Thorsten Eisenhofer

ML & Computer Security

About Me

I am a 4th year Ph.D. Student at Ruhr University Bochum working with Thorsten Holz. I am a security researcher in the DFG Cluster of Excellence “Cyber Security in the Age of Large-Scale Adversaries“ (CASA).

My research revolves around the intersection of machine learning and computer security. I am broadly interested in the application of machine learning for computer security and on the security properties of learning algorithms in adversarial settings.

Along the way, I was interning in the SecLab at UC Santa Barbara working with Giovanni Vigna and Christopher Kruegel on symbolic execution and played with Shellphish at the DEF CON CTF finals in Las Vegas. More recently, I was visiting the Cleverhans Lab at the Vector Institute working with Nicolas Papernot on secure and trustworthy machine learning.

I obtained a B.Sc. in Computer Science from Paderborn University and a M.Sc. in Computer Security from Ruhr University Bochum. For my master studies, I was awarded best student in graduating class.

For questions, discussions or collaborations, feel free to reach out via twitter or email .



Hojjat Aghakhani, Lea Schönherr, Thorsten Eisenhofer, Dorothea Kolossa, Thorsten Holz, Christopher Kruegel, and Giovanni Vigna

VenoMave: Targeted Poisoning Against Speech Recognition

Conference on Secure and Trustworthy Machine Learning (SaTML)
[pdf] [code]

Nico Schiller, Merlin Chlosta, Moritz Schloegel, Nils Bars, Thorsten Eisenhofer, Tobias Scharnowski, Felix Domke, Lea Schönherr, and Thorsten Holz

Drone Security and the Mysterious Case of DJI's DroneID

Network and Distributed System Security Symposium (NDSS)


Thorsten Eisenhofer, Doreen Riepel, Varun Chandrasekaran, Esha Ghosh, Olga Ohrimenko, and Nicolas Papernot

Verifiable and Provably Secure Machine Unlearning

Computing Research Repository (CoRR)
[pdf] [code]

Roei Schuster, Jin Peng Zhou, Thorsten Eisenhofer, Paul Grubbs, and Nicolas Papernot

Learned Systems Security

Computing Research Repository (CoRR)

Michel Abdalla, Thorsten Eisenhofer, Eike Kiltz, Sabrina Kunzweiler, and Doreen Riepel

Password-Authenticated Key Exchange from Group Actions

Annual International Cryptology Conference (CRYPTO)

Lea Schönherr, Maximilian Golla, Thorsten Eisenhofer, Jan Wiele, Dorothea Kolossa, and Thorsten Holz

Exploring Accidental Triggers of Smart Speakers

Computer Speech & Language (CSL)
[pdf] [website]


Thorsten Eisenhofer, Lea Schönherr, Joel Frank, Lars Speckemeier, Dorothea Kolossa, and Thorsten Holz

Dompteur: Taming Audio Adversarial Examples

USENIX Security Symposium (USENIX)
[pdf] [talk] [slides] [code]


Joel Frank, Thorsten Eisenhofer, Lea Schönherr, Asja Fischer, Dorothea Kolossa, and Thorsten Holz

Leveraging Frequency Analysis for Deep Fake Image Recognition

International Conference on Machine Learning (ICML)
[pdf] [slides] [code]

Lea Schönherr, Thorsten Eisenhofer, Steffen Zeiler, Thorsten Holz, and Dorothea Kolossa

Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems

Annual Computer Security Applications Conference (ACSAC)
[pdf] [talk] [examples]



  • ML & Computer Security, Ruhr University Bochum
    Master・Hands-on class・Winter 2021/22

  • ML & Computer Security, Ruhr University Bochum
    Master・Hands-on class・Summer 2021

  • ML & Computer Security, Ruhr University Bochum
    Master・Hands-on class・Winter 2020/21

Teaching Assistant

  • System Security, Saarland University
    Bachelor・Lecture・Summer 2021

  • System Security, Ruhr University Bochum
    Bachelor・Lecture・Summer 2020

  • Operating System Security, Ruhr University Bochum
    Master・Lecture・Winter 2019/20

  • System Security, Ruhr University Bochum
    Bachelor・Lecture・Summer 2019

News Coverage

Accidental Trigger