You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Skim Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems to see if it counts as a privacy-breaking side-channel
#55
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
This is a really weird threat model: The OS is malicious, but the hypervisor and application running on the OS are not, and you want to defend the application from the OS.
Holy shit this is cool, it uses page faults to monitor which pages of memory are being accessed over time. For example page-granularity view of code execution in FreeType leaks the characters, and they extract text contents that way. If that's possible, unless the code runes too fast, I'm betting it's possible to do this using Flush+Reload. Opened #60.
No description provided.
The text was updated successfully, but these errors were encountered: