Ways to avoid such exploit headaches in the real world consist of countermeasures that administrators may take to avoid the leakage. One is to use a separate, "air-gapped" computer for high-security tasks.
Couldn't this be addressed by simply locking each VM to a separate core and deactivating the cache during crypto calls?
antialias_physorg
Nov 9, 2012Clever bastards. And pretty undetectable, too.