TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Attack of the week: Cross-VM timing attacks

67 点作者 stalled超过 12 年前

4 条评论

papercruncher超过 12 年前
It may be because I'm cranky this evening but I found the author's sarcastic quips really fun to read.<p>On the content itself, it sounds like if you're not targeting a specific service, you could code this up and launch a few hundred c1.xlarge spot instances (larger instances =&#62; fewer neighbors) and just collect keys. Or am I totally underestimating the amount of manual work required post-processing?
评论 #4705410 未加载
jparyani超过 12 年前
Does anyone know if Amazon ec2 instances would actually be vulnerable to this attack? For instances with dedicated cpu being promised (i.e. everything except micro), it seems reasonable that they'd be running Xen with processor affinity turned on, thereby preventing any attack exploiting L1 cache.
评论 #4705722 未加载
评论 #4705748 未加载
jberryman超过 12 年前
Amazingly cool, and nice writing. I tried to check out the paper linked at the bottom re. collocating an instance with a target VM but it's slow for me. Anyone know what the paper is?<p>What I'm curious about is if it would be possible to use a network of participating VMs on a public cloud to pass around messages untraceably from one party to another. Should certainly be easier to execute than the attack scenario they studied.
评论 #4707155 未加载
krickle超过 12 年前
Website cannot be resized in a mobile browser.