TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

A fast, Cross-VM attack on AES [pdf]

28 pointsby timo_hover 10 years ago

2 comments

feldover 10 years ago
Virtualization is not a security implementation. I&#x27;ve been saying this for years and I&#x27;ll continue to keep my tinfoil hat on.<p>As Theo DeRaadt said<p><pre><code> You are absolutely deluded, if not stupid, if you think that a worldwide collection of software engineers who can&#x27;t write operating systems or applications without security holes, can then turn around and suddenly write virtualization layers without security holes. </code></pre> I caught someone in a meeting last week trying to sell another employee on the security benefits of virtualization and I nearly bit my tongue off.
评论 #8659079 未加载
评论 #8659111 未加载
评论 #8659136 未加载
edwintorokover 10 years ago
The paper only talks about T-table AES implementation, but it should probably mention at countermeasures this paper &quot;Faster and timing-attack resistant AES-GCM&quot; by Emilia Käsper and Peter Schwabe at CHES 2009, which I found when looking at &#x27;No data-dependent array indices&#x27; feature of NaCl: <a href="http://nacl.cr.yp.to/features.html" rel="nofollow">http:&#x2F;&#x2F;nacl.cr.yp.to&#x2F;features.html</a>
评论 #8658610 未加载