From mboxrd@z Thu Jan 1 00:00:00 1970 From: Rian Quinn Subject: x86 Community Call: Nov 14 - 15:00 - 16:00 UTC - Call for Agenda Items Date: Sat, 3 Nov 2018 15:41:44 +0000 Message-ID: <16d8698098c24db8a68342f6af26f93a@ainfosec.com> Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="===============4493463245708674685==" Return-path: Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6]) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1gIy3X-00086K-57 for xen-devel@lists.xenproject.org; Sat, 03 Nov 2018 15:41:47 +0000 Content-Language: en-US List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" To: xen-devel , "committers@xenproject.org" , "tamas.k.lengyel@gmail.com" , "intel-xen@intel.com" , "daniel.kiper@oracle.com" , Christopher Clark , "persaur@gmail.com" , "jgross@suse.com" , "john.ji@intel.com" , "Cc: dgar.iglesias@xilinx.com" , "davorin.mista@aggios.com" , "robin.randhawa@arm.com" , "Artem_Mygaiev@epam.com" , "anastassios.nanos@onapp.com" , Grall , "Stewart.Hildebrand@dornerworks.com" , "vfachin@de.adit-jv.com" , volodymyr_babchuk@epam List-Id: xen-devel@lists.xenproject.org --===============4493463245708674685== Content-Language: en-US Content-Type: multipart/alternative; boundary="_000_16d8698098c24db8a68342f6af26f93aainfoseccom_" --_000_16d8698098c24db8a68342f6af26f93aainfoseccom_ Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable All, I added an action item to the list for the November call to discuss the wor= k we are doing at AIS with respect to documenting every resource and regist= er that a Xen PVH guest touches using the Bareflank hypervisor. We are taki= ng a whitelist approach which means to get a Xen PVH guest to work we have = to explicitly grant access to every CPUID, MSR, port, memory address, and p= rivileged instruction and we are documenting these requirements as we go. T= he goal of the discussion is to introduce our work and get feedback and int= erest in the results from the rest of the group. Thanks, Rian Quinn, PhD Chief Technology Officer Assured Information Security 153 Brooks Road Rome, NY 13441 315-336-3306 Cell: 720-607-1719 quinnr@ainfosec.com --_000_16d8698098c24db8a68342f6af26f93aainfoseccom_ Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable

All,


I added an action item to the list for the November call to discuss the = work we are doing at AIS with respect to documenting every resource and reg= ister that a Xen PVH guest touches using the Bareflank hypervisor. We are t= aking a whitelist approach which means to get a Xen PVH guest to work we have to explicitly grant access to= every CPUID, MSR, port, memory address, and privileged instruction and we = are documenting these requirements as we go. The goal of the discussion is = to introduce our work and get feedback and interest in the results from the rest of the group. 


Thanks,


Rian Quinn, PhD
Chief Technology Officer
 
Assured Information Security
153 Brooks Road
Rome, NY 13441
315-336-3306
Cell: 720-607-1719

--_000_16d8698098c24db8a68342f6af26f93aainfoseccom_-- --===============4493463245708674685== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLWRldmVs IG1haWxpbmcgbGlzdApYZW4tZGV2ZWxAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0 cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi1kZXZlbA== --===============4493463245708674685==--