Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Discover a previously unrecognized attack vector in this 33-minute Black Hat conference talk that reveals how malicious hosts can execute arbitrary code in confidential VMs without detection. Learn how attackers exploit the ACPI framework to inject ACPI Machine Language (AML) code into confidential VMs, enabling access to guest OS memory from inside the VMs. Understand not only the vulnerabilities this creates in current confidential VM implementations but also the fundamental challenge of trusting proprietary firmware provided by untrusted cloud environments—a security issue requiring significant long-term effort to resolve. Presented by security researchers Satoru Takekoshi and Manami Mori, this technical briefing exposes critical security concerns for organizations utilizing confidential computing technologies.
Syllabus
AML Injection Attacks on Confidential VMs
Taught by
Black Hat