Daniel Gruss

7.5k total citations · 1 hit paper
53 papers, 2.7k citations indexed

About

Daniel Gruss is a scholar working on Artificial Intelligence, Signal Processing and Information Systems. According to data from OpenAlex, Daniel Gruss has authored 53 papers receiving a total of 2.7k indexed citations (citations by other indexed papers that have themselves been cited), including 49 papers in Artificial Intelligence, 31 papers in Signal Processing and 19 papers in Information Systems. Recurrent topics in Daniel Gruss's work include Security and Verification in Computing (47 papers), Advanced Malware Detection Techniques (31 papers) and Cloud Data Security Solutions (14 papers). Daniel Gruss is often cited by papers focused on Security and Verification in Computing (47 papers), Advanced Malware Detection Techniques (31 papers) and Cloud Data Security Solutions (14 papers). Daniel Gruss collaborates with scholars based in Austria, United States and United Kingdom. Daniel Gruss's co-authors include Stefan Mangard, Michael Schwarz, Moritz Lipp, Yuval Yarom, Daniel Genkin, Raphael Spreitzer, Jo Van Bulck, Clémentine Maurice, Thomas Prescher and Anders Fogh and has published in prestigious journals such as Communications of the ACM, Lecture notes in computer science and IEEE Security & Privacy.

In The Last Decade

Daniel Gruss

50 papers receiving 2.6k citations

Hit Papers

Meltdown: reading kernel ... 2018 2026 2020 2023 2018 100 200 300

Author Peers

Peers are selected by citation overlap in the author's most active subfields. citations · hero ref

Author Last Decade Papers Cites
Daniel Gruss 2.3k 1.2k 956 658 645 53 2.7k
Daniel Genkin 1.9k 0.8× 943 0.8× 707 0.7× 698 1.1× 566 0.9× 54 2.4k
Kaveh Razavi 1.3k 0.6× 766 0.6× 633 0.7× 502 0.8× 552 0.9× 50 1.8k
Michael Schwarz 1.3k 0.6× 739 0.6× 540 0.6× 406 0.6× 385 0.6× 42 1.6k
Jo Van Bulck 1.5k 0.6× 781 0.6× 530 0.6× 484 0.7× 376 0.6× 29 1.7k
Yinqian Zhang 2.3k 1.0× 1.3k 1.1× 518 0.5× 1.4k 2.2× 1.1k 1.7× 99 3.1k
Moritz Lipp 1.2k 0.5× 706 0.6× 507 0.5× 343 0.5× 363 0.6× 18 1.4k
Sorin Lerner 1.4k 0.6× 578 0.5× 811 0.8× 824 1.3× 566 0.9× 93 2.4k
Jakub Szefer 1.3k 0.6× 467 0.4× 728 0.8× 653 1.0× 446 0.7× 110 1.8k
Raoul Strackx 1.2k 0.5× 738 0.6× 380 0.4× 466 0.7× 368 0.6× 24 1.4k
Paul Kocher 1.4k 0.6× 538 0.4× 765 0.8× 553 0.8× 705 1.1× 19 2.1k

Countries citing papers authored by Daniel Gruss

Since Specialization
Citations

This map shows the geographic impact of Daniel Gruss's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Daniel Gruss with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Daniel Gruss more than expected).

Fields of papers citing papers by Daniel Gruss

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Daniel Gruss. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Daniel Gruss. The network helps show where Daniel Gruss may publish in the future.

Co-authorship network of co-authors of Daniel Gruss

This figure shows the co-authorship network connecting the top 25 collaborators of Daniel Gruss. A scholar is included among the top collaborators of Daniel Gruss based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Daniel Gruss. Daniel Gruss is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
3.
Giner, Lukas, et al.. (2024). Generic and Automated Drive-by GPU Cache Attacks from the Browser. SPIRE - Sciences Po Institutional REpository. 128–140. 1 indexed citations
4.
Gruss, Daniel, et al.. (2024). IdleLeak: Exploiting Idle State Side Effects for Information Leakage. 4 indexed citations
5.
Gruss, Daniel, et al.. (2024). SUIT: Secure Undervolting with Instruction Traps. Zenodo (CERN European Organization for Nuclear Research). 1128–1145.
6.
Saileshwar, Gururaj, et al.. (2023). SQUIP: Exploiting the Scheduler Queue Contention Side Channel. 2256–2272. 11 indexed citations
7.
Gruss, Daniel, Federico Maggi, Mathias Fischer, & Michele Carminati. (2023). Detection of Intrusions and Malware, and Vulnerability Assessment. Lecture notes in computer science. 3 indexed citations
8.
Eichlseder, Maria, et al.. (2023). CSI:Rowhammer – Cryptographic Security and Integrity against Rowhammer. 1702–1718. 27 indexed citations
9.
Giner, Lukas, et al.. (2021). Systematic Analysis of Randomization-based Protected Cache Architectures. Lirias (KU Leuven). 987–1002. 36 indexed citations
10.
Lipp, Moritz, et al.. (2020). Nethammer: Inducing Rowhammer Faults through Network Requests. arXiv (Cornell University). 710–719. 4 indexed citations
11.
Oswald, David, et al.. (2020). Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble. IEEE Security & Privacy. 18(5). 28–37. 8 indexed citations
12.
Weiser, Samuel, et al.. (2020). Donky: Domain Keys – Efficient In-Process Isolation for RISC-V and x86. USENIX Security Symposium. 1677–1694. 12 indexed citations
13.
Oswald, David, et al.. (2020). Plundervolt: Software-based Fault Injection Attacks against Intel SGX. Zenodo (CERN European Organization for Nuclear Research). 16 indexed citations
14.
Werner, Mario, Thomas Unterluggauer, Lukas Giner, et al.. (2019). SCATTERCACHE: thwarting cache attacks via cache set randomization. USENIX Security Symposium. 675–692. 56 indexed citations
15.
Weiser, Samuel, et al.. (2019). SGXJail: Defeating Enclave Malware via Confinement. 353–366. 2 indexed citations
16.
Canella, Claudio, Jo Van Bulck, Michael Schwarz, et al.. (2019). A Systematic Evaluation of Transient Execution Attacks and Defenses. Lirias (KU Leuven). 249–266. 67 indexed citations
17.
Lipp, Moritz, Michael Schwarz, Daniel Gruss, et al.. (2018). Meltdown: reading kernel memory from user space. USENIX Security Symposium. 973–990. 388 indexed citations breakdown →
18.
Gruss, Daniel, et al.. (2018). Use-After-FreeMail. Publikationsdatenbank der Fraunhofer-Gesellschaft (Fraunhofer-Gesellschaft). 297–311. 7 indexed citations
19.
Gruss, Daniel, et al.. (2017). Strong and efficient cache side-channel protection using hardware transactional memory. USENIX Security Symposium. 217–233. 77 indexed citations
20.
Lipp, Moritz, Daniel Gruss, Raphael Spreitzer, & Stefan Mangard. (2015). ARMageddon: Last-Level Cache Attacks on Mobile Devices. arXiv (Cornell University). 549–564. 11 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026