Version 1.7
Speaker: Daniel Gruss
Daniel Gruss (@lavados) is an Assistant Professor at Graz University
of Technology. He finished his PhD with distinction in less than 3
years. He has been involved in teaching operating system undergraduate
courses since 2010. Daniel's research focuses on side channels and
transient execution attacks. He implemented the first remote fault
attack running in a website, known as Rowhammer.js (32C3). His research team was one of the teams that found the Meltdown and Spectre bugs published in early 2018. He frequently speaks at top international venues.
Events in this conference
Attacking CPUs with Power Side Channels from Software: Warum leaked hier Strom? (en) |