[Cryptography] Determining TLS session keys from the hypervisor

Peter Gutmann pgut001 at cs.auckland.ac.nz
Mon Jun 13 16:05:58 EDT 2016

Jerry Leichter <leichter at lrw.com> writes:

>Defenses are not clear.

Actually I would have thought the defence was pretty trivial: Don't run your
sensitive crypto on hardware controlled by an attacker.  On the one hand the
work they've done is pretty neat, but the overall result is a "well, duh".


More information about the cryptography mailing list