TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

A fast, Cross-VM attack on AES [pdf]

28 点作者 timo_h超过 10 年前

2 条评论

feld超过 10 年前
Virtualization is not a security implementation. I&#x27;ve been saying this for years and I&#x27;ll continue to keep my tinfoil hat on.<p>As Theo DeRaadt said<p><pre><code> You are absolutely deluded, if not stupid, if you think that a worldwide collection of software engineers who can&#x27;t write operating systems or applications without security holes, can then turn around and suddenly write virtualization layers without security holes. </code></pre> I caught someone in a meeting last week trying to sell another employee on the security benefits of virtualization and I nearly bit my tongue off.
评论 #8659079 未加载
评论 #8659111 未加载
评论 #8659136 未加载
edwintorok超过 10 年前
The paper only talks about T-table AES implementation, but it should probably mention at countermeasures this paper &quot;Faster and timing-attack resistant AES-GCM&quot; by Emilia Käsper and Peter Schwabe at CHES 2009, which I found when looking at &#x27;No data-dependent array indices&#x27; feature of NaCl: <a href="http://nacl.cr.yp.to/features.html" rel="nofollow">http:&#x2F;&#x2F;nacl.cr.yp.to&#x2F;features.html</a>
评论 #8658610 未加载