Daniel Gruss is a PhD Student at Graz University of Technology. He has studiedmicro-architectural differences in the past 7 years. Daniel's research focuseson software-based micro-architectural attacks. He was the first to demonstratea Rowhammer hardware fault attack in JavaScript through a remote website, anattack also known as Rowhammer.js. He has presented parts of this research atthe 32nd Chaos Computer Congress (CCC) 2015 with Clémentine Maurice. He haspresented his research on automation of cache attacks at Usenix Security 2015.He gave invited talks at different venues, recently VMWare MooseCon 2015 andRuhrSec 2016.
Using Undocumented CPU Behavior to See into Kernel Mode and Break KASLR in the Process