基本信息
浏览量:112
职业迁徙
个人简介
Daniel's research focuses on software-based attacks and defenses on microarchitectural layers in hardware and software. He implemented the first remote fault attack running in a website, known as Rowhammer.js. He frequently speaks at top international venues, such as Black Hat, Usenix Security, IEEE S&P, ACM CCS, Chaos Communication Congress, and others. His research team was one of the teams that found the Meltdown and Spectre bugs published in early 2018 and designed the software patch (KAISER) against Meltdown which is now integrated in every operating system.
研究兴趣
论文共 121 篇作者统计合作学者相似作者
按年份排序按引用量排序主题筛选期刊级别筛选合作者筛选合作机构筛选
时间
引用量
主题
期刊级别
合作者
合作机构
arxiv(2024)
引用0浏览0引用
0
0
USENIX Security Symposiumpp.7285-7302, (2023)
引用2浏览0EI引用
2
0
39TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2023pp.662-676, (2023)
Jinghao Jia, YiFei Zhu,Dan Williams, Andrea Arcangeli,Claudio Canella,Hubertus Franke,Tobin Feldman-Fitzthum,Dimitrios Skarlatos,Daniel Gruss,Tianyin Xu
arxiv(2023)
PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUMpp.6807-6824, (2023)
引用7浏览0EI引用
7
0
Lecture Notes in Computer Sciencepp.33-58, (2023)
引用0浏览0引用
0
0
Stefan Gast,Jonas Juffinger,Martin Schwarzl,Gururaj Saileshwar,Andreas Kogler, Simone Franza, Markus Köstl,Daniel Gruss
引用7浏览0EIWOS引用
7
0
加载更多
作者统计
合作学者
合作机构
D-Core
- 合作者
- 学生
- 导师
数据免责声明
页面数据均来自互联网公开来源、合作出版商和通过AI技术自动分析结果,我们不对页面数据的有效性、准确性、正确性、可靠性、完整性和及时性做出任何承诺和保证。若有疑问,可以通过电子邮件方式联系我们:report@aminer.cn