Главная
Study mode:
on
1
Intro
2
The root cause
3
Rethinking hypervisor isolation Secrets: guest memory, registers and their copies
4
An allow-list approach
5
Hypervisor maintains secret isolation
6
Challenges
7
Evaluation of Secret-Free Xen
8
Insights
9
Against unknown attacks
10
Conclusions
Description:
Explore a groundbreaking approach to hypervisor security in this 17-minute IEEE conference talk. Delve into the root causes of speculative vulnerabilities and learn how to rethink hypervisor isolation through a secret-free design. Discover the allow-list approach and how hypervisors can maintain secret isolation. Examine the challenges faced and evaluate the performance of Secret-Free Xen. Gain valuable insights on protecting against unknown attacks and understand the implications for future hypervisor designs in the age of speculative vulnerabilities.

A Secret-Free Hypervisor - Rethinking Isolation in the Age of Speculative Vulnerabilities

IEEE
Add to list