Introduction
Introduction Statistics Contact Development Disclaimer Help
Post AxFrr87IprgSvhezqa by [email protected]
More posts by [email protected]
Post #AxEjHaVon75XmQhzOq by [email protected]
0 likes, 1 repeats
Nice blog https://aws.amazon.com/blogs/security/ec2-defenses-against-l1tf-reloa…
Post #AxFmX8gIWmhd7Mg2pk by [email protected]
0 likes, 1 repeats
@amarsaar We wrote about these mitigations in our 2022 paper paper (Hongang wor…
Post #AxFnHfL7R8yhj7xMrQ by [email protected]
0 likes, 1 repeats
@david_chisnall thank you! I was looking for this paper :)
Post #AxFr46tkZs7excwlIu by [email protected]
0 likes, 1 repeats
@amarsaar There is also this: https://lkml.org/lkml/2019/1/21/606We couldn'…
Post #AxFrr87IprgSvhezqa by [email protected]
0 likes, 1 repeats
@david_chisnall and following the concept of secret-less models in the paper, i…
Post #AxFtaXh0gvuLEma2VM by [email protected]
0 likes, 1 repeats
@amarsaar The code now lives here for easier reference: https://github.com/blit…
Post #AxFuYuLTb9hwruIC6C by [email protected]
0 likes, 1 repeats
@amarsaar HyperClear is also covered in the paper. It discusses the Xen and Hy…
Post #AxFw2aKyeUdrSLm3SS by [email protected]
0 likes, 1 repeats
@david_chisnall 100%. The threat model and security boundaries here are so prob…
Post #AxFx1DB1NRD5I11gJs by [email protected]
0 likes, 0 repeats
@amarsaar Well, the specific problem here is that the amount of hypervisor stat…
Post #AxFx1DH3121xahqUiG by [email protected]
0 likes, 1 repeats
@david_chisnall yup, that’s why type-2 VMMs are not a defensible boundary for…
Post #AxFzD68rYeTGr3oQ8e by [email protected]
0 likes, 1 repeats
@david_chisnall concrete example from 2020: https://github.com/microsoft/MSRC-S…
You are viewing proxied material from pleroma.anduin.net. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.