Exploiting Out of Order Execution For Covert Cross VM Communication

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=5EjZJgXJ9v8



Duration: 26:05
2 views
0


This presentation will demonstrate a novel side channel exploiting CPU out-of-order-execution to enable covert cross-VM communication in cloud computing environments. Live demonstrations will show several applications of this side channel, including cross process or VM eavesdropping, malware command & control and environmental keying. The presentation will conclude with a brief analysis of detection and mitigation techniques for this attack.

PRESENTED BY
Sophia D'Antoine

Black Hat - USA - 2015 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security







Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
virus
information
hack
online
password
code
web
concept
network
malware
secure
identity
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering
Sophia D'Antoine
virtual machine
VM
exploiting