Implementation of a Memory Disclosure Attack on Memory Deduplication of Virtual Machines

被引:7
|
作者
Suzaki, Kuniyasu [1 ]
Iijima, Kengo [1 ]
Yagi, Toshiki [1 ]
Artho, Cyrille [1 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, Tsukuba, Ibaraki 3508568, Japan
关键词
memory disclosure attack; virtual machine; memory deduplication;
D O I
10.1587/transfun.E96.A.215
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Memory deduplication improves the utilization of physical memory by sharing identical blocks of data. Although memory deduplication is most effective when many virtual machines with same operating systems run on a CPU, cross-user memory deduplication is a covert channel and causes serious memory disclosure attack. It reveals the existence of an application or file on another virtual machine. The covert channel is a difference in write access time on deduplicated memory pages that are re-created by Copy-On-Write, but it has some interferences caused by execution environments. This paper indicates that the attack includes implementation issues caused by memory alignment, self-reflection between page cache and heap, and run-time modification (swap-out, anonymous pages, ASLR, preloading mechanism, and self-modification code). However, these problems are avoidable with some techniques. In our experience on KSM (kernel samepage merging) with the KVM virtual machine, the attack could detect the security level of attacked operating systems, find vulnerable applications, and confirm the status of attacked applications.
引用
收藏
页码:215 / 224
页数:10
相关论文
共 50 条
  • [1] Homogeneous Batch Memory Deduplication Using Clustering of Virtual Machines
    Jagadeeswari, N.
    Raj, V. Mohan
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 44 (01): : 929 - 943
  • [2] A Memory-Deduplication Side-Channel Attack to Detect Applications in Co-Resident Virtual Machines
    Lindemann, Jens
    Fischer, Mathias
    [J]. 33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, : 183 - 192
  • [3] Exploiting Memory Page Management in KSM for Remote Memory Deduplication Attack
    Bae, Seungyeon
    Kim, Taehun
    Lee, Woomin
    Shin, Youngjoo
    [J]. INFORMATION SECURITY APPLICATIONS, WISA 2023, 2024, 14402 : 244 - 256
  • [4] VIRTUAL MEMORY, VIRTUAL MACHINES
    SHIELL, J
    [J]. BYTE, 1986, 11 (11): : 110 - &
  • [5] On the Detection of Applications in Co-Resident Virtual Machines via a Memory Deduplication Side-Channel
    Lindemann, Jens
    Fischer, Mathias
    [J]. APPLIED COMPUTING REVIEW, 2018, 18 (04): : 31 - 46
  • [6] Template-based Memory Deduplication Method for Inter-Data Center Live Migration of Virtual Machines
    Li, Mingyu
    Zheng, Mian
    Hu, Xiaohui
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), 2014, : 127 - 134
  • [7] VMCSnap: Taking Snapshots of Virtual Machine Cluster with Memory Deduplication
    Huang, Yumei
    Yang, Renyu
    Cui, Lei
    Wo, Tianyu
    Hu, Chunming
    Li, Bo
    [J]. 2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, : 314 - 319
  • [8] Virtual memory: Issues of implementation
    Jacob, B
    Mudge, T
    [J]. COMPUTER, 1998, 31 (06) : 33 - +
  • [9] Fast Memory Deduplication of Disk Cache Pages in Virtual Environments
    Niu, Yan
    Liu, Wei
    Xiang, Fei
    Wang, Lihong
    [J]. PROCEEDINGS 2015 IEEE FIFTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING BDCLOUD 2015, 2015, : 31 - 37
  • [10] FlexMem: Proactive Memory Deduplication for Qcow2-Based VMs with Virtual Persistent Memory
    Liu, Weinan
    Zhang, Zhihao
    Liu, Xiangrong
    Zhang, Yiming
    [J]. PROCEEDINGS OF THE 8TH ASIA-PACIFIC WORKSHOP ON NETWORKING, APNET 2024, 2024, : 102 - 107