Daniel Gruss

Orcid: 0000-0002-7977-3246

Affiliations:
  • Graz University of Technology, Institute for Applied Information Processing and Communications, Austria


According to our database1, Daniel Gruss authored at least 90 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SUIT: Secure Undervolting with Instruction Traps.
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024

2023
Programmable System Call Security with eBPF.
CoRR, 2023

Side-Channel Attacks on Optane Persistent Memory.
Proceedings of the 32nd USENIX Security Symposium, 2023

Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels.
Proceedings of the 32nd USENIX Security Symposium, 2023

Practical Timing Side-Channel Attacks on Memory Compression.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

SQUIP: Exploiting the Scheduler Queue Contention Side Channel.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

PT-Guard: Integrity-Protected Page Tables to Defend Against Breakthrough Rowhammer Attacks.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

DOPE: DOmain Protection Enforcement with PKS.
Proceedings of the Annual Computer Security Applications Conference, 2023

Layered Binary Templating.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Layered Binary Templating: Efficient Detection of Compiler- and Linker-introduced Leakage.
CoRR, 2022

SFIP: Coarse-Grained Syscall-Flow-Integrity Protection in Modern Systems.
CoRR, 2022

AMD Prefetch Attacks through Power and Time.
Proceedings of the 31st USENIX Security Symposium, 2022

Half-Double: Hammering From the Next Row Over.
Proceedings of the 31st USENIX Security Symposium, 2022

Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks.
Proceedings of the 31st USENIX Security Symposium, 2022

Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX.
Proceedings of the 31st USENIX Security Symposium, 2022

Rapid Prototyping for Microarchitectural Attacks.
Proceedings of the 31st USENIX Security Symposium, 2022

ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture.
Proceedings of the 31st USENIX Security Symposium, 2022

Finding and Exploiting CPU Features using MSR Templating.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Remote Memory-Deduplication Attacks.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Robust and Scalable Process Isolation Against Spectre in the Cloud.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Domain Page-Table Isolation.
CoRR, 2021

Dynamic Process Isolation.
CoRR, 2021

Systematic Analysis of Randomization-based Protected Cache Architectures.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

PLATYPUS: Software-based Power Side-Channel Attacks on x86.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Speculative Dereferencing: Reviving Foreshadow.
Proceedings of the Financial Cryptography and Data Security, 2021

Specfuscator: Evaluating Branch Removal as a Spectre Mitigation.
Proceedings of the Financial Cryptography and Data Security, 2021

Automating Seccomp Filter Generation for Linux Applications.
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021

2020
How Trusted Execution Environments Fuel Research on Microarchitectural Attacks.
IEEE Secur. Priv., 2020

Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble.
IEEE Secur. Priv., 2020

Malware Guard Extension: abusing Intel SGX to conceal cache attacks.
Cybersecur., 2020

Speculative Dereferencing of Registers: Reviving Foreshadow.
CoRR, 2020

Meltdown: reading kernel memory from user space.
Commun. ACM, 2020

Spectre attacks: exploiting speculative execution.
Commun. ACM, 2020

Donky: Domain Keys - Efficient In-Process Isolation for RISC-V and x86.
Proceedings of the 29th USENIX Security Symposium, 2020

Plundervolt: Software-based Fault Injection Attacks against Intel SGX.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

RAMBleed: Reading Bits in Memory Without Accessing Them.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

ConTExT: A Generic Approach for Mitigating Spectre.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

The Evolution of Transient-Execution Attacks.
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020

Evolution of Defenses against Transient-Execution Attacks.
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020

Nethammer: Inducing Rowhammer Faults through Network Requests.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

KASLR: Break It, Fix It, Repeat.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Fallout: Reading Kernel Writes From User Space.
CoRR, 2019

ConTExT: Leakage-Free Transient Execution.
CoRR, 2019

Store-to-Leak Forwarding: Leaking Data on Meltdown-resistant CPUs.
CoRR, 2019

ScatterCache: Thwarting Cache Attacks via Cache Set Randomization.
Proceedings of the 28th USENIX Security Symposium, 2019

A Systematic Evaluation of Transient Execution Attacks and Defenses.
Proceedings of the 28th USENIX Security Symposium, 2019

SGXJail: Defeating Enclave Malware via Confinement.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Wait a second: playing Hanabi without giving hints.
Proceedings of the 14th International Conference on the Foundations of Digital Games, 2019

NetSpectre: Read Arbitrary Memory over Network.
Proceedings of the Computer Security - ESORICS 2019, 2019

Practical Enclave Malware with Intel SGX.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

Page Cache Attacks.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Fallout: Leaking Data on Meltdown-resistant CPUs.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

ZombieLoad: Cross-Privilege-Boundary Data Sampling.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Spectre Attacks: Exploiting Speculative Execution.
meltdownattack.com, 2018

Meltdown
meltdownattack.com, 2018

Kernel Isolation: From an Academic Idea to an Efficient Patch for Every Computer.
login Usenix Mag., 2018

NetSpectre: Read Arbitrary Memory over Network.
CoRR, 2018

Meltdown: Reading Kernel Memory from User Space.
Proceedings of the 27th USENIX Security Symposium, 2018

Another Flip in the Wall of Rowhammer Defenses.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
KeyDrown: Eliminating Keystroke Timing Side-Channel Attacks.
CoRR, 2017

Software-based Microarchitectural Attacks.
CoRR, 2017

Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory.
Proceedings of the 26th USENIX Security Symposium, 2017

Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Software-basierte Mikroarchitekturangriffe.
Proceedings of the Ausgezeichnete Informatikdissertationen 2017, 2017

Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript.
Proceedings of the Financial Cryptography and Data Security, 2017

KASLR is Dead: Long Live KASLR.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

Practical Keystroke Timing Attacks in Sandboxed JavaScript.
Proceedings of the Computer Security - ESORICS 2017, 2017

Malware Guard Extension: Using SGX to Conceal Cache Attacks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

2016
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks.
Proceedings of the 25th USENIX Security Symposium, 2016

ARMageddon: Cache Attacks on Mobile Devices.
Proceedings of the 25th USENIX Security Symposium, 2016

Flush+Flush: A Fast and Stealthy Cache Attack.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

Drammer: Deterministic Rowhammer Attacks on Mobile Platforms.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Reverse Engineering Intel DRAM Addressing and Exploitation.
CoRR, 2015

ARMageddon: Last-Level Cache Attacks on Mobile Devices.
CoRR, 2015

Flush+Flush: A Stealthier Last-Level Cache Attack.
CoRR, 2015

Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches.
Proceedings of the 24th USENIX Security Symposium, 2015

Practical Memory Deduplication Attacks in Sandboxed Javascript.
Proceedings of the Computer Security - ESORICS 2015, 2015


  Loading...