[Cryptography] Speculation re Intel HW cockup; reqs. OS rewrites & slow execution
Raymond Burkholder
ray at oneunified.net
Fri Jan 5 09:45:12 EST 2018
> All user mode processes are necessarily inside what is in fact a VM. A VM
> does not necessarily get to see side channels.
Proofs of concept outlined at
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
indicate 1) reading kernel memory at 2000 Bytes / second, and 2) gaining access to other processes from within a KVM guest.
>
> The side effects are for the most part variants on one process data cache hits
> are affected by another processes data cache hits - which should never
> happen in normal non evil code. Separate processes normally have disjoint
> data.
>
> Because this is something that should not ordinarily happen, we can afford
> to do something special if it does happen.
>
--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.
More information about the cryptography
mailing list