Daniel Gruß
Univ.-Prof. Dipl.-Ing. Dr.techn. BScSecure Systems, Professor
Daniel Gruss is a professor in Information Security at the Graz University of Technology, Institute of Applied Information Processing and Communications.
He finished his PhD with distinction in less than 3 years. He has been involved in teaching operating system undergraduate courses since 2010. Daniel's research focuses on software-based attacks and defenses on microarchitectural layers in hardware and software. He implemented the first remote fault
attack running in a website, known as Rowhammer.js. He frequently
speaks at top international venues, such as Black Hat, Usenix
Security, IEEE S&P, ACM CCS, Chaos Communication Congress, and others. His research
team was one of the teams that found the Meltdown and Spectre bugs
published in early 2018 and designed the software patch (KAISER) against Meltdown which is now integrated in every operating system.
Publications
PLATYPUS: Software-based Power Side-Channel Attacks on x86
Lipp M., Kogler A., Oswald D., Schwarz M., Easdon C., Canella C., Gruß D.
2021 IEEE Symposium on Security and Privacy (SP), 42th IEEE Symposium on Security and Privacy
Systematic Analysis of Randomization-based Protected Cache Architectures
Purnal A., Giner L., Gruß D., Verbauwhede I.
42th IEEE Symposium on Security and Privacy, 42th IEEE Symposium on Security and Privacy
Specfuscator: Evaluating Branch Removal as a Spectre Mitigation
Schwarzl M., Canella C., Gruß D., Schwarz M.
Speculative Dereferencing: Reviving Foreshadow
Schwarzl M., Schuster T., Schwarz M., Gruß D.
Automating Seccomp Filter Generation for Linux Applications
Canella C., Werner M., Gruß D., Schwarz M.