[Cryptography] Speculation re Intel HW cockup; reqs. OS rewrites & slow execution

Raymond Burkholder ray at oneunified.net
Fri Jan 5 09:45:12 EST 2018


> All user mode processes are necessarily inside what is in fact a VM.  A VM
> does not necessarily get to see side channels.

Proofs of concept outlined at 

https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html

indicate 1) reading kernel memory at 2000 Bytes / second, and 2) gaining access to other processes from within a KVM guest.



> 
> The side effects are for the most part variants on one process data cache hits
> are affected by another processes data cache hits - which should never
> happen in normal non evil code.  Separate processes normally have disjoint
> data.
> 
> Because this is something that should not ordinarily happen,  we can afford
> to do something special if it does happen.
> 


-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.



More information about the cryptography mailing list