Advertisement ยท 728 ร— 90

Posts by Lukas Giner

Thank you, very happy to be finally be here ๐Ÿ˜ƒ

8 months ago 6 0 0 0

Special thanks to
@0xhilbert.bsky.social
for the many discussions!

10 months ago 1 1 0 0
Post image

We can also do a modified first-round attack on AES T-Tables, thanks to their innate offset within a page, even though our pattern stretches across all 4 Tables and we can't look at individual lines or even individual Tables. All we need is to know which half of the page sees more accesses!

10 months ago 2 0 1 0
Post image

Now, half a page granularity might not seem very accurate, but the pattern actually helps us quite a bit!
For example, we can choose a pattern size that fits the RSA S&M algorithm and recover an entire 4096 bit key with a single trace.

10 months ago 1 0 1 0
Post image

We find that AMD does ciphertext coherence with cache line granularity, but instead 32 cache lines (half a page)!
And even crazier, it's not 32 adjacent cache lines, but they're spread over a page in varying patterns: each accessed line evicts all others in its half of the page.

10 months ago 1 1 1 0

new *paper damnit

1 year ago 0 0 0 0

I'm very happy to announce our new Cohere+Reload: Re-enabling High-Resolution Cache Attacks on AMD SEV-SNP was accepted at DIMVA 2025!

In it @snee.la, @gruss.cc and I investigate AMD's ciphertext coherence mechanism and show even low resolution leakage can go a long way.
Paper preview: cr.giner.cc

1 year ago 16 5 2 1
Post image

๐Ÿ“ข Submission deadline extended to Feb 19th!
Take the extra days to polish your work and submit it here:
๐Ÿ‘‰ dimva25r2.hotcrp.com

#DIMVA25 #DIMVA

1 year ago 4 8 0 0