Empirical Evaluation of the Hypervisor Scheduling on Side Channel Attacks

被引:0
|
作者
Liu, Li [1 ]
Wang, An [1 ]
Zang, Wanyu [2 ]
Yu, Meng [3 ]
Chen, Songqing [1 ]
机构
[1] George Mason Univ, Fairfax, VA 22030 USA
[2] TAMU San Antonio, San Antonio, TX USA
[3] Univ Texas San Antonio, San Antonio, TX USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Along with the wide adoption of the cloud platform, various attacks also target clouds. Due to the sharing of the underlying physical resources among different virtual machines (VMs), various side-channel attacks have been demonstrated to be capable of stealing victim's secret information, such as encryption key, by monitoring the victim's access pattern to a shared hardware, such as CPU cache. Among various defense mechanisms proposed, the hypervisor scheduling based schemes shed some light on lightweight solutions that are more likely to be adopted in practice. However, scheduling is affected by several factors that have not been thoroughly investigated so far. In this study, we aim to study in-depth the impact of various factors affecting the hypervisor scheduling, with the objective to understand their impact on mitigating these side-channel attacks. Our results can not only deepen our understanding, but also provide some guidelines to design effective scheduling based defenses in the future.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Shuffler: Mitigate Cross-VM Side-Channel Attacks via Hypervisor Scheduling
    Liu, Li
    Wang, An
    Zang, WanYu
    Yu, Meng
    Xiao, Menbai
    Chen, Songqing
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 491 - 511
  • [2] Empirical Evaluation of Multi-Device Profiling Side-Channel Attacks
    Hanley, Neil
    O'Neill, Maire
    Tunstall, Michael
    Marnane, William P.
    PROCEEDINGS OF THE 2014 IEEE WORKSHOP ON SIGNAL PROCESSING SYSTEMS (SIPS 2014), 2014, : 226 - 231
  • [3] Evaluation of Hypervisor Stability towards Insider Attacks
    Roman Kulikov
    Svetlana Kolesnikova
    JournalofElectronicScienceandTechnology, 2016, 14 (01) : 37 - 42
  • [4] Evaluation of Hypervisor Stability towards Insider Attacks
    Roman Kulikov
    Svetlana Kolesnikova
    Journal of Electronic Science and Technology, 2016, (01) : 37 - 42
  • [5] Evaluation of hypervisor stability towards insider attacks
    Kulikov R.
    Kolesnikova S.
    Kulikov, Roman (rdkulikov@corp.ifmo.ru), 1600, Univ. of Electronic Science and Technology of China (14): : 37 - 42
  • [6] MemWander: Memory Dynamic Remapping via Hypervisor Against Cache-Based Side-Channel Attacks
    Yang, Chao
    Guo, Yunfei
    Hu, Hongchao
    IEEE ACCESS, 2019, 7 : 2179 - 2199
  • [7] Analysis and Evaluation of I/O Hypervisor Scheduling
    Kontodimas, Konstantinos
    Kokkinos, Panagiotis
    Kuperman, Yossi
    Varvarigos, Emmanouel
    2015 IEEE/ACM 8TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2015, : 45 - 54
  • [8] Side Channel Attacks on GPUs
    Naghibijouybari, Hoda
    Neupane, Ajaya
    Qian, Zhiyun
    Abu-Ghazaleh, Nael
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (04) : 1950 - 1961
  • [10] Adaptive Channel Estimation in Side Channel Attacks
    Jin, Shan
    Bettati, Riccardo
    2018 10TH IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2018,