"Hardware Side Channels in Virtualized Environments"
This talk will describe first the landscape of side channel vulnerabilities, the types which are possible given different virtualization circumstances, and the basic primitives of an side-channel attack. This survey will contrast against the specific exploitation of the cloud based environment.
We then look closely at the attack surface of common, cloud-based, hardware side channels. This includes the full hardware stack shared between supposedly isolated hosts and the similarities and differences in exploiting each hardware resource.
Following this, demonstrations of two separate attacks, one in the cache and a novel side channel across the pipeline, will be made to show the theory behind what is being discussed.
To conclude, we review possible mitigations at the hardware, hypervisor, and client software level, as well as give our thoughts on the future of side channels in the cloud.
DOWNLOAD WHITE PAPER
DOWNLOAD SLIDES AS PDF
DOWNLOAD SIDE CHANNEL ATTACK MODEL AND CLASSIFICATIONPAPER
ADVERSARY SCRIPT [receiver]
TARGET SCRIPT [sender]
CORE TESTS AND SOURCE [more detailed code]
The Register [ Cloudy VMs leak ID details that could allow attacks ]
Threatpost [ A new attack on these virtual machines ]
Trail of Bits [ Hardware Side Channels in the Cloud ]
International Journal of Proof-of-Concept or Get The Fuck Out (PoC||GTFO)
[ PASTOR MANUL LAPHROAIG'S tabernacle choir SINGS REVERENT ELEGIES of the SECOND CRYPTO WAR ]