[Cryptography] Determining TLS session keys from the hypervisor
Ray Dillinger
bear at sonic.net
Mon Jun 13 16:10:50 EDT 2016
On 06/13/2016 11:58 AM, Jerry Leichter wrote:
>> ...Of course, a hypervisor could turn SME off after the fact, so you'd also need some kind of callback - directly to the guest, not through the hypervisor's typical mediated dispatch - if the setting ever changes.
> Should have read more of the paper. This is dealt with.
>
> -- Jerry
>
This is not just hypervisors. This attack can be carried out against
nearly every kind of VM and interpreter.
People are doing a heck of a lot of crypto in things like Java, Python,
etc. People are doing crypto in Javascript inside browsers. It's all
there.
Bear
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20160613/5dccd3fc/attachment.sig>
More information about the cryptography
mailing list