Re: [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"

2016-09-04 Thread Georgi Guninski
On Fri, Sep 02, 2016 at 10:56:10AM -0400, Jerry Leichter wrote: > > Why bother with patching public keys, making them amenable to > > factorization, if you can patch executable code instead? > > > > If you can target executable code (and I see why not, it's all the > > same to KSM), it is very cle

Re: Fwd: Re: [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"

2016-09-03 Thread Georgi Guninski
On Sat, Sep 03, 2016 at 07:52:26PM -0400, John wrote: > I need to upgrade to an actual 1U instead of my current VPS solution, heh ;) > > Then again... I wonder who I'm sharing a hypervisor with... > > The software is buggy, the RAM is buggy, the CPU is buggy, the operator is buggy. AND IT WORK

Re: Fwd: Re: [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"

2016-09-03 Thread John
Sep 2016 08:49:34 +0300 >From: Georgi Guninski >To: Jerry Leichter >Cc: Florian Weimer , Cryptography List > >Subject: Re: [Cryptography] "Flip Feng Shui: Hammering a Needle in the >Software Stack" > >On Fri, Sep 02, 2016 at 10:56:10AM -0400, Jerry Leichter wrote

Fwd: Re: [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"

2016-09-02 Thread Georgi Guninski
- Forwarded message from Georgi Guninski - Date: Sat, 3 Sep 2016 08:49:34 +0300 From: Georgi Guninski To: Jerry Leichter Cc: Florian Weimer , Cryptography List Subject: Re: [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack" On Fri, Sep 02, 2016 at

Re: Fwd: [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"

2016-09-02 Thread Riad S. Wahby
Mirimir wrote: > On 09/02/2016 12:21 AM, Riad S. Wahby wrote: > > As an aside: note that the attack the Xiao paper describes only works > > against Xen guests that *don't* use hardware-assisted page tables > > (EPT for Intel, NPT for AMD). If you're using hardware-assisted > > virtualization (e.g.

Re: Fwd: [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"

2016-09-01 Thread Georgi Guninski
On Thu, Sep 01, 2016 at 11:21:18PM -0700, Riad S. Wahby wrote: > Georgi Guninski wrote: > > Does Rowhammer work in clouds? According to the popular story it > > affected only laptops. > > The answer is "it depends." > Thanks. Just browsed through the paper, it mentions m$ azure. Is/has been some

Re: Fwd: [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"

2016-09-01 Thread Mirimir
On 09/02/2016 12:21 AM, Riad S. Wahby wrote: > Georgi Guninski wrote: >> Does Rowhammer work in clouds? According to the popular story it >> affected only laptops. > > The answer is "it depends." > > Machines with ECC RAM make successful rowhammer attacks considerably > harder, and meanwhile mos

Re: Fwd: [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"

2016-09-01 Thread Riad S. Wahby
Georgi Guninski wrote: > Does Rowhammer work in clouds? According to the popular story it > affected only laptops. The answer is "it depends." Machines with ECC RAM make successful rowhammer attacks considerably harder, and meanwhile most cloud providers use ECC (e.g., Amazon uses ECC on all mac

Fwd: [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack"

2016-09-01 Thread Georgi Guninski
- Forwarded message from Jerry Leichter - Date: Thu, 1 Sep 2016 11:33:16 -0400 From: Jerry Leichter To: Cryptography List Subject: [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software Stack" X-Mailer: Apple Mail (2.3124) "We introduce Flip Feng Sh