Daniel Gruß

Assoc.Prof. Dipl.-Ing. Dr.techn. BSc

Secure Systems, Assistant Professor

Daniel Gruss is an associate professor in Information Security at the Graz University of Technology, Institute of Applied Information Processing and Communications. He finished his PhD with distinction in less than 3 years. He has been involved in teaching operating system undergraduate courses since 2010. Daniel's research focuses on software-based attacks and defenses on microarchitectural layers in hardware and software. He implemented the first remote fault attack running in a website, known as Rowhammer.js. He frequently speaks at top international venues, such as Black Hat, Usenix Security, IEEE S&P, ACM CCS, Chaos Communication Congress, and others. His research team was one of the teams that found the Meltdown and Spectre bugs published in early 2018 and designed the software patch (KAISER) against Meltdown which is now integrated in every operating system.
Daniel Gruß


PLATYPUS: Software-based Power Side-Channel Attacks on x86

Lipp M., Kogler A., Oswald D., Schwarz M., Easdon C., Canella C., Gruß D.
2021 IEEE Symposium on Security and Privacy (SP), 42th IEEE Symposium on Security and Privacy

Systematic Analysis of Randomization-based Protected Cache Architectures

Purnal A., Giner L., Gruß D., Verbauwhede I.
42th IEEE Symposium on Security and Privacy, 42th IEEE Symposium on Security and Privacy

Specfuscator: Evaluating Branch Removal as a Spectre Mitigation

Schwarzl M., Canella C., Gruß D., Schwarz M.

Speculative Dereferencing: Reviving Foreshadow

Schwarzl M., Schuster T., Schwarz M., Gruß D.

Automating Seccomp Filter Generation for Linux Applications

Canella C., Werner M., Gruß D., Schwarz M.

More Publications