T
Thomas Eisenbarth
Researcher at University of Lübeck
Publications - 163
Citations - 5900
Thomas Eisenbarth is an academic researcher from University of Lübeck. The author has contributed to research in topics: Cache & Side channel attack. The author has an hindex of 38, co-authored 152 publications receiving 5090 citations. Previous affiliations of Thomas Eisenbarth include Worcester Polytechnic Institute & Florida Atlantic University.
Papers
More filters
Journal ArticleDOI
A Survey of Lightweight-Cryptography Implementations
Thomas Eisenbarth,Sandeep Kumar +1 more
TL;DR: A selection of recently published lightweight-cryptography implementations are presented and compared to state-of-the-art results in their field, targeting embedded hardware and software.
Proceedings ArticleDOI
S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES
TL;DR: A fine-grain cross-core cache attack that exploits access time variations on the last level cache and can be customized to work virtually at any cache level/size is introduced.
Book ChapterDOI
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
Thomas Eisenbarth,Timo Kasper,Amir Moradi,Christof Paar,Mahmoud Salmasizadeh,Mohammad Taghi Manzuri Shalmani +5 more
TL;DR: This work presents the first successful differential power analysis attacks on numerous commercially available products employing KeeLoq code hopping, and demonstrates how to recover the secret key of a remote control and replicate it from a distance, just by eavesdropping on at most two messages.
Book ChapterDOI
CacheZoom: How SGX Amplifies the Power of Cache Attacks
TL;DR: CacheZoom as discussed by the authors is able to track all memory accesses of SGX enclaves with high spatial and temporal precision, and it can recover AES keys from T-table based implementations with as few as ten measurements.
Book ChapterDOI
Wait a Minute! A fast, Cross-VM Attack on AES
TL;DR: In this article, a cache-based attack on OpenSSL AES implementation running on VMware VMs is presented, which takes only in the order of seconds to minutes to succeed in a cross-VM setting.