[Cryptography] Determining TLS session keys from the hypervisor

Ray Dillinger bear at sonic.net
Mon Jun 13 16:10:50 EDT 2016



On 06/13/2016 11:58 AM, Jerry Leichter wrote:
>> ...Of course, a hypervisor could turn SME off after the fact, so you'd also need some kind of callback - directly to the guest, not through the hypervisor's typical mediated dispatch - if the setting ever changes.
> Should have read more of the paper.  This is dealt with.
> 
>                                                         -- Jerry
> 

This is not just hypervisors.  This attack can be carried out  against
nearly every kind of VM and interpreter.

People are doing a heck of a lot of crypto in things like Java, Python,
etc.  People are doing crypto in Javascript inside browsers.  It's all
there.

				Bear


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20160613/5dccd3fc/attachment.sig>


More information about the cryptography mailing list