Daniel Gruss
Orcid: 0000-0002-7977-3246Affiliations:
- Graz University of Technology, Institute for Applied Information Processing and Communications, Austria
According to our database1,
Daniel Gruss
authored at least 95 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
-
on gruss.cc
-
on github.com
On csauthors.net:
Bibliography
2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
PT-Guard: Integrity-Protected Page Tables to Defend Against Breakthrough Rowhammer Attacks.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
Proceedings of the Applied Cryptography and Network Security, 2023
2022
Layered Binary Templating: Efficient Detection of Compiler- and Linker-introduced Leakage.
CoRR, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021
2020
IEEE Secur. Priv., 2020
IEEE Secur. Priv., 2020
Cybersecur., 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 14th International Conference on the Foundations of Digital Games, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
login Usenix Mag., 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory.
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the Ausgezeichnete Informatikdissertationen 2017, 2017
Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript.
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015