Bypassing Full Disk Encryption with Virtual Machine Introspection

被引:0
|
作者
Hebbal, Yacine [1 ]
机构
[1] Orange Labs, Secur Dept, Caen, France
关键词
Infrastructure-as-a-Service; Cloud Security; Full Disk Encryption; Virtual Machine Introspection; Binary Code Instrumentation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Full Disk Encryption (FDE) is a common practice today to reduce the risk of unauthorized access to personal data in public cloud environments. Some research works demonstrated that a malicious hypervisor employing Virtual Machine Introspection (VMI) can bypass FDE and perform unwanted file operations. However, these works provide restricted OS support, enable access only to user level files and may not support complex uses cases. In this paper, we present a new approach for bypassing FDE using VM kernel functions instrumentation. Our approach is portable over different FDE solutions, supports Linux and Windows OSes and provides fast access to user and system files on the VM disk. In addition it enables with no modification existing applications on the host OS to transparently bypass FDE and operate on the VM disk.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] VMIFresh: Efficient and Fresh Caches for Virtual Machine Introspection
    Dangl, Thomas
    Sentanoe, Stewart
    Reiser, Hans P.
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [22] Virtual machine introspection: towards bridging the semantic gap
    More, Asit
    Tapaswi, Shashikala
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2014, 3 (03): : 1 - 14
  • [23] VICI-Virtual Machine Introspection for Cognitive Immunity
    Fraser, Timothy
    Evenson, Matthew R.
    Arbaugh, William A.
    24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 87 - 96
  • [24] Insider Threat Detection using Virtual Machine Introspection
    Crawford, Martin
    Peterson, Gilbert
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 1821 - 1830
  • [25] Investigating the Implications of Virtual Machine Introspection for Digital Forensics
    Nance, Kara
    Hay, Brian
    Bishop, Matt
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 1024 - +
  • [26] Virtual Machine Introspection based Cloud Monitoring Platform
    Lauren, Samuel
    Leppanen, Ville
    COMPUTER SYSTEMS AND TECHNOLOGIES (COMPSYSTECH'18), 2018, 1641 : 104 - 109
  • [27] Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection
    Dolan-Gavitt, Brendan
    Leek, Tim
    Zhivich, Michael
    Giffin, Jonathon
    Lee, Wenke
    2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, : 297 - 312
  • [28] Malware detection for container runtime based on virtual machine introspection
    He, Xinfeng
    Li, Riyang
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (06): : 7245 - 7268
  • [29] Endpoint Configuration Compliance Monitoring via Virtual Machine Introspection
    Kienzle, Darrell
    Persaud, Ryan
    Elder, Matthew
    43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 926 - 935
  • [30] Towards Hypervisor Support for Enhancing the Performance of Virtual Machine Introspection
    Taubmann, Benjamin
    Reiser, Hans P.
    DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS, DAIS 2020, 2020, 12135 : 41 - 54