<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://dev1galaxy.org/extern.php?action=feed&amp;tid=2652&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / Can Bochs VM help to avoid spectre and meltdown types of attacks?]]></title>
		<link>https://dev1galaxy.org/viewtopic.php?id=2652</link>
		<description><![CDATA[The most recent posts in Can Bochs VM help to avoid spectre and meltdown types of attacks?.]]></description>
		<lastBuildDate>Thu, 07 Feb 2019 16:52:43 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: Can Bochs VM help to avoid spectre and meltdown types of attacks?]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=14110#p14110</link>
			<description><![CDATA[<p>Does an ability of a guest to escape into the host address space depend on a type of virtualization?</p><p>For example slow full emulation like in Bochs (when original CPU instructions are converted to other instructions before execution) vs fast hardware virtualization (when CPU instructions are executed almost unchanged just in another context) if I understand correctly ?</p><p>What about a full emulation of even another architecture? Say fully emulating immune Cortex A53 virtual hardware on a X86 hardware which is not immune to spectre by itself?</p><p>Is it so easy to produce a code for a Cortex A53 virtual guest CPU which would be translated into vulnerable hardware X86 host instructions?</p>]]></description>
			<author><![CDATA[dummy@example.com (alupoj)]]></author>
			<pubDate>Thu, 07 Feb 2019 16:52:43 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=14110#p14110</guid>
		</item>
		<item>
			<title><![CDATA[Can Bochs VM help to avoid spectre and meltdown types of attacks?]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=14104#p14104</link>
			<description><![CDATA[<p>Can bochs full emulation prevent escaping from guest to host using spectre like vulnerabilities?</p>]]></description>
			<author><![CDATA[dummy@example.com (alupoj)]]></author>
			<pubDate>Thu, 07 Feb 2019 11:10:57 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=14104#p14104</guid>
		</item>
	</channel>
</rss>
