2010
DOI: 10.1007/978-3-642-14452-3_16
|View full text |Cite
|
Sign up to set email alerts
|

On the Limits of Hypervisor- and Virtual Machine Monitor-Based Isolation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…Our effort has been originally motivated by the disclosure of several vulnerabilities targeting multiple x86 HSE mechanisms for the past few years [17,22,23,6,14]. These attacks do not benefit from a software implementation error but rather from a flaw in the hardware specifications themselves.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…Our effort has been originally motivated by the disclosure of several vulnerabilities targeting multiple x86 HSE mechanisms for the past few years [17,22,23,6,14]. These attacks do not benefit from a software implementation error but rather from a flaw in the hardware specifications themselves.…”
Section: Discussionmentioning
confidence: 99%
“…We take the example of the SMRAM cache poisonning attack [17,22], which has motivated the introduction of the SMRR. If an attacker can set the proper cache strategy (WB) for the SMRAM physical addresses, then the code inside the SMRAM is loaded into the cache as soon as the CPU in SMM is executing it.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations