Daniel Gruß

Univ.-Prof. Dipl.-Ing. Dr.techn. BSc

Secure Systems, Professor

Daniel Gruss is a professor in Information Security at the Graz University of Technology, Institute of Applied Information Processing and Communications. He finished his PhD with distinction in less than 3 years. He has been involved in teaching operating system undergraduate courses since 2010. Daniel's research focuses on software-based attacks and defenses on microarchitectural layers in hardware and software. He implemented the first remote fault attack running in a website, known as Rowhammer.js. He frequently speaks at top international venues, such as Black Hat, Usenix Security, IEEE S&P, ACM CCS, Chaos Communication Congress, and others. His research team was one of the teams that found the Meltdown and Spectre bugs published in early 2018 and designed the software patch (KAISER) against Meltdown which is now integrated in every operating system.
Daniel Gruß

Publications

A Systematic Evaluation of Novel and Existing Cache Side Channels

Rauscher F., Fiedler C., Kogler A., Gruß D.
Network and Distributed System Security Symposium (NDSS) 2025, Network and Distributed System Security Symposium 2025

Secret Spilling Drive: Leaking User Behavior through SSD Contention

Juffinger J., Rauscher F., La Manna G., Gruß D.
Network and Distributed System Security (NDSS) Symposium 2025, Network and Distributed System Security Symposium 2025

CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP

Gast S., Weissteiner H., Schröder R., Gruß D.
Network and Distributed System Security (NDSS) Symposium 2025, Network and Distributed System Security Symposium 2025

Cross-Core Interrupt Detection: Exploiting User and Virtualized IPIs

Rauscher F., Gruß D.
ACM Conference on Computer and Communications Security (CCS) 2024, ACM Conference on Computer and Communications Security

SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript

Gast S., Czerny R., Juffinger J., Rauscher F., Franza S., Gruß D.
USENIX Security Symposium 2024, 33rd USENIX Security Symposium: USENIX Security 2024, 2315-2332

More Publications