A very anonymous AC submits the following:
The research team, which also included a member from Belgium's Katholieke Universiteit Leuven, went on to show how an attacker VM can use Flip Feng Shui to compromise RSA cryptography keys stored on another VM hosted in the same cloud environment. In one experiment, the attacker VM compromised the key used to authenticate secure shell access, a feat that allowed the VM to gain unauthorized access to the target. In a separate experiment, the attacker VM compromised the GPG key used by developers of the Ubuntu operating system to verify the authenticity of updates. With the compromised GPG key, the attacker VM was able to force the target to download and install a malicious update.
"Virtual Inception" could be a good name for this specific use of "Flip Feng Shui" :).
I wonder how well ECC protects from such attacks: http://arstechnica.com/security/2016/03/once-thought-safe-ddr4-memory-shown-to-be-vulnerable-to-rowhammer/
(Score: 0) by Anonymous Coward on Thursday September 01 2016, @09:51PM
I have a Beowulf cluster of Faraday cages that segregates each bit from each other to protect against attacks like this.
(Score: 2) by bob_super on Thursday September 01 2016, @10:23PM
My VMs are so secure that I don't even have access to them.
Break into them? Sure go ahead, you'll find what you bring in with you.
(Score: 0) by Anonymous Coward on Friday September 02 2016, @02:09AM
My VM's are behind seven proxies. Seven!