Exploiting Out-of-Order Execution for Covert Cross-VM Communication

Exploiting Out-of-Order Execution for Covert Cross-VM Communication

This presentation will demonstrate a novel side channel exploiting CPU out-of-order-execution to enable covert cross-VM communication in cloud computing environments. Live demonstrations will show several applications of this side channel, including cross process or VM eavesdropping, malware command & control and environmental keying. The presentation will conclude with a brief analysis of detection and mitigation techniques for this attack.

Presented by