I'm an associate professor in the Secure Systems group (Team Gruss/CoreSec) at the Graz University of Technology, Institute of Applied Information Processing and Communications. In my research I explore software-based microarchitectural attacks and operating system features. I teach undergraduate courses such as Operating Systems (see Hall of Fame), and System-Level Programming, and graduate courses such as Embedded Security, and Security Aspects in Software Development.

Publications

2024
July
  Presshammer: Rowhammer and Rowpress without Physical Address Information
Jonas Juffinger, Sudheendra Raghav Neela, Martin Heckel, Lukas Schwarz, Florian Adamsky, and Daniel Gruss.
DIMVA'24, Lausanne, Switzerland, July 17-19, 2024.     [Conference]
  Generic and Automated Drive-by GPU Cache Attacks from the Browser
Lukas Giner, Roland Czerny, Christoph Gruber, Fabian Rauscher, Andreas Kogler, Daniel De Almeida Braga, Daniel Gruss.
AsiaCCS'24, Singapore, July 1-5, 2024.     [Conference] [Demo Website]
April   SUIT: Secure Undervolting with Instruction Traps
Jonas Juffinger, Stepan Kalinin, Daniel Gruss, Frank Mueller.
ASPLOS'24, San Diego, CA, USA, April 27 - May 1, 2024.     [Conference]
March   JavaSQUIP: Remote Scheduler Contention Attacks
Stefan Gast, Jonas Juffinger, Lukas Maar, Christoph Royer, Andreas Kogler, Daniel Gruss.
FC'24, Willemstad, Curaçao, March 4-8, 2024.     [Conference]
February   IdleLeak: Exploiting Idle State Side Effects for Information Leakage
Fabian Rauscher, Andreas Kogler, Jonas Juffinger, Daniel Gruss.
NDSS'24, San Diego, CA, USA, February 26 - March 1, 2024.     [Conference]
2023
December
  DOPE: DOmain Protection Enforcement with PKS
Lukas Maar, Martin Schwarzl, Fabian Rauscher, Daniel Gruss, Stefan Mangard.
Annual Computer Security Applications Conference (ACSAC), Austin, TX, USA, December 4-8, 2023 (AR: 23.3%).     [Conference]
August   Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels
Andreas Kogler, Jonas Juffinger, Lukas Giner, Lukas Gerlach, Martin Schwarzl, Michael Schwarz, Daniel Gruss, Stefan Mangard.
32nd USENIX Security Symposium, Anaheim, CA, USA, August 9-11, 2023 (AR: 29.0%).     [Conference]
  Side-Channel Attacks on Optane Persistent Memory
Sihang Liu, Suraaj Kanniwadi, Martin Schwarzl, Andreas Kogler, Daniel Gruss, Samira Khan.
32nd USENIX Security Symposium, Anaheim, CA, USA, August 9-11, 2023 (AR: 29.0%).     [Conference]
June   PT-Guard: Integrity-Protected Page Tables to Defend Against Breakthrough Rowhammer Attacks
Anish Saxena, Gururaj Saileshwar, Jonas Juffinger, Andreas Kogler, Daniel Gruss, Moinuddin Qureshi.
DSN, Porto, Portugal, June 27-30, 2023 (AR: 19.6%).     [Conference]
  Layered Binary Templating
Martin Schwarzl, Erik Kraft, Daniel Gruss.
ACNS, Kyoto, Japan, June 19-22, 2023 (AR: 20.2%).     [Conference]
May   Practical Timing Side-Channel Attacks on Memory Compression
Martin Schwarzl, Pietro Borrello, Gururaj Saileshwar, Hanna Müller, Michael Schwarz, Daniel Gruss.
S&P'23, San Francisco, CA, USA, May 22-26, 2023 (AR: 17.0%).     [Conference]
  Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks
Lukas Giner, Stefan Steinegger, Antoon Purnal, Maria Eichlseder, Thomas Unterluggauer, Stefan Mangard, Daniel Gruss.
S&P'23, San Francisco, CA, USA, May 22-26, 2023 (AR: 17.0%).     [Conference]
  CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer
Jonas Juffinger, Lukas Lamster, Andreas Kogler, Maria Eichlseder, Moritz Lipp, Daniel Gruss.
S&P'23, San Francisco, CA, USA, May 22-26, 2023 (AR: 17.0%).     [Conference]
  SQUIP: Exploiting the Scheduler Queue Contention Side Channel
Stefan Gast, Jonas Juffinger, Martin Schwarzl, Gururaj Saileshwar, Andreas Kogler, Simone Franza, Markus Köstl, Daniel Gruss.
S&P'23, San Francisco, CA, USA, May 22-26, 2023 (AR: 17.0%).     [Conference]
February   Programmable System Call Security with eBPF
Jinghao Jia, YiFei Zhu, Dan Williams, Andrea Arcangeli, Claudio Canella, Hubertus Franke, Tobin Feldman-Fitzthum, Dimitrios Skarlatos, Daniel Gruss, Tianyin Xu.
arXiv, 2302.10366.     [arXiv]
2022
September
  Robust and Scalable Process Isolation against Spectre in the Cloud
Martin Schwarzl, Pietro Borrello, Andreas Kogler, Kenton Varda, Thomas Schuster, Michael Schwarz, Daniel Gruss.
ESORICS, Copenhagen, Denmark, September 26-30, 2022 (AR: 18.5%).     [Conference]
August   Half-Double: Hammering From the Next Row Over
Andreas Kogler, Jonas Juffinger, Salman Qazi, Yoongu Kim, Moritz Lipp, Nicolas Boichat, Eric Shiu, Mattias Nissler, Daniel Gruss.
31st USENIX Security Symposium, Boston, MA, USA, August 10-12, 2022 (AR: 18.1%).     [Conference]
  ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture
Pietro Borrello, Andreas Kogler, Martin Schwarzl, Moritz Lipp, Daniel Gruss, Michael Schwarz.
31st USENIX Security Symposium, Boston, MA, USA, August 10-12, 2022 (AR: 18.1%).     [Conference]
  Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks
Andreas Kogler, Daniel Gruss, Michael Schwarz.
31st USENIX Security Symposium, Boston, MA, USA, August 10-12, 2022 (AR: 18.1%).     [Conference]
  AMD Prefetch Attacks through Power and Time
Moritz Lipp, Daniel Gruss, Michael Schwarz.
31st USENIX Security Symposium, Boston, MA, USA, August 10-12, 2022 (AR: 18.1%).     [Conference]
  Rapid Prototyping for Microarchitectural Attacks
Catherine Easdon, Michael Schwarz, Martin Schwarzl, Daniel Gruss.
31st USENIX Security Symposium, Boston, MA, USA, August 10-12, 2022 (AR: 18.1%).     [Conference]
  Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX
Lukas Giner, Andreas Kogler, Claudio Canella, Michael Schwarz, Daniel Gruss.
31st USENIX Security Symposium, Boston, MA, USA, August 10-12, 2022 (AR: 18.1%).     [Conference]
May   Finding and Exploiting CPU Features using MSR Templating
Andreas Kogler, Daniel Weber, Martin Haubenwallner, Moritz Lipp, Daniel Gruss, Michael Schwarz.
S&P'22, San Francisco, CA, USA, May 23-26, 2022 (AR: 14.6%).     [Conference]
April   Remote Memory-Deduplication Attacks
Martin Schwarzl, Erik Kraft, Moritz Lipp, Daniel Gruss.
NDSS'22, San Diego, CA, USA, April 24-28, 2022 (AR: 16.2%).     [Conference]
February   SFIP: Coarse-Grained Syscall-Flow-Integrity Protection in Modern Systems
Claudio Canella, Sebastian Dorn, Daniel Gruss, Michael Schwarz.
arXiv, 2202.13716.     [arXiv]
  Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks
Amir Naseredini, Stefan Gast, Martin Schwarzl, Pedro Miguel Sousa Bernardo, Amel Smajic, Claudio Canella, Martin Berger, Daniel Gruss.
ICISSP'22, Virtual, February 9-11, 2022.     [Conference]
2021
November
  Automating Seccomp Filter Generation for Linux Applications
Claudio Canella, Mario Werner, Daniel Gruss, Michael Schwarz.
CCSW'21, Seoul, Korea (AR: 32.3%).     [Proceedings]
May   PLATYPUS: With Great Power comes Great Leakage
Moritz Lipp, Andreas Kogler, David Oswald, Michael Schwarz, Catherine Easdon, Claudio Canella, Daniel Gruss.
S&P'21, San Francisco, CA, USA, May 23-27, 2021 (AR: 10.0%).     [Conference]
  Systematic Analysis of Randomization-based Protected Cache Architectures
Antoon Purnal, Lukas Giner, Daniel Gruss, Ingrid Verbauwhede.
S&P'21, San Francisco, CA, USA, May 23-27, 2021 (AR: 10.0%).     [Conference]
March   Speculative Dereferencing of Registers: Reviving Foreshadow
Martin Schwarzl, Thomas Schuster, Michael Schwarz, Daniel Gruss.
FC'21, Grenada, March 1-5, 2021 (AR: 24.7%).     [Program]
  Specfuscator: Evaluating Branch Removal as a Spectre Mitigation
Martin Schwarzl, Canella Claudio, Daniel Gruss, Michael Schwarz.
FC'21, Grenada, March 1-5, 2021 (AR: 24.7%).     [Program]
2020
November
  Transient-Execution Attacks
Daniel Gruss.
Habilitation Thesis, Graz University of Technology. June 12, 2020. Venia Docendi: November 27, 2020.     [Part I only]
September   Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble
Kit Murdock, David Oswald, Flavio D. Garcia, Jo Van Bulck, Daniel Gruss, Frank Piessens.
IEEE Security & Privacy, Vol. 18, No. 5, Sept.-Oct. 2020.     [Journal]
  How Trusted Execution Environments Fuel Research on Microarchitectural Attacks
Michael Schwarz, Daniel Gruss.
IEEE Security & Privacy, Vol. 18, No. 5, Sept.-Oct. 2020.     [Journal]
  The Evolution of Transient-Execution Attacks
Claudio Canella, Khaled N. Khasawneh, Daniel Gruss.
GLSVLSI'20, Beijing, China, September 8-11, 2020.     [Conference]
  Evolution of Defenses against Transient-Execution Attacks
Claudio Canella, Sai Manoj Pudukotai Dinakarrao, Daniel Gruss, Khaled N. Khasawneh.
GLSVLSI'20, Beijing, China, September 8-11, 2020.     [Conference]
August   Donky: Domain Keys - Efficient In-Process Isolation for RISC-V and x86
David Schrammel, Samuel Weiser, Stefan Steinegger, Martin Schwarzl, Michael Schwarz, Stefan Mangard, Daniel Gruss.
29th USENIX Security Symposium, Boston, MA, USA, August 12-14, 2020 (AR: 16.1%).     [Conference]
July   Spectre Attacks: Exploiting Speculative Execution
Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom.
Communications of the ACM, Vol. 63 No. 7, Pages 93-101.     [Journal]
June   Meltdown: Reading Kernel Memory from User Space
Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg, Raoul Strackx.
Communications of the ACM, Vol. 63 No. 6, Pages 46-56.     [Journal]
  Nethammer: Inducing Rowhammer Faults through Network Requests
Moritz Lipp, Michael Schwarz, Lukas Raab, Lukas Lamster, Misiker Tadesse Aga, Clémentine Maurice, Daniel Gruss.
SILM Workshop'20, Genova, Italy, June 19, 2020.     [Conference Program] [Pre-print (May'18)]
  Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors
Moritz Lipp, Vedad Hadzic, Michael Schwarz, Arthur Perais, Clémentine Maurice, Daniel Gruss.
AsiaCCS'20, Taipei, Taiwan, June 1-5, 2020 (AR: 21.8%).     [Conference]
  KASLR: Break It, Fix It, Repeat
Claudio Canella, Michael Schwarz, Martin Haubenwallner, Martin Schwarzl, Daniel Gruss.
AsiaCCS'20, Taipei, Taiwan, June 1-5, 2020 (AR: 21.8%).     [Conference]
May   LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection
Jo Van Bulck, Daniel Moghimi, Michael Schwarz, Moritz Lipp, Marina Minkin, Daniel Genkin, Yuval Yarom, Berk Sunar, Daniel Gruss, Frank Piessens.
S&P'20, San Francisco, CA, USA, May 18-20, 2020 (AR: 12.3%).     [Website] [Conference]
  Plundervolt: Software-based Fault Injection Attacks against Intel SGX
Kit Murdock, David Oswald, Flavio D. Garcia, Jo Van Bulck, Daniel Gruss, Frank Piessens.
S&P'20, San Francisco, CA, USA, May 18-20, 2020 (AR: 12.3%).     [Conference]
  RAMBleed: Reading Bits in Memory Without Accessing Them
Andrew Kwong, Daniel Genkin, Daniel Gruss, Yuval Yarom.
S&P'20, San Francisco, CA, USA, May 18-20, 2020 (AR: 12.3%).     [Conference]
February   ConTExT: A Generic Approach for Mitigating Spectre
Michael Schwarz, Moritz Lipp, Claudio Canella, Robert Schilling, Florian Kargl, Daniel Gruss.
NDSS'20, San Diego, CA, USA, February 23-26, 2020 (AR: 17.4%).     [Conference]
January   Malware Guard Extension: abusing Intel SGX to conceal cache attacks
Michael Schwarz, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard.
SpringerOpen Cybersecurity, Vol. 3.     [Journals]
2019
November
  ZombieLoad: Cross-Privilege-Boundary Data Sampling
Michael Schwarz, Moritz Lipp, Daniel Moghimi, Jo Van Bulck, Julian Stecklina, Thomas Prescher, Daniel Gruss.
CCS'19, London, UK, November 11-15, 2019 (AR: 15.7%).     [Pre-print (May'19)] [Conference]
  Page Cache Attacks
Daniel Gruss, Erik Kraft, Trishita Tiwari, Michael Schwarz, Ari Trachtenberg, Jason Hennessey, Alex Ionescu, Anders Fogh.
CCS'19, London, UK, November 11-15, 2019 (AR: 15.7%).     [Conference]
  Fallout: Leaking Data on Meltdown-resistant CPUs
Claudio Canella, Daniel Genkin, Lukas Giner, Daniel Gruss, Moritz Lipp, Marina Minkin, Daniel Moghimi, Frank Piessens, Michael Schwarz, Berk Sunar, Jo Van Bulck, Yuval Yarom.
CCS'19, London, UK, November 11-15, 2019 (AR: 15.7%).     [Conference]
September   SGXJail: Defeating Enclave Malware via Confinement
Samuel Weiser, Luca Mayr, Michael Schwarz, Daniel Gruss.
RAID'19, Beijing, China, September 23-25, 2019 (AR: 22.3%).     [Conference]
  NetSpectre: Read Arbitrary Memory over Network
Michael Schwarz, Martin Schwarzl, Moritz Lipp, Jon Masters, Daniel Gruss.
ESORICS'19, Luxembourg, September 23-27, 2019 (AR: 19.5%).     [Conference] [Pre-print (Jul'18)]
August   Wait a Second: Playing Hanabi without Giving Hints
Markus Eger, Daniel Gruss.
Foundations of Digital Games 2019, San Luis Obispo, CA, USA, August 26-30, 2019 (AR: 31.7%).     [Conference]
  ScatterCache: Thwarting Cache Attacks via Cache Set Randomization
Mario Werner, Thomas Unterluggauer, Lukas Giner, Michael Schwarz, Daniel Gruss, Stefan Mangard.
28th USENIX Security Symposium, Santa Clara, CA, USA, August 14-16, 2019 (AR: 15.7%).     [Conference]
  A Systematic Evaluation of Transient Execution Attacks and Defenses
Claudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, Daniel Gruss.
28th USENIX Security Symposium, Santa Clara, CA, USA, August 14-16, 2019 (AR: 15.7%).     [Conference] [Pre-print (Nov'18)]
June   Practical Enclave Malware with Intel SGX
Michael Schwarz, Samuel Weiser, Daniel Gruss.
DIMVA'19, Gothenburg, Sweden, June 19-20, 2019 (AR: 28.8%).     [Conference]
May   Fallout: Reading Kernel Writes From User Space
Marina Minkin, Daniel Moghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel Gruss, Frank Piessens, Berk Sunar, Yuval Yarom.
arXiv, 1905.12701.     [Pre-print (May'19)]
  Store-to-Leak Forwarding: Leaking Data on Meltdown-resistant CPUs
Michael Schwarz, Claudio Canella, Lukas Giner, Daniel Gruss.
arXiv, 1905.05725.     [Pre-print (May'19)]
  Spectre Attacks: Exploiting Speculative Execution
Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom.
S&P'19, Best Paper, San Francisco, CA, USA, May 20-22, 2019 (AR: 11.5%).     [Conference] [Pre-print (Jan'18)] [Wikipedia]
February   JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits
Michael Schwarz, Florian Lackner, Daniel Gruss.
NDSS'19, San Diego, CA, USA, February 24-27, 2019 (AR: 17.1%).     [Conference]
2018
December
  Kernel Isolation: From an Academic Idea to an Efficient Patch for Every Computer
Daniel Gruss, Dave Hansen, Brendan Gregg.
USENIX ;login, issue: Winter 2018, Vol. 43, No. 4.     [Issue]
November   Software-based microarchitectural attacks
Daniel Gruss.
it - Information Technology, Volume 60: Issue 5-6, November 2018.     [DOI]
September   Software-basierte Mikroarchitekturangriffe
Daniel Gruss.
Ausgezeichnete Informatikdissertationen 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn, Germany, 2018. Presented at INFORMATIK2018 in Berlin, Germany, September 26-27, 2018.     [LNI Digital Library]
August   Meltdown: Reading Kernel Memory from User Space
Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg.
27th USENIX Security Symposium, Baltimore, MD, USA, August 15-17, 2018 (AR: 19.2%).     [Conference] [Code Examples] [Wikipedia]
June   Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features
Michael Schwarz, Daniel Gruss, Moritz Lipp, Clémentine Maurice, Thomas Schuster, Anders Fogh, Stefan Mangard.
AsiaCCS'18, Songdo, Incheon, Korea, Jun 4-8, 2018 (AR: 20.0%).     [Conference]
  Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services
Daniel Gruss, Michael Schwarz, Matthias Wübbeling, Simon Guggi, Timo Malderle, Stefan More, Moritz Lipp.
AsiaCCS'18, Songdo, Incheon, Korea, Jun 4-8, 2018 (AR: 20.0%).     [Conference]
  ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android
Raphael Spreitzer, Felix Kirchengast, Daniel Gruss, Stefan Mangard.
AsiaCCS'18, Songdo, Incheon, Korea, Jun 4-8, 2018 (AR: 20.0%).     [Conference]
May   Another Flip in the Wall of Rowhammer Defenses
Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, Yuval Yarom.
S&P'18, San Francisco, CA, USA, May 21-23, 2018 (AR: 11.5%).     [Conference] [Code Examples] [Pre-print (Oct'17)]
February   JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks
Michael Schwarz, Moritz Lipp, Daniel Gruss.
NDSS'18, San Diego, CA, USA, February 18-21, 2018 (AR: 21.5%).     [Program] [Github]
  KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks
Michael Schwarz, Moritz Lipp, Daniel Gruss, Samuel Weiser, Clémentine Maurice, Raphael Spreitzer, Stefan Mangard.
NDSS'18, San Diego, CA, USA, February 18-21, 2018 (AR: 21.5%).     [Program] [Github] [Pre-print (Jun'17)]
2017
September
  Practical Keystroke Timing Attacks in Sandboxed JavaScript
Moritz Lipp, Daniel Gruss, Michael Schwarz, David Bidner, Clémentine Maurice, Stefan Mangard.
ESORICS'17, Oslo, Norway, September 11-15, 2017 (AR: 15.9%).     [Program]
August   Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory
Daniel Gruss, Julian Lettner, Felix Schuster, Olya Ohrimenko, Istvan Haller, Manuel Costa.
26th USENIX Security Symposium, Vancouver, BC, Canada, August 16-18, 2017 (AR: 16.3%).     [Session]
July   KASLR is Dead: Long Live KASLR
Daniel Gruss, Moritz Lipp, Michael Schwarz, Richard Fellner, Clémentine Maurice, Stefan Mangard.
ESSoS'17, Bonn, Germany, July 2017 (AR: 46.9%).     [Program] [Github] [Wikipedia]
  Malware Guard Extension: Using SGX to Conceal Cache Attacks
Michael Schwarz, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard.
DIMVA'17, Bonn, Germany, July 6-7, 2017 (AR: 26.9%).     [Program] [Slides] [Extended Version]
June   Software-based Microarchitectural Attacks
Daniel Gruss.
PhD Thesis, Graz University of Technology. June 14, 2017.     [Slides] [Part I only]
April   Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript
Michael Schwarz, Clémentine Maurice, Daniel Gruss, Stefan Mangard.
FC'17, Malta, April 2017 (AR: 26.5%).     [Program] [Slides]
February   Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud
Clémentine Maurice, Manuel Weber, Michael Schwarz, Lukas Giner, Daniel Gruss, Carlo Alberto Boano, Kay Römer, Stefan Mangard.
NDSS'17, San Diego, CA, USA, February 2017 (AR: 16.1%).     [Session] [Slides] [Github] [BlackHat Asia] [BlackHat Asia Recording] [Live Demo] [Pwnie Award for Best Song]
2016
October
  Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR
Daniel Gruss, Anders Fogh, Clémentine Maurice, Moritz Lipp, Stefan Mangard.
CCS'16, Vienna, Austria, October 24-28, 2016 (AR: 16.4%).     [Slides] [Github]
  Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
Victor van der Veen, Yanick Fratantonio, Martina Lindorfer, Daniel Gruss, Clementine Maurice, Giovanni Vigna, Herbert Bos, Kaveh Razavi, Cristiano Giuffrida.
CCS'16, Vienna, Austria, October 24-28, 2016 (AR: 16.4%).     [Project Website]
August   DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
Peter Pessl, Daniel Gruss, Clémentine Maurice, Michael Schwarz, Stefan Mangard.
25th USENIX Security Symposium, Austin, Texas, USA, August 10-12, 2016 (AR: 15.6%).     [Session] [Pre-print (Nov'15)] [Slides] [Github] [BlackHat Europe]
  ARMageddon: Cache Attacks on Mobile Devices
Moritz Lipp, Daniel Gruss, Raphael Spreitzer, Clémentine Maurice, Stefan Mangard.
25th USENIX Security Symposium, Austin, Texas, USA, August 10-12, 2016 (AR: 15.6%).     [Session] [Pre-print (Nov'15)] [Slides] [Github] [BlackHat Europe]
July   Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
Daniel Gruss, Clémentine Maurice, Stefan Mangard.
DIMVA'16, Donostia-San Sebastián, Spain, July 7-8, 2016 (AR: 31.8%).     [Conference] [Github] [Pre-print (Jul'15)] [Golem] [Slate] [Heise] [c't] [Vice] [Wikipedia]
  Flush+Flush: A Fast and Stealthy Cache Attack
Daniel Gruss, Clémentine Maurice, Klaus Wagner, Stefan Mangard.
DIMVA'16, Donostia-San Sebastián, Spain, July 7-8, 2016 (AR: 31.8%).     [Conference] [Pre-print (Nov'15)] [Github]
2015
September
  Practical Memory Deduplication Attacks in Sandboxed Javascript
Daniel Gruss, David Bidner, Stefan Mangard.
ESORICS'15, Vienna, Austria, September 23-25, 2015 (AR: 20.1%).     [Conference] [Slides] [PoC by David Bidner]
August   Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches
Daniel Gruss, Raphael Spreitzer, Stefan Mangard.
24th USENIX Security Symposium, Washington, D.C., USA, August 12-14, 2015 (AR: 15.7%).     [Session] [Lightning Talk] [Slides] [Github]

Service

  • Conference Chair: DIMVA'23 (PC chair), DIMVA'22 (PC co-chair)
  • Technical Program Committee: SEC'24, NDSS'24, SEC'23, CCS'23, DIMVA'23, DIMVA'22, SEC'22, AsiaCCS'22, CCS'21, SEC'21, AsiaCCS'21, WOOT'21, EuroSec'21, ESORICS'21, EuroSec'20, SEC'20, TCHES'20, WOOT'20, DIMVA'20, WOOT'19, SEC'19, CARDS'19, BlueHat IL'19, CCS'18, WOOT '18, SPACE'18, WoSSCA'18, Kangacrypt'18
  • University Committees: Vice Dean of Studies for Computer Science (starting 1/2024), Habilitation Committee Yanic Maus, Doctoral School Coordination Committee, Habilitation Committee Jana Lasser, Habilitation Committee Dominik Kowald, Study Commission Computer Science Education, Several Hiring Committees
  • Other Scientific Committees: CORE Ranking 2023 Area Committee Member

Advising

  • PhD Students:
    • currently: Lukas Giner, Andreas Kogler, Jonas Juffinger, Stefan Gast, Fabian Rauscher
    • 2023: Martin Schwarzl (Award of Excellence - Austrian National Award for Best Dissertations 2023)
    • 2022: Claudio Canella
    • 2021: Moritz Lipp (GI-Dissertation Award 2021, SIGSAC Doctoral Dissertation Award 2022 Runner-Up)
    • 2019: Michael Schwarz (Award of Excellence - Austrian National Award for Best Dissertations 2020, EuroSys Roger Needham PhD Award 2020)
  • (co-advised) Graduate Students (Master's Thesis):
    • 2023: Erik Kraft, Mathias Oberhuber
    • 2022: Fabian Rauscher
    • 2021: Lukas Lamster, Jonas Juffinger
    • 2020: Richard Fellner, Kurt Nistelberger, Andreas Kogler, Lukas Giner
    • 2019: Vedad Hadzic, Barbara Gigerl, Martin Schwarzl
    • 2018: David Bidner, Claudio Canella
    • 2016: Michael Schwarz, Moritz Lipp
  • (co-advised) Graduate Students (Master's Project):
    • 2023: Sudheendra Neela, Roland Czerny, Mario Bischof
    • 2022: Srdjan Ljepojevic, Sebastian Scholl, Sebastian Dorn, Michael Fürnschuß, Mathias Oberhuber, Hannes Weissteiner, Felix Holzknecht, Fabian Rauscher, Djordje Rajic
    • 2021: Pedro Bernardo, Luca Mayr, Jonas Juffinger, Florian Lackner, Erik Kraft
    • 2020: Thomas Schuster, Martin Haubenwallner, Martin Glasner, Martin Deixelberger, Lukas Lamster, Lukas Giner
    • 2019: Martin Schwarzl
    • 2018: David Bidner, Catherine Easdon
    • 2017: Roland Urbano, Klaus Wagner
    • 2016: Phillip Goriup, Moritz Lipp, Michael Schwarz, Mark Bergmoser
  • (co-advised) Undergraduate Students (Bachelor's Thesis):
    • 2023: Paul Gollob, Martin Piberger, Manuel Wiesner, Kilian Weisl, Hagen Leitner
    • 2022: Simone Franza, Sebastian Dorn, Ronald Gigerl, Lukas Ropele, Lukas Mathä, Lukas Maar, Hannah Jud, Hanna Müller, Fabian Gruber, Amel Smajic, Alexander Toch, Aaron Giner
    • 2021: Stefan Steininger, Simon Feichter, Richard Staudegger, Markus Schiffermüller, Fabian Nawratil, Christian Rieger
    • 2020: Roland Czerny, Philipp Ortner, Paul Höfler, Nikolaus Mutewsky, Martin Haubenwallner
    • 2019: Simon Guggi, Peter Bürscher, Martin Deixelberger, Lukas Lamster, Lukas Deutz, Luca Mayr, Dominik Slanitz
    • 2018: Patrick Pichler, Mario Theuermann, Lukas Raab, Jonas Juffinger, Harald Deutschmann, Erik Kraft, Benjamin von Berg, Amir Mujacic
    • 2017: Thomas Schuster, Alexander Pucher
    • 2016: Simon Gunacker, Marco Starke, Leo Prikler, Johanna Rock
    • 2015: David Bidner, Daniel Kales, Klaus Wagner