Profile avatar
gruss.cc
Aka @lavados #InfoSec University Professor @ #TUGraz. #meltdown, #spectre, #rowhammer, cache attacks, sustainable security. Produced a side channel security sitcom. https://gruss.cc https://x.com/lavados https://infosec.exchange/@lavados
19 posts 371 followers 274 following
Regular Contributor

Congratulations to Hosein Hadipour for completing his #PhD! 🎉 He defended his thesis “Automated Methods in Cryptanalysis and Design of Symmetric-Key Cryptographic Primitives” in January. We wish him all the best for his postdoc at @ruhr-uni-bochum.de!

I've published iacrbias.org, a website dedicated to closely documenting instances of political and racial bias at the International Association for Cryptologic Research's Board of Directors, including structural impediments to holding the Board accountable.

Unlock your future with the ‘Cybersecurity Scholarship’ at TU Graz for international students! 🌍✨ 📢 Application deadline: March 1st, 2025 Find out more: tugraz.at/go/cybersecurity-scholarschips #Cybersecurity #Informationsecurity #Scholarship #StudyAbroad #tugraz #graz #university

Just gave a keynote at #Ruhrsec about threat models, Side channels, fault attacks, how the evolve and how we should approach them...

📢 Submission deadline extended to Feb 19th! Take the extra days to polish your work and submit it here: 👉 dimva25r2.hotcrp.com #DIMVA25 #DIMVA

The second #DIMVA25 deadline is upcoming: February 12 AoE. If you're planning to submit a paper, register it already: dimva.org/dimva2025/ DIMVA has a great community and is quite visible: 3 out of my 10 top cited papers are DIMVA papers! Hope to see many of you in Austria!

Did you miss the first #DIMVA submission cycle? 😞 Don’t worry; you still have a chance! 😊 ‼️ Submission for Cycle 2 is open until February 12th 👉 dimva25r2.hotcrp.com #DIMVA25

Recently, @gruss.cc, Martin Heckel, and Florian Adamsky gave a talk about #Rowhammer at #38C3. Now, they are looking for participants for their large-scale Rowhammer study! 🔨 Find out more about Rowhammer & participate in the study 👇 www.isec.tugraz.at/flippyram or flippyr.am

We sent out the notifications today. 📨 Congratulations to the authors of the 7 papers that got accepted! 📢 If you also want to get a paper at #DIMVA: Submission for Cycle 2 is open until February 12th 👉 dimva25r2.hotcrp.com #DIMVA25 #conference

DIMVA decisions were just sent out. Congratulations to all authors who got and accept! If your paper was not accepted, the uASC deadline is in 22 hours (same length+format) and uASC is looking for interesting insights despite flaws in the threat model -> uasc.cc

We updated the uASC deadline: it is **January 28 AoE**, which is 1 day after the DIMVA notification. Take a look at our CFP. Any insights around microarchitecture security are interesting. uasc.cc

hyperref unfortunately can add deanonymizing information to PDFs. I posted a patch + a two-liner cp/sed here: github.com/latex3/hyper... Run that and get an anonymized PDF that does not contain all your bibkeys.

The uASC registration is open now: uasc.cc Also the uASC deadline is approaching: January 27 AoE. We accept papers, posters, and talks. We have conference proceedings. We're interested in any insights broadly around microarchitecture security. Don't miss the deadline, don't miss the conference ;)

It's kind of like werewolves (aka Mafia aka secret Hitler) but *nothing* is ever revealed. No one learns anyone else's role at any point in the game. Arguments+votes are done in written form. The only thing ever revealed is the process' conclusion, with one or the other outcome.

Can I ask you all for a quick review of this idea? Threat Model and Attack Scenario: PC member A and B agree to not mark each other as a conflict and write each other favorable reviews and fight for each others papers.

Thanks for visiting us at the Bac:Mas event by @stv.iso_tugraz today! We hope you found some interesting topics for your theses. ✒️ #cybersecurity #informationsecurity #tugraz #university #studyabroud #thesis #bachelor #master

CFP for uASC 25 is still open. We have rolling reviews, and 1 submission is already accepted. If you have interesting results on microarchitecture security (incl. weak threat models or reproducing prior work), check out the CFP at uasc.cc The CFP closes **Jan 28**

Hi there, it's nice to meet you! WE ARE ISEC: The Institute of Information Security at #TUGraz. We're here to share news and insights into our cybersecurity research and inform you about upcoming events at/around the institute. #cybersecurity #ISEC

As always, the congress #38c3 was amazing. Lots of great discussions, insane hacks, and some secret adventures. Check out my blog with some recommended talks: nebelwelt.net/blog/2024/12...

Reminder: Tomorrow, @c1t, @lunkw1ll and I will give a talk at #38c3 about #Rowhammer at 12:00. If you want to check whether your computers are vulnerable to #Rowhammer, visit flippyr.am.

I'm at #38c3 this year. Just ping me if you want to meet.

If you are in #Graz tomorrow, join us for the last IAIK Christmas Special ever. 17:30 @ HS i13.

#BadRAM just went public: Tampering with DRAM modules allows attackers to bypass SEV-SNP's write protection and forging attestation reports, breaking all trust in #SEV-SNP. Joint work with Jesse De Meulemeester, Luca Wilke, @sublevado.bsky.social, Ingrid Verbauwhede and Jo Van Bulck badram.eu

Not convinced by this app yet. The search is very very limited. Try searching for dimva. Basically no results and certainly not for the current deadline 😕

📢 #DIMVA25 extended its deadline 📢. You have time until 10 December to submit your best result! 🖥️ dimva25.hotcrp.com/u/1/

Hey you! Yes, you! Just a few more days to polish your work and submit it to #DIMVA25! 🎉 Give yourself the gift of submission before taking off for the Christmas holidays. Don’t wait—submit now! 😉 dimva25.hotcrp.com

Got some negative or unrealistic threat model results that still bring interesting insights? A side channel that requires root to leak something from the kernel? Reproducing prior work? Somewhat related to microarchitecture? Here's your venue: uasc.cc