Guest editors: Samuel T. King (UIUC), Sean W. Smith (Dartmouth)
Virtualization has several properties that make it useful for
security applications. Traditional virtual machine monitors aspire
to enforce strong isolation among multiple operating systems (OSes)
running on the same physical
Yes, and that's why we cited Kauer on the page, in Evan's paper, and
in the video!
http://os.inf.tu-dresden.de/papers_ps/kauer07-oslo.pdf (mainly
section 2; section 2.2 describes the TPM Reset trick)
-
The Cryptography
Seeing as how there are are some rumors about other attacks coming
from BlackHat, I thought we should publicize ours a bit:
A 3 piece of wire does the job. More info (and a link to a YouTube
demo) at:
www.cs.dartmouth.edu/~pkilab/sparks/
--Sean
Sean W. Smith [EMAIL PROTECTED
W. Smith [EMAIL PROTECTED] www.cs.dartmouth.edu/~sws/
Department of Computer Science, Dartmouth College, Hanover NH USA
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
.
--Sean
Sean W. Smith, Ph.D. [EMAIL PROTECTED] www.cs.dartmouth.edu/~sws/
Department of Computer Science, Dartmouth College, Hanover NH USA
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography
Are there different editions of Kaufman-Perlman-Speciner ?
I got that definition from the glossary in the 2nd edition. I'm
pretty sure it was in the glossary in the first edition as well, but
I can't seem to find my copy anymore!
you factor).
Boneh and Venkatesan. Breaking RSA may not be equivalent to
factoring. Eurocrypt '98. Springer-Verlag LNCS 1233. 1998.
--Sean
Sean W. Smith, Ph.D. [EMAIL PROTECTED] www.cs.dartmouth.edu/~sws/
Department of Computer Science, Dartmouth College, Hanover NH USA