Lukas Giner's Avatar

Lukas Giner

@giner.cc

Postdoc @Coresec Graz University of Technology

26
Followers
23
Following
7
Posts
12.11.2024
Joined
Posts Following

Latest posts by Lukas Giner @giner.cc

Thank you, very happy to be finally be here ๐Ÿ˜ƒ

23.07.2025 12:27 ๐Ÿ‘ 6 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

Special thanks to
@0xhilbert.bsky.social
for the many discussions!

26.05.2025 20:23 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

We can also do a modified first-round attack on AES T-Tables, thanks to their innate offset within a page, even though our pattern stretches across all 4 Tables and we can't look at individual lines or even individual Tables. All we need is to know which half of the page sees more accesses!

26.05.2025 20:23 ๐Ÿ‘ 2 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image

Now, half a page granularity might not seem very accurate, but the pattern actually helps us quite a bit!
For example, we can choose a pattern size that fits the RSA S&M algorithm and recover an entire 4096 bit key with a single trace.

26.05.2025 20:23 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image

We find that AMD does ciphertext coherence with cache line granularity, but instead 32 cache lines (half a page)!
And even crazier, it's not 32 adjacent cache lines, but they're spread over a page in varying patterns: each accessed line evicts all others in its half of the page.

26.05.2025 20:23 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

new *paper damnit

03.04.2025 20:39 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

I'm very happy to announce our new Cohere+Reload: Re-enabling High-Resolution Cache Attacks on AMD SEV-SNP was accepted at DIMVA 2025!

In it @snee.la, @gruss.cc and I investigate AMD's ciphertext coherence mechanism and show even low resolution leakage can go a long way.
Paper preview: cr.giner.cc

03.04.2025 15:40 ๐Ÿ‘ 16 ๐Ÿ” 5 ๐Ÿ’ฌ 2 ๐Ÿ“Œ 1
Post image

๐Ÿ“ข Submission deadline extended to Feb 19th!
Take the extra days to polish your work and submit it here:
๐Ÿ‘‰ dimva25r2.hotcrp.com

#DIMVA25 #DIMVA

11.02.2025 15:27 ๐Ÿ‘ 4 ๐Ÿ” 8 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0