Application to AES.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Near Collision Side Channel Attacks.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

Masking Large Keys in Hardware: A Masked Implementation of McEliece.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

Silent Simon: A threshold implementation under 100 slices.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015

Power analysis of the t-private logic style for FPGAs.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015

Systematic Reverse Engineering of Cache Slice Selection in Intel Processors.
Proceedings of the 2015 Euromicro Conference on Digital System Design, 2015

A Faster and More Realistic Flush+Reload Attack on AES.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015

Faster Leakage Detection and Exploitation.
Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, 2015

Lucky 13 Strikes Back.
Proceedings of the 10th ACM Symposium on Information, 2015

Differential Power Analysis of a McEliece Cryptosystem.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince.
IACR Cryptology ePrint Archive, 2014

Balanced Encoding to Mitigate Power Analysis: A Case Study.
IACR Cryptology ePrint Archive, 2014

Differential Power Analysis of a McEliece Cryptosystem.
IACR Cryptology ePrint Archive, 2014

Wait a minute! A fast, Cross-VM attack on AES.
IACR Cryptology ePrint Archive, 2014

Fine grain Cross-VM Attacks on Xen and VMware are possible!
IACR Cryptology ePrint Archive, 2014

Jackpot Stealing Information From Large Caches via Huge Pages.
IACR Cryptology ePrint Archive, 2014

Non-Linear Collision Analysis.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014

Wait a Minute! A fast, Cross-VM Attack on AES.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince.
Proceedings of the Financial Cryptography and Data Security, 2014

Bounded, yet Sufficient? How to Determine Whether Limited Side Channel Information Enables Key Recovery.
Proceedings of the Smart Card Research and Advanced Applications, 2014

Balanced Encoding to Mitigate Power Analysis: A Case Study.
Proceedings of the Smart Card Research and Advanced Applications, 2014

Fine Grain Cross-VM Attacks on Xen and VMware.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014

2013
Faster Hash-Based Signatures with Bounded Leakage.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

On the Vulnerability of Low Entropy Masking Schemes.
Proceedings of the Smart Card Research and Advanced Applications, 2013

A Performance Boost for Hash-Based Signatures.
Proceedings of the Number Theory and Cryptography, 2013

2012
Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power Analysis Methods.
IEEE Trans. VLSI Syst., 2012

Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices.
IACR Cryptology ePrint Archive, 2012

Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2012

Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

Wide Collisions in Practice.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Keeloq.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Hardware SLE solvers: Efficient building blocks for cryptographic and cryptanalyticapplications.
Integration, 2011

2010
Cryptography and cryptanalysis for embedded systems.
PhD thesis, 2010

Building a Side Channel Based Disassembler.
Trans. Computational Science, 2010

Correlation-Enhanced Power Analysis Collision Attack.
IACR Cryptology ePrint Archive, 2010

Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs.
Proceedings of the Topics in Cryptology, 2010

Correlation-Enhanced Power Analysis Collision Attack.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

2009
Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology.
Trans. Computational Science, 2009

Vulnerability modeling of cryptographic hardware to power analysis attacks.
Integration, 2009

Power Analysis of Single-Rail Storage Elements as Used in MDPL.
Proceedings of the Information, Security and Cryptology, 2009

KeeLoq and Side-Channel Analysis-Evolution of an Attack.
Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009

MicroEliece: McEliece for Embedded Devices.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

2008
Information Leakage of Flip-Flops in DPA-Resistant Logic Styles.
IACR Cryptology ePrint Archive, 2008

Physical Cryptanalysis of KeeLoq Code Hopping Applications.
IACR Cryptology ePrint Archive, 2008

Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves?
IACR Cryptology ePrint Archive, 2008

Sicherheit moderner Funktüröffnersysteme.
Datenschutz und Datensicherheit, 2008

Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers.
Proceedings of the IEEE Third International Symposium on Industrial Embedded Systems, 2008

Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?.
Proceedings of the 23rd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2008), 2008

On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme.
Proceedings of the Advances in Cryptology, 2008

Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

Fast Hash-Based Signatures on Constrained Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2008

2007
A Survey of Lightweight-Cryptography Implementations.
IEEE Design & Test of Computers, 2007

A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies.
Proceedings of the 2007 International Conference on Embedded Computer Systems: Architectures, 2007

Establishing Chain of Trust in Reconfigurable Hardware.
Proceedings of the IEEE Symposium on Field-Programmable Custom Computing Machines, 2007

Power Attacks Resistance of Cryptographic S-Boxes with Added Error Detection Circuits.
Proceedings of the 22nd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2007), 2007

A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007

Reconfigurable trusted computing in hardware.
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007


  Loading...