On Fri, Sep 02, 2016 at 10:56:10AM -0400, Jerry Leichter wrote:
> > Why bother with patching public keys, making them amenable to
> > factorization, if you can patch executable code instead?
> >
> > If you can target executable code (and I see why not, it's all the
> > same to KSM), it is very cle
On Sat, Sep 03, 2016 at 07:52:26PM -0400, John wrote:
> I need to upgrade to an actual 1U instead of my current VPS solution, heh ;)
>
> Then again... I wonder who I'm sharing a hypervisor with...
>
>
The software is buggy, the RAM is buggy, the CPU is buggy,
the operator is buggy.
AND IT WORK
Sep 2016 08:49:34 +0300
>From: Georgi Guninski
>To: Jerry Leichter
>Cc: Florian Weimer , Cryptography List
>
>Subject: Re: [Cryptography] "Flip Feng Shui: Hammering a Needle in the
>Software Stack"
>
>On Fri, Sep 02, 2016 at 10:56:10AM -0400, Jerry Leichter wrote
- Forwarded message from Georgi Guninski -
Date: Sat, 3 Sep 2016 08:49:34 +0300
From: Georgi Guninski
To: Jerry Leichter
Cc: Florian Weimer , Cryptography List
Subject: Re: [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software
Stack"
On Fri, Sep 02, 2016 at
Mirimir wrote:
> On 09/02/2016 12:21 AM, Riad S. Wahby wrote:
> > As an aside: note that the attack the Xiao paper describes only works
> > against Xen guests that *don't* use hardware-assisted page tables
> > (EPT for Intel, NPT for AMD). If you're using hardware-assisted
> > virtualization (e.g.
On Thu, Sep 01, 2016 at 11:21:18PM -0700, Riad S. Wahby wrote:
> Georgi Guninski wrote:
> > Does Rowhammer work in clouds? According to the popular story it
> > affected only laptops.
>
> The answer is "it depends."
>
Thanks. Just browsed through the paper, it mentions m$ azure.
Is/has been some
On 09/02/2016 12:21 AM, Riad S. Wahby wrote:
> Georgi Guninski wrote:
>> Does Rowhammer work in clouds? According to the popular story it
>> affected only laptops.
>
> The answer is "it depends."
>
> Machines with ECC RAM make successful rowhammer attacks considerably
> harder, and meanwhile mos
Georgi Guninski wrote:
> Does Rowhammer work in clouds? According to the popular story it
> affected only laptops.
The answer is "it depends."
Machines with ECC RAM make successful rowhammer attacks considerably
harder, and meanwhile most cloud providers use ECC (e.g., Amazon uses
ECC on all mac
- Forwarded message from Jerry Leichter -
Date: Thu, 1 Sep 2016 11:33:16 -0400
From: Jerry Leichter
To: Cryptography List
Subject: [Cryptography] "Flip Feng Shui: Hammering a Needle in the Software
Stack"
X-Mailer: Apple Mail (2.3124)
"We introduce Flip Feng Sh