Side-channel attacks (Meltdown, Spectre)

Boris Mulder boris.mulder at ...434...
Fri Jan 5 16:35:15 CET 2018


A question that pops up in my mind is: is there a mapping of all
physical memory inside the kernels supported by Genode (and for which
kernel is this true, besides Linux)?

One of the things mentioned in the paper:

> We focus on addresses that are mapped within the at-
> tacker’s process, i.e., the user-accessible user space ad-
> dresses as well as the user-inaccessible kernel space ad-
> dresses. Note that attacks targeting code that is executed
> within the context (i.e., address space) of another process
> are possible [19], but out of scope in this work, since all
> physical memory (including the memory of other pro-
> cesses) can be read through the kernel address space any-
> way.
In other words, is it possible for the meltdown attack on genode to leak
memory of other user-level components?

-- 

Met vriendelijke groet / kind regards,

Boris Mulder

Cyber Security Labs B.V. | Gooimeer 6-31 | 1411 DD Naarden | The Netherlands
+31 35 631 3253 (office)






More information about the users mailing list