TY - GEN
T1 - A shared memory based cross-VM side channel attacks in IaaS cloud
AU - Wang, Ziqi
AU - Yang, Rui
AU - Fu, Xiao
AU - Du, Xiaojiang
AU - Luo, Bin
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/9/6
Y1 - 2016/9/6
N2 - Cloud providers usually use virtualization to maximize the utilization of their computing resources, e.g. many virtual machines (VMs) run on a shared physical infrastructure. However co-residency with other VMs will cause high security risks, such as side channel attacks. This kind of attack is difficult to detect and prevent, so it's necessary to study it deeply. Recent research has shown attackers can build up cross-VM side channels to obtain sensitive information. However, due to the features of shared resources (e.g. CPU cache), the sensitive information obtained is usually limited and coarse-grained. In this paper, we present a novel side channel, which is based on shared physical memory and exploits the vulnerabilities of balloon driver. Balloon driver is a very popular mechanism used by current virtual machine managers (VMMs) to balance physical memory among several VMs. Because it is widely used in IaaS cloud, our side channel attack can achieve a high success rate. And compared with current cross-VM side channels, it can transmit more fine-grained data. Using Xen as a case study, we explore how to transmit data by this side channel.
AB - Cloud providers usually use virtualization to maximize the utilization of their computing resources, e.g. many virtual machines (VMs) run on a shared physical infrastructure. However co-residency with other VMs will cause high security risks, such as side channel attacks. This kind of attack is difficult to detect and prevent, so it's necessary to study it deeply. Recent research has shown attackers can build up cross-VM side channels to obtain sensitive information. However, due to the features of shared resources (e.g. CPU cache), the sensitive information obtained is usually limited and coarse-grained. In this paper, we present a novel side channel, which is based on shared physical memory and exploits the vulnerabilities of balloon driver. Balloon driver is a very popular mechanism used by current virtual machine managers (VMMs) to balance physical memory among several VMs. Because it is widely used in IaaS cloud, our side channel attack can achieve a high success rate. And compared with current cross-VM side channels, it can transmit more fine-grained data. Using Xen as a case study, we explore how to transmit data by this side channel.
KW - Infrastructure-as-a-Service (IaaS)
KW - cloud computing
KW - cloud security
KW - side channel attack
UR - http://www.scopus.com/inward/record.url?scp=84988841537&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84988841537&partnerID=8YFLogxK
U2 - 10.1109/INFCOMW.2016.7562068
DO - 10.1109/INFCOMW.2016.7562068
M3 - Conference contribution
AN - SCOPUS:84988841537
T3 - Proceedings - IEEE INFOCOM
SP - 181
EP - 186
BT - 2016 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2016
T2 - 35th IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2016
Y2 - 10 April 2016 through 14 April 2016
ER -