Beta

Slashdot: News for Nerds

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

cancel ×

1 comment

Whoops, didn't finish scribbling. (1)

HagraBiscuit (2756527) | about a year and a half ago | (#41931015)

Hope this elucidates a little more than the above terseness. RSA labs in colaboration with Universities of North Carolina and Wisconsin have succeeded in extracting cryptographic keys from a virtual machine by exploiting a side-channel attack. The attack is from a co-resident virtual machine, i.e. sharing the same physical hardware as the target. Analysis of the processor instruction cache reveals information about the target's behaviour and can be used to extract cryptographic information when identified.
Check for New Comments
Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Create a Slashdot Account

Loading...