Teddy Rogers Posted October 28, 2012 Posted October 28, 2012 I found this a very interesting paper on recovering information from resident neighboring virtual machines using side channels attacks. Whilst this is technically for a very specific attack it could possibly be explored further and exploited over time...http://www.cs.unc.ed...rs/2012/CCS.pdfTed.
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now