On Sun, Apr 10, 2011 at 4:19 PM, Kuniyasu Suzaki <k.suz...@aist.go.jp> wrote:
>
> From: Avi Kivity <a...@redhat.com>
> Subject: Re: EuroSec'11 Presentation
> Date: Sun, 10 Apr 2011 17:49:52 +0300
>
>> On 04/10/2011 05:23 PM, Kuniyasu Suzaki wrote:
>> > Dear,
>> >
>> > I made a presentation about memory disclosure attack on SKM (Kernel
>> > Samepage Merging) with KVM at EuroSec 2011.
>> > The titile is "Memory Deduplication as a Threat to the Guest OS".
>> >    http://www.iseclab.org/eurosec-2011/program.html
>> >
>> > The slide is downloadbale.
>> >    http://www.slideshare.net/suzaki/eurosec2011-slide-memory-deduplication
>> > The paper will be downloadble form ACM Digital Library.
>> >
>> > Please tell me, if you have comments. Thank you.
>>
>> Very interesting presentation.  It seems every time you share something,
>> it become a target for attacks.
>
> I'm happy to hear your comments.
> The referee's comment was severe. It said there was not brand-new
> point, but there are real attack experiences.  My paper was just
> evaluated the detction on apahce2 and sshd on Linux Guest OS and
> Firefox and IE6 on Windows Guest OS.

If I have a VM on the same physical host as someone else I may be able
to determine which programs and specific versions they are currently
running.

Is there some creative attack using this technique that I'm missing?
I don't see many serious threats.

Stefan
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to