Daniel Gruß

Ass.Prof. Dipl.-Ing. Dr.techn. BSc

Secure Systems, Assistant Professor

Daniel Gruss is an assistant professor of Information Security, leading the CoreSec group, at the Graz University of Technology, Institute of Applied Information Processing and Communications. He finished his PhD with distinction in less than 3 years. He has been involved in teaching operating system undergraduate courses since 2010. Daniel's research focuses on software-based attacks and defenses on microarchitectural layers in hardware and software. He implemented the first remote fault attack running in a website, known as Rowhammer.js. He frequently speaks at top international venues, such as Black Hat, Usenix Security, IEEE S&P, ACM CCS, Chaos Communication Congress, and others. His research team was one of the teams that found the Meltdown and Spectre bugs published in early 2018 and designed the software patch (KAISER) against Meltdown which is now integrated in every operating system.
Daniel Gruß


  • System-Level Programming
  • Operating Systems
  • Side-Channel Security
  • Security Aspects in Software Development
  • Cloud Operating Systems


  • Technical Program Committee: SEC’20, TCHES’20, WOOT’19, SEC’19, CARDS’19, BlueHat IL’19, CCS’18, WOOT ’18, WOOT’19, SPACE’18, WoSSCA’18, Kangacrypt’18
  • Reviewer: AJSE, PLOS ONE, IET Information Security
  • External Reviewer: PoPETS’18, DIMVA’17, EUROCRYPT’17, CHES’16, CT-RSA’16, DATE’16, CT-RSA’15, DATE’15, Indocrypt’15