A Secret-Free Hypervisor - Rethinking Isolation in the Age of Speculative Vulnerabilities
Offered By: IEEE via YouTube
Course Description
Overview
Explore a groundbreaking approach to hypervisor security in this 17-minute IEEE conference talk. Delve into the root causes of speculative vulnerabilities and learn how to rethink hypervisor isolation through a secret-free design. Discover the allow-list approach and how hypervisors can maintain secret isolation. Examine the challenges faced and evaluate the performance of Secret-Free Xen. Gain valuable insights on protecting against unknown attacks and understand the implications for future hypervisor designs in the age of speculative vulnerabilities.
Syllabus
Intro
The root cause
Rethinking hypervisor isolation Secrets: guest memory, registers and their copies
An allow-list approach
Hypervisor maintains secret isolation
Challenges
Evaluation of Secret-Free Xen
Insights
Against unknown attacks
Conclusions
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
Enterprise System Management and SecurityUniversity of Colorado System via Coursera Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam PHP: Complete Login and Registration System with PHP & MYSQL
Udemy Learn Ethical Hacking From Scratch 2024
Udemy Serie Windows Server Update Services (WSUS)
Udemy