Back to Results
First PageMeta Content
Advanced Encryption Standard / Central processing unit / Computer memory / Virtual machines / CPU cache / Hyper-V / Timing attack / AES instruction set / Xen / System software / Software / Computing


Fine grain Cross-VM Attacks on Xen and VMware are possible! Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar ∗ Worcester Polytechnic Institute {girazoki,msinci,teisenbarth,sunar}@wpi.edu Abst
Add to Reading List

Document Date: 2014-04-07 18:32:56


Open Document

File Size: 735,56 KB

Share Result on Facebook

Company

Rackspace / Amazon EC2 / Amazon / Netflix / Bernstein / VM Memory Management / AMD / VMware / Intel / Microsoft / the AES / /

/

Event

M&A / /

Facility

Worcester Polytechnic Institute / OpenSSL library / This library / /

IndustryTerm

bare metal version / physical hardware / faster virtual machine memory management / cryptographic software packages / decade cloud computing / web browsers / software implementations / personal computing / attack algorithm / software level / exhaustive search / host operating systems / duplicate profile server / target server / media sharing / profile server / web server using packet timing information / search space / cloud services / /

OperatingSystem

VMs / Linux / Ubuntu / L3 / FreeBSD / Microsoft Windows / /

Organization

National Science Foundation / Worcester Polytechnic Institute / /

Person

Michael Weiss / Berk Sunar / Thomas Eisenbarth / Mehmet Sinan Inci / Gorka Irazoqui Apecechea / /

Position

virtual machine manager / /

Product

Ubuntu Linux / /

ProvinceOrState

Virginia / Pennsylvania / AES / /

Technology

virtual machine / RAM / Linux / cache memory / private key / same processor / secret key / operating system / operating systems / encryption / NPT technologies / attack algorithm / ARM processors / ARM Cortex-A8 processor / virtual memory / web server / /

SocialTag