Daniel Gruss

#InfoSec Professor @ #TUGraz. #meltdown, #spectre, #rowhammer, cache attacks. Creating a side channel security sitcom.

Daniel Gruss boosted:
µASC Conferenceuasc@infosec.exchange
2025-06-23

Only one month left to submit your paper for the first submission cycle at uASC 2026!

📅 Submission Deadline: July 15, 2025
👉 uasc.cc/

#microarchitecture #security #conference #uasc26

2025-06-23

Congrats @lunkw1ll!

Daniel Gruss boosted:
Florian Adamskyc1t
2025-06-23

I am very happy that two papers from @lunkw1ll have been accepted at the 30th European Symposium on Research in Computer Security (). It was a great collaboration with @lavados, @hweissi and others. The first paper addresses the threats and problems to research validity. The second paper presents a method for verifying DRAM addressing functions entirely in software. 🎉

2025-06-16

Join the Graz Security Week from Sep 1 to 5! with @sahar_abdelnabi @jovanbulck, Maria Eichlseder, Georg Fuchsbauer, @sublevado, @fbpierazzi, @kavehrazavi, @chrossow, and Yang Zhang on topics system security, side channels, AI Security, and Cryptography: securityweek.at/

Daniel Gruss boosted:
Hannes Weissteinerhweissi@infosec.exchange
2025-06-13

I am happy to announce that my first paper has been accepted at USENIX Security!

We propose TEEcorrelate, a mitigation that statistically decorrelates reported performance counters from real ones during TEE execution.
It protects against fine-grained performance-counter attacks on TEE's, while keeping coarse-grained trends intact for legitimate use cases.

hannesweissteiner.xyz/pdfs/tee

Thanks to Fabian Rauscher, @supersingular, Jonas Juffinger, @notbobbytables, Jan Wichelmann, Thomas Eisenbarth and @lavados for the great collaboration!

2025-05-21

DIMVA is taking place July 9 to 11 in Graz!
We offer a limited number of diversity grants for participants who identify as women, non-binary, or belong to other underrepresented groups in IT security.

Each grant covers a total eligible cost of up to 800€.

Applications are open until May 31, 2025.

See dimva.org/dimva2025/#diversity

2025-05-16

@rene_mobile is jku not in the US cloud yet?

Daniel Gruss boosted:
µASC Conferenceuasc@infosec.exchange
2025-05-11

uASC 2025 was a huge success - we were sold out!
Thanks to everyone who joined and see you in 2026!
#uasc #uasc25 #uasc26

Daniel Gruss boosted:
2025-05-11

Had a great time at the 1st uASC (Microarchitecture Security Conference) last week. I also had the opportunity to give a talk on software-based mitigations against memory-centric side-channels, and I appreciate the insightful questions and feedback. The discussions and presentations were really inspiring, and it was valuable to exchange ideas with so many brilliant researchers.

A big thank you to the organizers for putting together such a well-run event! Looking forward to the next edition 😊

📷: Jonas Juffinger

#uASC

Picture of speaker and summary slide during the talk
Daniel Gruss boosted:
Florian Adamskyc1t
2025-05-11

Arrived at . @lunkw1ll already presented our paper "Flipper: on Steroids". If you are interested, the paper is freely available: uasc.cc/proceedings25/uasc25-h

Daniel Gruss boosted:
2025-05-11

It was a pleasure to present #CounterSEVeillance at #NDSSSymposium2025 today. Thanks to everyone attending, also for the interesting and nice discussion after the talk! 🙂

A picture of me presenting CounterSEVeillance at NDSS2025, explaining the TOTP attack.
Daniel Gruss boosted:
Linux Kernel Securitylinkersec@infosec.exchange
2025-05-11

When Good Kernel Defences Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks

Awesome paper by Lukas Maar et al. about leaking exploitation-relevant kernel addresses via a TLB side-channel attack.

Authors demonstrate how to leak the addresses of the physmap, vmemmap, and vmalloc memory regions, addresses of page tables of all levels, addresses of kernel stacks, and addresses of various kernel objects including msg_msg, pipe_buffer, cred, file, and seq_file.

Authors then show how to apply the discovered techniques in exploits; the code is public.

Paper: lukasmaar.github.io/papers/use
Code: github.com/isec-tugraz/TLBSide

Daniel Gruss boosted:
Lukas Daniel Klausnerl17r@chaos.social
2025-04-29

Looking at app behaviour and functionalities, network traffic, privacy policies, etc., we found that sideloaded apps are more likely to hide their presence, require excessive permissions, and some even transmitted sensitive data unencrypted. Our study also highlights possible abuse of such apps for unethical surveillance and/or domestic abuse.

Our study received quite a bit of media attention, mostly in Austria (krone.at/3725062 noe.orf.at/stories/3296993/ derstandard.at/story/300000026) /2

The two most relevant tables from page 112 of the linked article, showing key data about the forty apps investigated (such as number of permissions, obfuscation or IOC match)
Daniel Gruss boosted:
Lukas Daniel Klausnerl17r@chaos.social
2025-04-29

I just noticed I hadn't posted this yet: Eva-Maria Mayer, a bachelor's student at St. Pölten UAS cosupervised by Leonie Tanczer (UCL) and myself, succeeded in getting her bachelor's thesis published at PETS! 🎉 doi.org/10.56553/popets-2025-0

So, what's in there? We investigated the issues surrounding sideloaded (i.e. installed from outside regulated distribution channels) apps for parental control by comparing 20 sideloaded apps with 20 popular apps available on the Google Play Store. /1

Title page of the linked article
Daniel Gruss boosted:
Florian Adamskyc1t
2025-04-28

We still have 1 T-shirt left and our study is still running for 2 weeks. Get your systems checked for the effect and get a free T-shirt if you do it 10 times on the same system. Even if you do it just once, you have the change to win an Amazon gift card. Help us understand the Rowhammer Effect better! More infos: flippyr.am/

2025-04-15

Congrats KuK Hofhackerei to making it to the @Defcon finals!

defcon.social/@nautilusinstitu

Daniel Gruss boosted:
2025-04-15

someone who will not be named ( @vito ) didn't refresh the scores before posting these, so these are the *actual* final scores

1. Maple Mallard Magistrates 4,419
2. SuperDiceCode 3,992
3. mhackeroni 3,956
4. Nu1L 3,792
5. Shellphish 3,494
6. KuK Hofhackerei 3,383
7. this year's organizers 3,132
8. Cold Fusion 3,077
9. HypeBoy 2,860
10. [:] 2,680
11. Blue Water 2,460
12. Zer0RocketWrecks 2,333
13. fewer 2,324
14. RePokemonedCollections 2,133
15. Never Stop Exploiting 1,910
16. Friendly Maltese Citizens 1,831
17. pwn de queijo 1,691
18. gimel 1,641
19. Hubert Hackin''' 1,562
20. salmon sushi 1,473
21. The Something Something 1,435
22. *0xA 1,434
23. Kalmarunionen 1,226
24. SNHT 1,001
25. saladstream 793

Daniel Gruss boosted:
Matthias Bürcherbuercher@tooting.ch
2025-04-05

Auf Druck der USA: Die ETH zeigt sich online nicht mehr solidarisch mit der Ukraine, dem Nahen Osten oder dem Iran
Drei Websites zu geopolitischen Konflikten hat die Hochschule vom Netz genommen. Die Konsequenz: Solidaritäts­bekundungen verschwinden.
tagesanzeiger.ch/eth-zuerich-u

Daniel Gruss boosted:
2025-04-03

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst