From mboxrd@z Thu Jan 1 00:00:00 1970 From: Avi Kivity Subject: Re: EuroSec'11 Presentation Date: Sun, 10 Apr 2011 17:49:52 +0300 Message-ID: <4DA1C390.10003@redhat.com> References: <20110410.232340.01368317.k.suzaki@aist.go.jp> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: kvm@vger.kernel.org To: Kuniyasu Suzaki Return-path: Received: from mx1.redhat.com ([209.132.183.28]:5771 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753778Ab1DJOt7 (ORCPT ); Sun, 10 Apr 2011 10:49:59 -0400 In-Reply-To: <20110410.232340.01368317.k.suzaki@aist.go.jp> Sender: kvm-owner@vger.kernel.org List-ID: On 04/10/2011 05:23 PM, Kuniyasu Suzaki wrote: > Dear, > > I made a presentation about memory disclosure attack on SKM (Kernel > Samepage Merging) with KVM at EuroSec 2011. > The titile is "Memory Deduplication as a Threat to the Guest OS". > http://www.iseclab.org/eurosec-2011/program.html > > The slide is downloadbale. > http://www.slideshare.net/suzaki/eurosec2011-slide-memory-deduplication > The paper will be downloadble form ACM Digital Library. > > Please tell me, if you have comments. Thank you. Very interesting presentation. It seems every time you share something, it become a target for attacks. -- error compiling committee.c: too many arguments to function