Bypassing Full Disk Encryption with Virtual Machine Introspection

被引:0
|
作者
Hebbal, Yacine [1 ]
机构
[1] Orange Labs, Secur Dept, Caen, France
关键词
Infrastructure-as-a-Service; Cloud Security; Full Disk Encryption; Virtual Machine Introspection; Binary Code Instrumentation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Full Disk Encryption (FDE) is a common practice today to reduce the risk of unauthorized access to personal data in public cloud environments. Some research works demonstrated that a malicious hypervisor employing Virtual Machine Introspection (VMI) can bypass FDE and perform unwanted file operations. However, these works provide restricted OS support, enable access only to user level files and may not support complex uses cases. In this paper, we present a new approach for bypassing FDE using VM kernel functions instrumentation. Our approach is portable over different FDE solutions, supports Linux and Windows OSes and provides fast access to user and system files on the VM disk. In addition it enables with no modification existing applications on the host OS to transparently bypass FDE and operate on the VM disk.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Research and Design of Full Disk Encryption Based on Virtual Machine
    Liang, Min
    Chang, Chao-wen
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2010, : 642 - 646
  • [2] Virtual Machine Introspection: Techniques and Applications
    Hebbal, Yacine
    Laniepce, Sylvie
    Menaud, Jean-Marc
    PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 676 - 685
  • [3] A lightweight method for virtual machine introspection
    N. I. Fursova
    P. M. Dovgalyuk
    I. A. Vasil’ev
    V. A. Makarov
    Programming and Computer Software, 2017, 43 : 307 - 313
  • [4] Virtual machine introspection - Observation or interference?
    Nance, Kara
    Hay, Brian
    Bishop, Matt
    IEEE SECURITY & PRIVACY, 2008, 6 (05) : 32 - 37
  • [5] A lightweight method for virtual machine introspection
    Fursova, N. I.
    Dovgalyuk, P. M.
    Vasil'ev, I. A.
    Makarov, V. A.
    PROGRAMMING AND COMPUTER SOFTWARE, 2017, 43 (05) : 307 - 313
  • [6] Extending Full Disk Encryption for the Future
    Broz, Milan
    SECURITY PROTOCOLS XXV, 2017, 10476 : 109 - 115
  • [7] A Universal Semantic Bridge for Virtual Machine Introspection
    Schneider, Christian
    Pfoh, Jonas
    Eckert, Claudia
    INFORMATION SYSTEMS SECURITY, 2011, 7093 : 370 - 373
  • [8] CryptVMI: Encrypted Virtual Machine Introspection in the Cloud
    Yao, Fangzhou
    Campbell, Roy H.
    2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 977 - 978
  • [9] CloudVMI: Virtual Machine Introspection as a Cloud Service
    Baek, Hyun-wook
    Srivastava, Abhinav
    Van der Merwe, Jacobus
    2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), 2014, : 153 - 158
  • [10] Narrowing the semantic gap in virtual machine introspection
    Cui, Chao-Yuan
    Wu, Yun
    Li, Ping
    Zhang, Xiao-Ming
    Tongxin Xuebao/Journal on Communications, 2015, 36 (08):