CPU MICROARCHITECTURAL VULNERABILITIES IN THE CONTEXT OF JOINT APPLICATION OF HARDWARE FOR INFORMATION PROTECTION AND VIRTUALIZATION TECHNOLOGIES IN AUTOMATED SYSTEMS
Zhuravlev D.A., Gribunin V.G., Neustroev A.V., Poleshenkov D.D.
Annotation: This article discusses the limitations of the combined use of information protection hardware and virtualization technologies due to the presence of microarchitectural vulnerabilities in processors. A conclusion is made about the possibility and boundary conditions for the safe use of untrusted software in automated systems, where information is protected from unauthorized access through the joint use of hardware information security modules and a trusted hypervisor.
Keywords: automated systems, virtualization technologies, processor microarchitectural vulnerabilities