Re: EuroSec'11 Presentation

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Apr 11, 2011 at 4:27 PM, Anthony Liguori <anthony@xxxxxxxxxxxxx> wrote:
> On 04/11/2011 03:51 AM, Stefan Hajnoczi wrote:
>>>
>>> I'm happy to hear your comments.
>>> The referee's comment was severe. It said there was not brand-new
>>> point, but there are real attack experiences.  My paper was just
>>> evaluated the detction on apahce2 and sshd on Linux Guest OS and
>>> Firefox and IE6 on Windows Guest OS.
>>
>> If I have a VM on the same physical host as someone else I may be able
>> to determine which programs and specific versions they are currently
>> running.
>>
>> Is there some creative attack using this technique that I'm missing?
>> I don't see many serious threats.
>
> It's a deviation of a previously demonstrated attack where memory access
> timing is used to guess memory content.  This has been demonstrated in the
> past to be a viable technique to reduce the keyspace of things like ssh keys
> which makes attack a bit easier.

How can you reduce the key space by determining whether the guest has
arbitrary 4 KB data in physical memory?

Stefan
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux