Daniel Weber

Daniel Weber

PhD Student

Hey, I am a PhD student researching in the field of microarchitectural attacks, such as side-channel and transient-execution attacks. I especially like to work on automated tools for the discovery of such vulnerabilities. In my free time, I participate in Capture the Flag competitions as part of the team saarsec.

CV

PhD Student

CISPA / Saarland University

2022 - today

PhD Preparation

Saarbrücken Graduate School of CS

2020 - 2022

Cybersecurity B.Sc.

Saarland University

2017 - 2020

System Administrator

kohlpharma

2017 - 2018

Publications


2025
Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting

Leon Trampert, Daniel Weber, Lukas Gerlach, Christian Rossow, Michael Schwarz

NDSS

San

Diego,

California,

USA,

February 23-28

2025


2024
No Leakage Without State Change: Repurposing Configurable CPU Exceptions to Prevent Microarchitectural Attacks

Daniel Weber, Leonard Niemann, Lukas Gerlach, Jan Reineke, Michael Schwarz

ACSAC

Waikiki,

Hawaii,

USA,

December 9-13

2024

CacheWarp: Software-based Fault Injection using Selective State Reset

Ruiyi Zhang, Lukas Gerlach, Daniel Weber, Lorenz Hetterich, Youheng Lü, Andreas Kogler, Michael Schwarz

USENIX Security

Philadelphia,

PA,

USA,

August 14-16

2024


2023
Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks

Daniel Weber, Fabian Thomas, Lukas Gerlach, Ruiyi Zhang, Michael Schwarz

ESORICS

The

Hague,

The

Netherlands,

September 25-29

2023

Reviving Meltdown 3a

Daniel Weber, Fabian Thomas, Lukas Gerlach, Ruiyi Zhang, Michael Schwarz

ESORICS

The

Hague,

The

Netherlands,

September 25-29

2023

A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs

Lukas Gerlach, Daniel Weber, Ruiyi Zhang, Michael Schwarz

S&P

San

Francisco,

California,

USA,

May 22-25

2023

(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels

Ruiyi Zhang, Taehyun Kim, Daniel Weber, Michael Schwarz

USENIX Security

Anaheim,

California,

USA,

August 9-11

2023

PDFCITE

2022
Finding and Exploiting CPU Features using MSR Templating

Andreas Kogler, Daniel Weber, Martin Haubenwallner, Moritz Lipp, Daniel Gruss, Michael Schwarz

S&P

San

Francisco,

California,

USA,

May 23-26

2022


2021
Osiris: Automated Discovery of Microarchitectural Side Channels

Daniel Weber, Ahmad Ibrahim, Hamed Nemati, Michael Schwarz, Christian Rossow

USENIX Security

Virtual,

August 11-13

2021

Talks


2023
A Security RISC? The State of Microarchitectural Attacks on RISC-V

Lukas Gerlach, Daniel Weber, Michael Schwarz

BlackHat Europe

London,

United

Kingdom,

December 7

2023

CITE
Rowhammer Revisited: From Exploration to Exploitation and Mitigation

Lukas Gerlach, Daniel Weber

m0leCon

Torino,

Italy,

December 2

2023

CITE

2022
(M)Wait For It: Bridging the Gap Between Microarchitectural and Architectural Side Channels

Ruiyi Zhang, Daniel Weber

BlackHat MEA

Riyadh,

Saudi

Arabia,

November 17

2022

CITEINFO
CPU Fuzzing: Automatic Discovery of Microarchitectural Attacks

Daniel Weber, Moritz Lipp

BlackHat MEA

Riyadh,

Saudi

Arabia,

November 16

2022

CITEINFO