Cross-VM Cache Attacks on AES
Berk Gulmezoglu, Mehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth and Berk Sunar
IEEE Transactions on Multi-Scale Computing Systems, vol. 2, no. 3, pp. 211 - 222, July 2016
On the security margin of MAC striping
Thomas Eisenbarth, Aaron Meyerowitz and Rainer Steinwandt
Information Processing Letters, vol. 115, no. 11, pp. 899–902, November 2015
A Performance Boost for Hash-Based Signatures
Thomas Eisenbarth, Ingo von Maurich, Christof Paar and Xin Ye
Number Theory and Cryptography, Springer LNCS, vol. 8260, pp 166-182, 2013
Building a Side Channel Based Disassembler
Thomas Eisenbarth, Christof Paar, and Björn Weghenkel Springer Transactions on Computational Science, Special Issue on ``Security in Computing"', vol. 6340, pp. 78 - 99, 2010
A Survey of Lightweight Cryptography Implementations
Thomas Eisenbarth, Sandeep Kumar, Christof Paar, Axel Poschmann, Leif Uhsadel
IEEE Design & Test of Computers - Special Issue on Secure ICs for Secure Embedded Computing, vol. 24, no. 6, pp. 522-533, November 2007
Hit by the Bus: QoS Degradation Attack on Android
Mehmet Sinan Inci and Thomas Eisenbarth and Berk Sunar Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security - AsiaCCS 2017, pp. 716-727, 2017 br>
SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs
Cong Chen and Mehmet Sinan Inci and Mostafa Taha and Thomas Eisenbarth to appear in Proceedings of CARDIS 2016, Cannes, France, November 7 - 9, Springer LNCS 10146, pp. 73 - 88, 2017
Cache Attacks Enable Bulk Key Recovery on the Cloud
Mehmet Sinan Inci and Berk Gulmezoglu and Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar Proceedings of Cryptographic Hardware and Embedded Systems - CHES 2016, LNCS 9813, pp. 368–388, 2016 br>
Cross Processor Cache Attacks
Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar Proceedings of the 11th ACM Symposium on Information, Computer and Communications Security - ASIA CCS '16 br>
Co-location detection on the Cloud
Mehmet Sinan Inci, Berk Gulmezoglu, Thomas Eisenbarth and Berk Sunar Proceedings of COSADE 2016,Springer LNCS, vol 9689, pp 19-34 br>
Faster Leakage Detection and Exploitation
Xin Ye, Mostafa Taha, Cong Chen, and Thomas Eisenbarth Proceedings of the 5th International Workshop on Trustworthy Embedded
Devices - TrustED '15, Pages 21-29, 2015
Near Collision Side Channel Attacks
Baris Ege, Thomas Eisenbarth and Lejla Batina Selected Areas in Cryptography - SAC 2015, August 12-14, 2015, Sackville, NB, Canada, LNCS 9566, pp. 277-292, 2016.
Differential Power Analysis of a McEliece Cryptosystem
Cong Chen and Thomas Eisenbarth and Ingo von Maurich and Rainer Steinwandt Proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS'15), 2-5 June 2015, New York, LNCS 9092, pp. 538–556, 2015.
G. Irazoqui, M. S. Inci, T. Eisenbarth, and B. Sunar:
Lucky 13 Strikes Back.
In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIA CCS '15). ACM, New York, NY, USA, 85-96.2015.
(pdf)
G. Irazoqui, T. Eisenbarth, and B. Sunar:
S$A: A shared cache attack that works across cores and defies VM sandboxing---and its application to AES
- IEEE: Security & Privacy, 2015
(pdf)
A. Shahverdi, M. Taha, and T. Eisenbarth: Silent SIMON: A Threshold
Implementation under 100 Slices -
to appear in the proceedings of IEEE Symposium on Hardware Oriented Security and Trust (HOST 2015)
(pdf)
Z. N. Goddard, N. LaJeunesse, and T. Eisenbarth: Power Analysis of the t-
Private Logic Style for FPGAs -
to appear in the proceedings of IEEE Symposium on Hardware Oriented Security and Trust (HOST 2015)
(pdf)
B. Gulmezoglu, M. S. Inci, G. Irazoqui, T. Eisenbarth, and B. Sunar: A Faster and More Realistic Flush+Reload Attack on AES -
to appear in the proceedings of COSADE 2015, Lecture Notes in Computer Science, vol 9064 , pp. 111-126, Berlin, Germany, April 2015, Springer
(pdf
, slides)
C. Chen, T. Eisenbarth, A. Shahverdi, and X. Ye:
Balanced Encoding to Mitigate Power Analysis: A Case Study
in the proceedings of CARDIS 2014, Lecture Notes in Computer Science, vol 8968, pp 49-63, Paris, France, November 2014, Springer
pdf
X. Ye, T. Eisenbarth and W. Martin:
Bounded, yet Sufficient? How to Determine
Whether Limited Side Channel Information
Enables Key Recovery
in the proceedings of CARDIS 2014, Lecture Notes in Computer Science, vol 8968, pp 215-232, Paris, France, November 2014, Springer
pdf
G. Irazoqui and M. S. Inci and T. Eisenbarth and B. Sunar:
Fine grain Cross-VM Attacks on Xen and VMware are possible!
- Accepted at the 3rd International Symposium on Privacy and Security in Cloud and Big Data - PriSec 2014, 3-5 December 2014, Sydney, Australia (and
Cryptology ePrint Archive, Report 2014/248)
G. Irazoqui and M. S. Inci and T. Eisenbarth and B. Sunar:
Wait a minute! A fast, Cross-VM attack on AES
in the proceedings of Research in Attacks, Intrusions and Defenses --- RAID 2014, Springer LNCS Volume 8688, 2014, pp 299-319.
pdf
X. Ye, C. Chen and T. Eisenbarth:
Non-Linear Collision Analysis
in the proceedings of RFIDSec 2014, Lecture Notes in Computer Science, vol 8651, pp 198-214, Oxford, UK, July 2014, Springer
pdf
Y. Doröz, A. Shahverdi, T. Eisenbarth, and B. Sunar: Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince -
2nd Workshop on Applied Homomorphic Cryptography and Encrypted Computing (WAHC 2014)
pdf
X. Ye and T. Eisenbarth: On the Vulnerability of Low Entropy Masking Schemes -
Twelfth Smart Card Research and Advanced Application Conference - CARDIS 2013
pdf
T. Eisenbarth, I. von Maurich, and X. Ye: Faster Hash-based Signatures with Bounded Leakage
- Selected Areas in Cryptography 2013 (SAC 2013), August 14-16, 2013, Burnaby, Canada
pdf
J. Balasch, B. Ege, T. Eisenbarth, B. Gérard, Z. Gong, T. Güneysu, S. Heyse, S. Kerckhof, F. Koeune, T. Plos, T. Pöppelmann, F. Regazzoni, F.-X. Standaert, G. Van Assche, R. Van Keer, L. van Oldeneel tot Oldenzeel, I. von Maurich: Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices
- Smart Card Research and Advanced Applications - CARDIS 2012; Springer LNCS Vol. 7771:158-172
X. Ye and T. Eisenbarth: Wide Collisions in Practice
- 10th International Conference on Applied Cryptography and Network Security (ACNS '12) June 26-29, 2012, Singapore
T. Eisenbarth, Z. Gong, T. Güneysu, S. Heyse, S. Indesteege, S. Kerckhof, F. Koeune, T. Nad, T. Plos, F. Regazzoni, F.-X.Standaert, L. van Oldeneel tot Oldenzeel: Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices
- AFRICACRYPT 2012:172-187
T. Eisenbarth, Z. Gong, T. Güneysu, S. Heyse, S. Indesteege,
S. Kerckhof, F. Koeune, T. Nad, T. Plos, F. Regazzoni,
F.-X. Standaert and L. Van Oldeneel: Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices - ECRYPT Workshop on Lightweight Cryptography.
November 28-29, 2011, Louvain-la-Neuve, Belgium
T. Eisenbarth: A Lower Bound for Algebraic Side Channel Analysis - 11th International Conference on Computational and Mathematical Methods in Science and Engineering, CMMSE 2011 Proceedings, 2011.
A. Moradi, O. Mischke, T. Eisenbarth: Correlation-Enhanced Power Analysis Collision Attack - Cryptographic Hardware and Embedded Systems - CHES 2010, LNCS, Springer-Verlag, 2010.
A. Bogdanov, T. Eisenbarth, C. Paar, M. Wienecke: Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs - Topics in Cryptology - CT-RSA 2010, LNCS, Springer-Verlag.
I. von Maurich, T. Poeppelmann, J. Rave, C. Reuber, A. Wild, T. Eisenbarth, S. Heyse: Evaluation of SHA-3 Candidates for 8-bit Embedded Processors - presented at: The Second SHA-3 Candidate Conference, University of California, Santa Barbara, August 23-24, 2010.
A. Moradi, T. Eisenbarth, A. Poschmann, C. Paar: Power Analysis of Single-Rail Storage Elements as used in MDPL - 12th International Conference on Information Security and Cryptology - ICISC 2009, Seoul, Korea, December 2-4, 2009.
C. Paar, T. Eisenbarth, M. Kasper, T. Kasper, A. Moradi: KeeLoq and Side-Channel Analysis - Evolution of an Attack - 6th IEEE Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2009.Lausanne, Switzerland, September 6, 2009.
T. Eisenbarth, T. Güneysu, S. Heyse, C. Paar: MicroEliece: McEliece for Embedded Devices - Cryptographic Hardware and Embedded Systems - CHES 2009, LNCS, Springer-Verlag, 2009.
T. Eisenbarth, T. Kasper, A. Moradi, C. Paar, M. Salmasizadeh, M. Shalmani: On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme - Advances in Cryptology - CRYPTO 2008, LNCS, Springer-Verlag, 2008
F. Regazzoni, T. Eisenbarth, L. Breveglieri, P. Ienne, I. Koren: Can Knowledge Regarding the Presence of Countermeasures against Fault Attacks Simplify Power Attacks on Cryptographic Devices? - 21st IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT'08), 2008.
S. Rohde, T. Eisenbarth, E. Dahmen, J. Buchmann, C. Paar: Fast Hash-Based Signature Verification on Constrained Devices - CARDIS 2008, London, UK
G. Meiser, T. Eisenbarth, K. Lemke-Rust, C. Paar: Efficient Implementation of eSTREAM Ciphers on 8-bit AVR Microcontrollers - SIES 2008, IEEE, 2008.
A. Bogdanov, T. Eisenbarth, A. Rupp, C. Wolf: Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves? - Workshop on Cryptographic Hardware and Embedded Systems (CHES 2008), LNCS, Springer-Verlag, 2008 (Best Paper Award).
B. Gierlichs, L. Batina, C. Clavier, T. Eisenbarth, A. Gouget, H. Handschuh, T. Kasper, K. Lemke-Rust, S. Mangard, A. Moradi, E. Oswald: Susceptibility of eSTREAM Candidates towards Side Channel Analysis - SASC workshop 2008
S. Rohde, T. Eisenbarth, E. Dahmen, J. Buchmann, C. Paar: Efficient Hash-Based Signatures on Embedded Devices - SECSI - Secure Component and System Identification, Berlin, Deutschland, 2008
A. Bogdanov, T. Eisenbarth, M. Wolf, T. Wollinger: Trusted Computing for Automotive Systems: New Approaches to Enforce Security for Electronic Systems in Vehicles - VDI-Kongress ``Automotive Security'', Wolfsburg, 2007.
T. Eisenbarth, T. Güneysu, C. Paar, A.-R. Sadeghi, D. Schellekens, M. Wolf: Reconfigurable Trusted Computing in Hardware - Scalable Trusted Computing, ACM STC 2007, Alexandria, Virginia, USA. Proceedings, ACM Press. November 2, 2007.
F. Regazzoni, T. Eisenbarth, J. Großschädl, L. Breveglieri, P. Ienne, I. Koren, C. Paar: Power Attacks Resistance of Cryptographic S-boxes with added Error Detection Circuits - In Proceedings of the 21st IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT'07), Rome, Italy, September 26-28, 2007.
A. Bogdanov, T. Eisenbarth, A. Rupp: A Hardware-Assisted Realtime Attack on A5/2 without Precomputations - Cryptographic Hardware and Embedded Systems - CHES 2007, LNCS, Springer-Verlag, September 10 - 13, 2007.
F. Regazzoni, S. Badel, T. Eisenbarth, J. Großschädl, A. Poschmann, Z. Toprak, M. Macchetti, L. Pozzi, C. Paar, Y. Leblebici, P. Ienne: A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies - International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS IC 07), Samos, Greece, July 16-19, 2007.
S. Rinne, T. Eisenbarth, C. Paar: Performance Analysis of Contemporary Light-Weight Block Ciphers on 8-bit Microcontrollers - Software Performance Enhancement for Encryption and Decryption (SPEED 2007), Amsterdam, NL June 11-12, 2007
T. Eisenbarth, T. Güneysu, C. Paar, A.-R. Sadeghi, M. Wolf, R. Tessier: Establishing Chain of Trust in Reconfigurable Hardware - 15th Annual IEEE Symposium on Field-Programmable Custom Computing Machines. IEEE, 2007, pp. 287-288, Napa, California, April 23-25, 2007.
T. Mussenbrock, T. Eisenbarth, R.P. Brinkmann, Anomalous skin effect in technological radio frequency plasmas - XIV International Symposium on Theoretical Electrical Engineering (ISTET), Szczecin, Poland, 2007.
G. Meiser, T. Eisenbarth, K. Lemke-Rust, C. Paar: Software Implementation of eSTREAM Profile I Ciphers on embedded 8-bit AVR Microcontrollers - The State of the Art of Stream Ciphers - SASC 2007, Bochum, Germany, 2007.
Book Chapters
T. Eisenbarth, T. Kasper, C. Paar, S. Indesteege : KeeLoq - Entry in Encyclopedia of Cryptography and Security, 2nd Ed., H. van Tilborg, S. Jajodia (Eds.), Springer 2011, ISBN 978-1-4419-5905-8
A. Bogdanov, T. Eisenbarth, C.Paar, M.Wolf: Trusted Computing for Automotive Systems - Book Chapter in Trusted Computing, N.Pohlmann, H.Reimer (Eds.), Vieweg-Verlag, 2007.
Other Publications
T. Eisenbarth, T. Kasper, C. Paar: Torschlusspanik - iX - Magazin für professionelle Informationstechnik, 9/2008, p. 121
T. Eisenbarth, T. Kasper, C. Paar: Sicherheit moderner Funktüröffnersysteme - Datenschutz und Datensicherheit, Ausgabe: 8/2008
L. Batina, T. Eisenbarth, B. Gierlichs, F. Koeune, E. Oswald, F.-X. Standaert, S. Tillich: Theoretical Models for Side-Channel Attacks - ECRYPT NOE Deliverable, D.VAM.15, June 2008
http://www.ecrypt.eu.org/ecrypt1/documents/D.VAM.15.pdf
A. Moradi, T. Eisenbarth , A. Poschmann , C. Rolfes , C. Paar , M. T. Manzuri Shalmani , M. Salmasizadeh: Information Leakage of Flip-Flops in DPA-Resistant Logic Styles - Cryptology ePrint Archive: Report 2008/188
T. Eisenbarth, T. Mussenbrock, R.P. Brinkmann: Anomaler Skineffekt in Hochfrequenzplasmen - Spring Conference on Plasma Physics of the German Physical Society, Düsseldorf, Germany, 2007.
Invited Talks
Cache Attacks: A Current Overview NXP Semiconductors, Hamburg, Germany, January 2018.
Cache Attacks: From Cloud to Mobile SPACE 2017, Don Bosco College of Engineering, Goa, India, December 14, 2017.