Ben Gras

Ben Gras has been in the systems security research group of the VU Amsterdam since 2015. He has worked on software reliability, defensive research projects, and most recently, offensive research. Offensive research was most noticeably making cross-VM Rowhammer exploitation reliable and a cache-based ASLR-breaking MMU sidechannel attack, both of which have been widely reported on, perhaps most prominently in Wired and Arstechnica. At Cisco, he developed a infrastructure-as-a-target defensive system. He is currently working on a PhD in systems security research. He is frequently asked for expert commentary, most recently by Wired.com, BBC, Dutch national newspapers, and HBO Vice news tonight.

Appearing at:

TLBleed: When Protecting Your CPU Caches is Not Enough