April 1, 2022, 1:20 a.m. | Mengyuan Li, Yinqian Zhang, Zhiqiang Lin

cs.CR updates on arXiv.org arxiv.org

AMD's Secure Encrypted Virtualization (SEV) is an emerging security feature
on AMD processors that allows virtual machines to run on encrypted memory and
perform confidential computing even with an untrusted hypervisor. This paper
first demystifies SEV's improper use of address space identifier (ASID) for
controlling accesses of a VM to encrypted memory pages, cache lines, and TLB
entries. We then present the CROSSLINE attacks, a novel class of attacks
against SEV that allow the adversary to launch an attacker VM …

amd amd sev crash isolation memory security

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

EY GDS Internship Program - SAP, Cyber, IT Consultant or Finance Talents with German language

@ EY | Wrocław, DS, PL, 50-086

Security Architect - 100% Remote (REF1604S)

@ Citizant | Chantilly, VA, United States

Network Security Engineer - Firewall admin (f/m/d)

@ Deutsche Börse | Prague, CZ

Junior Cyber Solutions Consultant

@ Dionach | Glasgow, Scotland, United Kingdom

Senior Software Engineer (Cryptography), Bitkey

@ Block | New York City, United States