Post AxFrr87IprgSvhezqa by [email protected] | |
More posts by [email protected] | |
Post #AxEjHaVon75XmQhzOq by [email protected] | |
0 likes, 1 repeats | |
Nice blog https://aws.amazon.com/blogs/security/ec2-defenses-against-l1tf-reloa… | |
Post #AxFmX8gIWmhd7Mg2pk by [email protected] | |
0 likes, 1 repeats | |
@amarsaar We wrote about these mitigations in our 2022 paper paper (Hongang wor… | |
Post #AxFnHfL7R8yhj7xMrQ by [email protected] | |
0 likes, 1 repeats | |
@david_chisnall thank you! I was looking for this paper :) | |
Post #AxFr46tkZs7excwlIu by [email protected] | |
0 likes, 1 repeats | |
@amarsaar There is also this: https://lkml.org/lkml/2019/1/21/606We couldn'… | |
Post #AxFrr87IprgSvhezqa by [email protected] | |
0 likes, 1 repeats | |
@david_chisnall and following the concept of secret-less models in the paper, i… | |
Post #AxFtaXh0gvuLEma2VM by [email protected] | |
0 likes, 1 repeats | |
@amarsaar The code now lives here for easier reference: https://github.com/blit… | |
Post #AxFuYuLTb9hwruIC6C by [email protected] | |
0 likes, 1 repeats | |
@amarsaar HyperClear is also covered in the paper. It discusses the Xen and Hy… | |
Post #AxFw2aKyeUdrSLm3SS by [email protected] | |
0 likes, 1 repeats | |
@david_chisnall 100%. The threat model and security boundaries here are so prob… | |
Post #AxFx1DB1NRD5I11gJs by [email protected] | |
0 likes, 0 repeats | |
@amarsaar Well, the specific problem here is that the amount of hypervisor stat… | |
Post #AxFx1DH3121xahqUiG by [email protected] | |
0 likes, 1 repeats | |
@david_chisnall yup, that’s why type-2 VMMs are not a defensible boundary for… | |
Post #AxFzD68rYeTGr3oQ8e by [email protected] | |
0 likes, 1 repeats | |
@david_chisnall concrete example from 2020: https://github.com/microsoft/MSRC-S… |