A Shared Cache Attack That Works Across Cores and Defies VM Sandboxing and Its Application to AES
Offered By: IEEE via YouTube
Course Description
Overview
Explore a groundbreaking 18-minute conference talk presented at the 2015 IEEE Symposium on Security & Privacy that unveils a novel shared cache attack capable of breaching VM sandboxing and operating across processor cores. Delve into the intricacies of the S$A attack, which exploits access time variations in the last level cache and utilizes huge pages to circumvent VM boundaries without requiring deduplication. Discover how this fine-grain cross-core cache attack poses a significant threat to cloud computing infrastructure, even with disabled features like deduplication. Learn about its application to AES encryption and its ability to recover keys in cross-VM settings on Xen 4.1. Gain insights into the attack's methodology, its comparison to previous cache attacks, and its implications for existing cloud servers and virtualization security.
Syllabus
Intro
INTRODUCTION
BACKGROUND
A NOVEL SIDE CHANNEL TECHNIQUE IN THE LLC
APPLICATION TO AES
CONCLUSION
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
A Hands-On Look at Amazon Q Business ExpertAmazon Web Services via AWS Skill Builder À la découverte des télécommunications
Institut Mines-Télécom via France Université Numerique A Tour of Google Cloud Sustainability
Google via Google Cloud Skills Boost Intel® Telco Cloud Academy
Intel via Coursera Accéder à Internet depuis Lambda dans un VPC (Français) | Accessing the Internet from Lambda in a VPC (French)
Amazon Web Services via AWS Skill Builder