Daniel Gruß

Univ.-Prof. Dipl.-Ing. Dr.techn. BSc

Secure Systems, Professor

Daniel Gruss is a professor in Information Security at the Graz University of Technology, Institute of Information Security. He finished his PhD with distinction in less than 3 years. He has been involved in teaching operating system undergraduate courses since 2010. Daniel's research focuses on software-based attacks and defenses on microarchitectural layers in hardware and software. He implemented the first remote fault attack running in a website, known as Rowhammer.js. He frequently speaks at top international venues, such as Black Hat, Usenix Security, IEEE S&P, ACM CCS, Chaos Communication Congress, and others. His research team was one of the teams that found the Meltdown and Spectre bugs published in early 2018 and designed the software patch (KAISER) against Meltdown which is now integrated in every operating system.
Daniel Gruß

Service

    • Technical Program Committee: AsiaCCS'21, SEC'21, WOOT'20, CARDIS'20, SEC'20, TCHES'20, WOOT'19, SEC'19, CARDS'19, BlueHat IL'19, CCS'18, WOOT '18, WOOT'19, SPACE'18, WoSSCA'18, Kangacrypt'18
 
    • Reviewer: AJSE, PLOS ONE, IET Information Security
 
    • External Reviewer: PoPETS'18, DIMVA'17, EUROCRYPT'17, CHES'16, CT-RSA'16, DATE'16, CT-RSA'15, DATE'15, Indocrypt'15
 

Publications

When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks

Maar L., Giner L., Gruß D., Mangard S.
Proceedings of the 34rd USENIX Security Symposium, 34th USENIX Security Symposium, (Proceedings of the 34rd USENIX Security Symposium)

KernelSnitch: Side-Channel Attacks on Kernel Data Structures

Maar L., Juffinger J., Steinbauer T., Gruß D., Mangard S.
Network and Distributed System Security Symposium (NDSS) 2025, Network and Distributed System Security Symposium 2025

A Systematic Evaluation of Novel and Existing Cache Side Channels

Rauscher F., Fiedler C., Kogler A., Gruß D.
Network and Distributed System Security Symposium (NDSS) 2025, Network and Distributed System Security Symposium 2025

SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript

Gast S., Czerny R., Juffinger J., Rauscher F., Franza S., Gruß D.
Proceedings of the 33rd USENIX Security Symposium, 33rd USENIX Security Symposium: USENIX Security 2024, 2315-2332

Generic and Automated Drive-by GPU Cache Attacks from the Browser

Giner L., Czerny R., Gruber C., Rauscher F., Kogler A., De Almeida Braga D., Gruß D.
ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 19th ACM ASIA Conference on Computer and Communications Security, 128-140, (ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security)

More Publications