A Shared Cache Attack That Works Across Cores and Defies VM Sandboxing and Its Application to AES
Offered By: IEEE via YouTube
Course Description
Overview
Explore a groundbreaking 18-minute conference talk presented at the 2015 IEEE Symposium on Security & Privacy that unveils a novel shared cache attack capable of breaching VM sandboxing and operating across processor cores. Delve into the intricacies of the S$A attack, which exploits access time variations in the last level cache and utilizes huge pages to circumvent VM boundaries without requiring deduplication. Discover how this fine-grain cross-core cache attack poses a significant threat to cloud computing infrastructure, even with disabled features like deduplication. Learn about its application to AES encryption and its ability to recover keys in cross-VM settings on Xen 4.1. Gain insights into the attack's methodology, its comparison to previous cache attacks, and its implications for existing cloud servers and virtualization security.
Syllabus
Intro
INTRODUCTION
BACKGROUND
A NOVEL SIDE CHANNEL TECHNIQUE IN THE LLC
APPLICATION TO AES
CONCLUSION
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network