Reply to post: Need a malicious hypervisor

Epyc fail? We can defeat AMD's virtual machine encryption, say boffins

Sil

Need a malicious hypervisor

You need a malicious hypervisor for this to work.

How hard is it to make a hypervisor malicious? What is needed? Do we have studies or examples of it?

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon