A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2014; you can also visit the original URL.
The file type is application/pdf
.
Cross-VM side channels and their use to extract private keys
2012
Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12
This paper details the construction of an access-driven sidechannel attack by which a malicious virtual machine (VM) extracts fine-grained information from a victim VM running on the same physical computer. This attack is the first such attack demonstrated on a symmetric multiprocessing system virtualized using a modern VMM (Xen). Such systems are very common today, ranging from desktops that use virtualization to sandbox application or OS compromises, to clouds that co-locate the workloads of
doi:10.1145/2382196.2382230
dblp:conf/ccs/ZhangJRR12
fatcat:i724fii3mzazln5lk2kryhvpsq