Deep-diving into an Easily-overlooked Threat: Inter-VM Attacks

نویسنده

  • Su Zhang
چکیده

‘Cloud computing’ has been embraced more than ever before due to a number of obvious advantages ( e.g. elasticity, space-saving, hardware consolidation and cost-saving) over traditional computing infrastructure. Virtualization is the core part of cloud computing as it provides a multi-tenancy model which is the foundation of cloud computing. Typically there are two types of threats inherent with virtualization environments. One wildly noticed threat is vm-escape which means a user on a virtual machine can ‘escape’ from it and take control over the whole hypervisor. The other threat known as inter-VM attacks have often been overlooked by the research community. In this paper we want to propose a framework which can systematically detect/analyze a number of inter-VM attacks. We want to build a system capturing such threats with a low false positive rate while providing valuable recommendations to system administrators.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Preventing Cryptographic Key Leakage in Cloud Virtual Machines

In a typical infrastructure-as-a-service cloud setting, different clients harness the cloud provider’s services by executing virtual machines (VM). However, recent studies have shown that the cryptographic keys, the most crucial component in many of our daily used cryptographic protocols (e.g., SSL/TLS), can be extracted using cross-VM side-channel attacks. To defeat such a threat, this paper i...

متن کامل

Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning

Deep learning models have achieved high performance on many tasks, and thus have been applied to many security-critical scenarios. For example, deep learning-based face recognition systems have been used to authenticate users to access many security-sensitive applications like payment apps. Such usages of deep learning systems provide the adversaries with sufficient incentives to perform attack...

متن کامل

A Measurement Study on Co-residence Threat inside the Cloud

As the most basic cloud service model, Infrastructure as a Service (IaaS) has been widely used for serving the evergrowing computing demand due to the prevalence of the cloud. Using pools of hypervisors within the cloud, IaaS can support a large number of Virtual Machines (VMs) and scale services in a highly dynamic manner. However, it is well-known that the VMs in IaaS are vulnerable to co-res...

متن کامل

Scheduler-based Defenses against Cross-VM Side-channels

Public infrastructure-as-a-service clouds, such as Amazon EC2 and Microsoft Azure allow arbitrary clients to run virtual machines (VMs) on shared physical infrastructure. This practice of multi-tenancy brings economies of scale, but also introduces the threat of malicious VMs abusing the scheduling of shared resources. Recent works have shown how to mount crossVM side-channel attacks to steal c...

متن کامل

On-Demand Time Blurring to Support Side-Channel Defense

Side-channel attacks are a serious threat to multi-tenant public clouds. Past work showed how secret information in one virtual machine (VM) can be leaked to another, co-resident VM using timing side channels. Recent defenses against timing side channels focus on reducing the degree of resource sharing. However, such defenses necessarily limit the flexibility with which resources are shared. In...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012