Bypassing Full Disk Encryption with Virtual Machine Introspection

被引:0
|
作者
Hebbal, Yacine [1 ]
机构
[1] Orange Labs, Secur Dept, Caen, France
关键词
Infrastructure-as-a-Service; Cloud Security; Full Disk Encryption; Virtual Machine Introspection; Binary Code Instrumentation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Full Disk Encryption (FDE) is a common practice today to reduce the risk of unauthorized access to personal data in public cloud environments. Some research works demonstrated that a malicious hypervisor employing Virtual Machine Introspection (VMI) can bypass FDE and perform unwanted file operations. However, these works provide restricted OS support, enable access only to user level files and may not support complex uses cases. In this paper, we present a new approach for bypassing FDE using VM kernel functions instrumentation. Our approach is portable over different FDE solutions, supports Linux and Windows OSes and provides fast access to user and system files on the VM disk. In addition it enables with no modification existing applications on the host OS to transparently bypass FDE and operate on the VM disk.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] CryptVMI: A Flexible and Encrypted Virtual Machine Introspection System in the Cloud
    Yao, Fangzhou
    Sprabery, Read
    Campbell, Roy H.
    SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 11 - 17
  • [42] Virtual Machine Forensics by Means of Introspection and Kernel Code Injection
    Tobin, Patrick
    Kechadi, Tahar
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2014), 2014, : 294 - 299
  • [43] Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection
    Proskurin, Sergej
    Lengyel, Tamas
    Momeu, Marius
    Eckert, Claudia
    Zarras, Apostolis
    34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, : 407 - 417
  • [44] Using Virtual Machine Introspection for Operating Systems Security Education
    Bhatt, Manish
    Ahmed, Irfan
    Lin, Zhiqiang
    SIGCSE'18: PROCEEDINGS OF THE 49TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, 2018, : 396 - 401
  • [45] Performance Analysis of Virtual Machine Introspection Tools in Cloud Environment
    Ainapure, Bharati
    Shah, Deven
    Rao, A. Ananda
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
  • [46] Extending Full Disk Encryption for the Future (Transcript of Discussion)
    Broz, Milan
    SECURITY PROTOCOLS XXV, 2017, 10476 : 116 - 122
  • [47] Haskell Library for Safer Virtual Machine Introspection (Experience Report)
    Otsuka, Takato
    Iwasaki, Hideya
    PROCEEDINGS OF THE 16TH ACM SIGPLAN INTERNATIONAL SYMPOSIUM ON HASKELL, HASKELL 2023, 2023, : 89 - 96
  • [48] Active and passive virtual machine introspection on AMD and ARM processors
    Dangl, Thomas
    Sentanoe, Stewart
    Reiser, Hans P.
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 149
  • [49] The growing impact of full disk encryption on digital forensics
    Casey, Eoghan
    Fellows, Geoff
    Geiger, Matthew
    Stellatos, Gerasimos
    DIGITAL INVESTIGATION, 2011, 8 (02) : 129 - 134
  • [50] Benchmarking Hyper-Breakpoints for Efficient Virtual Machine Introspection
    Beierlieb, Lukas
    Schmitz, Alexander
    Springer, Raphael
    Dietrich, Christian
    Ifflaender, Lukas
    ELECTRONICS, 2025, 14 (03):