On 14/09/2016 16:08, Eduardo Habkost wrote: >> > If attacker can trigger things, IOW execute code in hypervisor, >> > then encrypting memory is not useful anyway. > I believe the whole point of SEV attestation and key management > is to make "if attacker can executed code in hypervisor, > encrypting memory is not useful" _not_ true, isn't it? > > Or are there known vulnerabilities that would allow a compromised > hypervisor to decrypt memory even after successful > encryption+attestation?
There are countless side channels that you can use but you have to start somewhere, and anyway a side channel attack is way way more complex than just "trigger a debug dump and read it". Paolo