all InfoSec news
Heckler: Breaking Confidential VMs with Malicious Interrupts
April 5, 2024, 4:10 a.m. | Benedict Schl\"uter, Supraja Sridhara, Mark Kuhne, Andrin Bertschi, Shweta Shinde
cs.CR updates on arXiv.org arxiv.org
Abstract: Hardware-based Trusted execution environments (TEEs) offer an isolation granularity of virtual machine abstraction. They provide confidential VMs (CVMs) that host security-sensitive code and data. AMD SEV-SNP and Intel TDX enable CVMs and are now available on popular cloud platforms. The untrusted hypervisor in these settings is in control of several resource management and configuration tasks, including interrupts. We present Heckler, a new attack wherein the hypervisor injects malicious non-timer interrupts to break the confidentiality and …
abstraction amd amd sev arxiv breaking cloud cloud platforms code confidential control cs.cr data enable environments hardware host hypervisor intel intel tdx isolation machine malicious offer platforms popular popular cloud platforms security sensitive settings untrusted virtual virtual machine vms
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Information Security Cyber Risk Analyst
@ Intel | USA - AZ - Chandler
Senior Cloud Security Engineer (Fullstack)
@ Grab | Petaling Jaya, Malaysia
Principal Product Security Engineer
@ Oracle | United States
Cybersecurity Strategy Director
@ Proofpoint | Sunnyvale, CA
Information Security Consultant/Auditor
@ Devoteam | Lisboa, Portugal
IT Security Engineer til Netcompany IT Services
@ Netcompany | Copenhagen, Denmark