LEISec
Laboratory for Experimental Information Security


LEISec is a research lab, headed by Eran Tromer, in Tel Aviv University's School of Computer Science. The lab's goal is to investigate the challenges of cryptography and information security in the real world, to identify and analyze new threats, and to develop new methods for protecting information, computers and networks. The lab takes a hands-on approach, emphasizing empirical evaluation and concrete system implementations.

A main current focus is on physical information leakage from complex systems, such as laptop PCs. Our most recent publications on this topic are:

  • Roei Schuster, Vitaly Shmatikov, Eran Tromer,

    Beauty and the Burst: remote identification of encrypted video streams

    proc. USENIX Security 2017, to appear

  • Daniel Genkin, Lev Pachmanov, Itamar Pipman, Adi Shamir, Eran Tromer, Yuval Yarom,

    Physical key extraction attacks on PCs

    Communications of the ACM, vol. 59 no. 6, 70-79, 2016

  • Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom,

    ECDSA key extraction from mobile devices via nonintrusive physical side channels,

    ACM Conference on Computer and Communications Security (CCS) 2016, 1626-1638, 2016

  • Yuval Yarom, Daniel Genkin, Nadia Heninger,

    CacheBleed: a timing attack on OpenSSL constant time RSA

    proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2016, LNCS 9813, 346-367, 2016

  • Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer,

    ECDH key-extraction via low-bandwidth electromagnetic attacks on PCs,

    proc. RSA Conference Cryptographers' Track (CT-RSA) 2016, LNCS 9610, 219-235, Springer, 2016

  • Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer,

    Stealing keys from PCs using a radio: cheap electromagnetic attacks on windowed exponentiation,

    proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2015, LNCS 9293, 207--228, Springer, 2015

  • Daniel Genkin, Itamar Pipman, Eran Tromer,

    Get your hands off my laptop: physical side-channel key-extraction attacks on PCs,

    proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2014, LNCS 8731, 242-260, Springer, 2014


    Daniel Genkin, Itamar Pipman, Eran Tromer,

    Get your hands off my laptop: physical side-channel key-extraction attacks on PCs (extended version),

    Journal of Cryptographic Engineering, vol. 5 no. 2, 95--112, 2015


Other publications by lab members on information leakage from PCs include:

  • Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage,

    Hey, you, get off of my cloud! Exploring information leakage in third-party compute clouds,

    proc. ACM Conference on Computer and Communications Security (CCS) 2009, 199-212, ACM, 2009

  • Eran Tromer, Dag Arne Osvik, Adi Shamir,

    Efficient cache attacks on AES, and countermeasures,

    Journal of Cryptology, vol. 23 no. 1, 37-71, Springer, 2010


    Dag Arne Osvik, Adi Shamir, Eran Tromer,

    Cache attacks and countermeasures: the case of AES,

    proc. RSA Conference Cryptographers' Track (CT-RSA) 2006, LNCS 3860, 1-20, Springer, 2006

Additional recent empirical works by lab members include:

  • Roei Schuster, Eran Tromer,

    DroidDisintegrator: intra-application information flow control in Android apps,

    proc. ACM Asia Conference on Computer and Communications Security (ASIACCS) 2016, to appear

  • Almog Benin, Sivan Toledo, Eran Tromer,

    Secure Association for the Internet of Things,

    International Workshop on Secure Internet of Things (SIOT) 2015.

  • Ory Samorodnitzky, Eran Tromer, Avishai Wool,

    Analyzing unique-bid auction sites for fun and profit,

    proc. Network & Distributed System Security Symposium (NDSS) 2013, 2013

A typical day at LEISec

LEISec lab life