Welcome to Moosec!

Our research group is located at the CISPA Helmholtz Center for Information Security in Saarbrücken, Germany, where we work at the intersection of machine learning security.

We attack machine learning systems, defend them, and ask the questions about what makes them fail. This often means going beyond the model — into pre-processing, post-processing, and the hardware and software stack beneath. We also build on modern LLMs and agent systems to push forward on practical security problems: vulnerability analysis, fuzzing, malware classification.

If you are interested in our research, take a look at our recent publications or reach out via mail.

News

May 2026

Huzaifa puts down roots and starts his PhD 🌱, and a new moose joins the herd — welcome our new Research Assistant Rishabh! 🦌

Apr 2026

PINE 2026 🌲 kicks off at Saarland University. A fresh cohort taking on ML security challenges in our hands-on seminar.

Apr 2026

LLM-based Vulnerability Discovery at ICSE 2026. Surprisingly, a simple code metrics classifier can match the performance of state-of-the-art LLMs on classification of vulnerable code functions.

Mar 2026

SaTML in Munich: great talks, nice conversations, and 🥨 way too many pretzels.

Mar 2026

Guest lecture at Reykjavik University 🌌. Joined Giovanni Apruzzese's group remotely to talk about ML security.

more
Feb 2026

We presented Chasing Shadows at NDSS 2026, looking at why so much LLM security research keeps going sideways. Spoiler: it's complicated.

Feb 2026

Happy to contribute a challenge and attend the CISPA European Hackathon Championship in Stockholm 🇸🇪. Great energy, terrible sleep schedules.

Dec 2025

Guest lecture at TU Vienna ☕. Great to visit Daniel Arp and talk about ML security research.

Nov 2025

A first moose finds the forest 🌲. Huzaifa joins as a research intern. Welcome!

Nov 2025

moosec is officially live at CISPA 🚀 Excited to get started!

Publications

2026
Chasing Shadows: Pitfalls in LLM Security Research

Jonathan Evertz, Niklas Risse, Nicolai Neuer, Andreas Müller, Philipp Normann, Gaetano Sapia, Srishti Gupta, David Pape, Soumya Shaw, Devansh Srivastav, Christian Wressnegger, Erwin Quiring, Thorsten Eisenhofer, Daniel Arp, Lea Schönherr

Network and Distributed System Security Symposium (NDSS)

LLM-based Vulnerability Discovery through the Lens of Code Metrics

Felix Weissberg, Lukas Pirch, Erik Imgrund, Jonas Möller, Thorsten Eisenhofer, Konrad Rieck

IEEE/ACM International Conference on Software Engineering (ICSE)

Whispers in the Machine: Confidentiality in Agentic Systems

Jonathan Evertz, Merlin Chlosta, Lea Schönherr, Thorsten Eisenhofer

Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)

Shape-Shifting Malicious Code in Software Backdoors via Language Models

Mohammad Ebrahimi Fard, Felix Weissberg, Erik Imgrund, Thorsten Eisenhofer, Konrad Rieck

ACM Asia Conference on Computer and Communications Security (ASIACCS)

Hardware-Triggered Backdoors

Jonas Möller, Erik Imgrund, Thorsten Eisenhofer, Konrad Rieck

Computing Research Repository (CoRR)

2025
Adversarial Observations in Weather Forecasting

Erik Imgrund, Thorsten Eisenhofer, Konrad Rieck

ACM Conference on Computer and Communications Security (CCS) ★ Distinguished Paper Award

Adversarial Inputs for Linear Algebra Backends

Jonas Möller, Lukas Pirch, Felix Weissberg, Sebastian Baunsgaard, Thorsten Eisenhofer, Konrad Rieck

International Conference on Machine Learning (ICML)

Seeing Through: Analyzing and Attacking Virtual Backgrounds in Video Calls

Felix Weissberg, Jan Malte Hilgefort, Steve Grogorick, Daniel Arp, Thorsten Eisenhofer, Martin Eisemann, Konrad Rieck

USENIX Security Symposium

Prompt Obfuscation for Large Language Models

David Pape, Sina Mavali, Thorsten Eisenhofer, Lea Schönherr

USENIX Security Symposium

Verifiable and Provably Secure Machine Unlearning

Thorsten Eisenhofer, Doreen Riepel, Varun Chandrasekaran, Esha Ghosh, Olga Ohrimenko, Nicolas Papernot

IEEE Conference on Secure and Trustworthy Machine Learning (SaTML)

Exploring the Potential of LLMs for Code Deobfuscation

David Beste, Grégoire Menguy, Hossein Hajipour, Mario Fritz, Antonio Emanuele Cinà, Sébastien Bardin, Thorsten Holz, Thorsten Eisenhofer, Lea Schönherr

Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)

Learned-Database Systems Security

Roei Schuster, Jin Peng Zhou, Thorsten Eisenhofer, Paul Grubbs, Nicolas Papernot

Transactions on Machine Learning Research (TMLR)

2024
A Representative Study on Human Detection of Artificially Generated Media Across Countries

Joel Frank, Franziska Herbert, Jonas Ricker, Lea Schönherr, Thorsten Eisenhofer, Asja Fischer, Markus Dürmuth, Thorsten Holz

IEEE Symposium on Security and Privacy (S&P)

SoK: Where to Fuzz? Assessing Target Selection Methods in Directed Fuzzing

Felix Weissberg, Jonas Möller, Tom Ganz, Erik Imgrund, Lukas Pirch, Lukas Seidel, Moritz Schloegel, Thorsten Eisenhofer, Konrad Rieck

ACM Asia Conference on Computer and Communications Security (ASIACCS)

Cross-Language Differential Testing of JSON Parsers

Jonas Möller, Felix Weissberg, Lukas Pirch, Thorsten Eisenhofer, Konrad Rieck

ACM Asia Conference on Computer and Communications Security (ASIACCS)

2023
Security of Machine Learning Systems

Thorsten Eisenhofer

Dissertation ★ Faculty Award for Outstanding Achievement

No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning

Thorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck

USENIX Security Symposium

VenoMave: Targeted Poisoning Against Speech Recognition

Hojjat Aghakhani, Lea Schönherr, Thorsten Eisenhofer, Dorothea Kolossa, Thorsten Holz, Christopher Kruegel, Giovanni Vigna

IEEE Conference on Secure and Trustworthy Machine Learning (SaTML)

Drone Security and the Mysterious Case of DJI's DroneID

Nico Schiller, Merlin Chlosta, Moritz Schloegel, Nils Bars, Thorsten Eisenhofer, Tobias Scharnowski, Felix Domke, Lea Schönherr, Thorsten Holz

Network and Distributed System Security Symposium (NDSS)

On the Limitations of Model Stealing with Uncertainty Quantification Models

David Pape, Sina Däubener, Thorsten Eisenhofer, Antonio Emanuele Cinà, Lea Schönherr

European Symposium on Artificial Neural Networks (ESANN)

2022
Password-Authenticated Key Exchange from Group Actions

Michel Abdalla, Thorsten Eisenhofer, Eike Kiltz, Sabrina Kunzweiler, Doreen Riepel

Annual International Cryptology Conference (CRYPTO)

Exploring Accidental Triggers of Smart Speakers

Lea Schönherr, Maximilian Golla, Thorsten Eisenhofer, Jan Wiele, Dorothea Kolossa, Thorsten Holz

Computer Speech & Language (CSL)

2021
Dompteur: Taming Audio Adversarial Examples

Thorsten Eisenhofer, Lea Schönherr, Joel Frank, Lars Speckemeier, Dorothea Kolossa, Thorsten Holz

USENIX Security Symposium

2020
Leveraging Frequency Analysis for Deep Fake Image Recognition

Joel Frank, Thorsten Eisenhofer, Lea Schönherr, Asja Fischer, Dorothea Kolossa, Thorsten Holz

International Conference on Machine Learning (ICML)

Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems

Lea Schönherr, Thorsten Eisenhofer, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa

Annual Computer Security Applications Conference (ACSAC)

Teaching

Research Problems in Machine Learning and Security ● SS 2026

Master · Summer 2026 · Saarland University

Students work in small teams on hands-on challenges spanning both attacks against ML systems and security applications of machine learning. Challenges run as Kaggle-style competitions with a shared scoreboard, mixing independent research with collaborative exploration.

Past Teaching

Full teaching history at eisenhofer.me.

Open Positions

We currently have no open positions. That said, we are always open to hearing from motivated people — if our research resonates with you, feel free to send an initiative application.

Send your CV, transcripts, and a short note to eisenhofer@cispa.de.