[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: Identify an specific DomU inpecting all pages in memory
Sure. The goal is to emulate a scenario where a compromised guest attacks another tenant in the same physical host reading/changing the memory content. E.g., extract the RSA key. I'll be in the domU kernel space. I'm assuming that the guest is able to exploit any vulnerability possible. Effectively I'll be changing Xen's code (at least possible) to *emulate* a vulnerability (e.g., undo a patch). Atenciosamente, Charles Ferreira Gonçalves On Sat, Jan 2, 2021 at 7:06 PM Andrew Cooper <andrew.cooper3@xxxxxxxxxx> wrote: On 02/01/2021 17:02, Charles Gonçalves wrote:
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |