YoVDO

Exploiting Unprotected I/O Operations in AMD's Secure Encrypted Virtualization

Offered By: USENIX via YouTube

Tags

USENIX Security Courses Cybersecurity Courses Virtualization Courses

Course Description

Overview

Explore a conference talk from USENIX Security '19 that delves into the vulnerabilities of AMD's Secure Encrypted Virtualization (SEV) technology. Learn about new attack vectors introduced by the lack of trust in privileged software for SEV-enabled virtual machines. Discover how unprotected I/O operations can be exploited to breach confidentiality and integrity. Examine the construction of two attack primitives against SEV's memory encryption schemes: a memory decryption oracle and a memory encryption oracle. Understand how these primitives enable adversaries to decrypt and encrypt arbitrary messages using the memory encryption keys of virtual machines. Gain insights into the evaluation of these attacks and potential solutions to address the underlying security issues in SEV technology.

Syllabus

USENIX Security '19 - Exploiting Unprotected I/O Operations in AMD’s Secure Encrypted Virtualization


Taught by

USENIX

Related Courses

Never Been KIST - Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport
USENIX via YouTube
Eclipse Attacks on Bitcoin’s Peer-to-Peer Network
USENIX via YouTube
Control-Flow Bending - On the Effectiveness of Control-Flow Integrity
USENIX via YouTube
Protecting Privacy of BLE Device Users
USENIX via YouTube
K-Fingerprinting - A Robust Scalable Website Fingerprinting Technique
USENIX via YouTube