all InfoSec news
CROSSLINE: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV. (arXiv:2008.00146v2 [cs.CR] UPDATED)
April 1, 2022, 1:20 a.m. | Mengyuan Li, Yinqian Zhang, Zhiqiang Lin
cs.CR updates on arXiv.org arxiv.org
AMD's Secure Encrypted Virtualization (SEV) is an emerging security feature
on AMD processors that allows virtual machines to run on encrypted memory and
perform confidential computing even with an untrusted hypervisor. This paper
first demystifies SEV's improper use of address space identifier (ASID) for
controlling accesses of a VM to encrypted memory pages, cache lines, and TLB
entries. We then present the CROSSLINE attacks, a novel class of attacks
against SEV that allow the adversary to launch an attacker VM …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
EY GDS Internship Program - SAP, Cyber, IT Consultant or Finance Talents with German language
@ EY | Wrocław, DS, PL, 50-086
Security Architect - 100% Remote (REF1604S)
@ Citizant | Chantilly, VA, United States
Network Security Engineer - Firewall admin (f/m/d)
@ Deutsche Börse | Prague, CZ
Junior Cyber Solutions Consultant
@ Dionach | Glasgow, Scotland, United Kingdom
Senior Software Engineer (Cryptography), Bitkey
@ Block | New York City, United States