Empirical Evaluation of the Hypervisor Scheduling on Side Channel Attacks

被引:0
|
作者
Liu, Li [1 ]
Wang, An [1 ]
Zang, Wanyu [2 ]
Yu, Meng [3 ]
Chen, Songqing [1 ]
机构
[1] George Mason Univ, Fairfax, VA 22030 USA
[2] TAMU San Antonio, San Antonio, TX USA
[3] Univ Texas San Antonio, San Antonio, TX USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Along with the wide adoption of the cloud platform, various attacks also target clouds. Due to the sharing of the underlying physical resources among different virtual machines (VMs), various side-channel attacks have been demonstrated to be capable of stealing victim's secret information, such as encryption key, by monitoring the victim's access pattern to a shared hardware, such as CPU cache. Among various defense mechanisms proposed, the hypervisor scheduling based schemes shed some light on lightweight solutions that are more likely to be adopted in practice. However, scheduling is affected by several factors that have not been thoroughly investigated so far. In this study, we aim to study in-depth the impact of various factors affecting the hypervisor scheduling, with the objective to understand their impact on mitigating these side-channel attacks. Our results can not only deepen our understanding, but also provide some guidelines to design effective scheduling based defenses in the future.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Side-Channel Attacks in a Real Scenario
    Ming Tang
    Maixing Luo
    Junfeng Zhou
    Zhen Yang
    Zhipeng Guo
    Fei Yan
    Liang Liu
    Tsinghua Science and Technology, 2018, 23 (05) : 586 - 598
  • [32] Synthesis of Adaptive Side-Channel Attacks
    Quoc-Sang Phan
    Bang, Lucas
    Pasareanu, Corina S.
    Malacaria, Pasquale
    Bultan, Tevfik
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 328 - 342
  • [33] Soft Analytical Side-Channel Attacks
    Veyrat-Charvillon, Nicolas
    Gerard, Benoit
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 282 - 296
  • [34] Side channel attacks on message authentication codes
    Okeya, K
    Iwata, T
    SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, 2005, 3813 : 205 - 217
  • [35] Cache Side-Channel Attacks and Defenses
    Zhang W.
    Bai L.
    Ling Y.
    Lan X.
    Jia X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 206 - 222
  • [36] Flexible exponentiation with resistance to side channel attacks
    Vuillaume, Camille
    Okeya, Katsuyuki
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2006, 3989 : 268 - 283
  • [37] Photonic Side Channel Attacks Against RSA
    Carmon, Elad
    Seifert, Jean-Pierre
    Wool, Avishai
    2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2017, : 74 - 78
  • [38] Univariate side channel attacks and leakage modeling
    Doget, Julien
    Prouff, Emmanuel
    Rivain, Matthieu
    Standaert, Francois-Xavier
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (02) : 123 - 144
  • [39] Bernoulli at the Root of Horizontal Side Channel Attacks
    Cler, Gauthier
    Ordas, Sebastien
    Maurine, Philippe
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2023, 2024, 14530 : 107 - 126
  • [40] The Temperature Side Channel and Heating Fault Attacks
    Hutter, Michael
    Schmidt, Joern-Marc
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2013), 2014, 8419 : 219 - +