You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Great paper!
Have you guys done any experiments running KernelSnitch in a VM, and how can it be used to escape a VMM like QEMU?
Or how KernelSnitch could be used to attack confidential VMs?
The text was updated successfully, but these errors were encountered:
Thanks.
The basic principle of KernelSnitch is that the victim and attacker must share the same kernel. So in its current form, KernelSnitch cannot be used to attack VMs. However, KernelSnitch can be extended to attack VMs if you find a data structure in, say, the KVM subsystem that has measurable timing differences based on its state.
Great paper!
Have you guys done any experiments running KernelSnitch in a VM, and how can it be used to escape a VMM like QEMU?
Or how KernelSnitch could be used to attack confidential VMs?
The text was updated successfully, but these errors were encountered: