Controlled Channel Attack Detection Based on Hardware Virtualization

被引:0
|
作者
Qiang, Chenyi [1 ]
Liu, Weijie [1 ,2 ]
Wang, Lina [1 ]
Yu, Rongwei [1 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan, Peoples R China
[2] Tencent Technol Co Ltd, Shenzhen, Peoples R China
基金
中国国家自然科学基金;
关键词
Virtualization security; Side channel attack; Extended page table; PROTECTION;
D O I
10.1007/978-3-030-05051-1_28
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Controlled-channel attack is a novel side-channel attack that uses page faults (#PF) to infer process-sensitive information of guest-VMs. Existing protection schemes focus on restricting malicious OS of virtual machine access to page number information. They need to copy memory page content frequently or manually mark and recompile sensitive programs, which takes a lot of time and labor overhead. This paper introduces a hardware-based detection method against it in a different way. The Hypervisor monitors the modification of the guest page table entry (PTE) and the Interrupt Descriptor Table (IDT) entries to find the trace of adversary's operations. As there is a semantic gap between VMs and Hypervisor, we take advantage of VMI (Virtual Machine Introspection) to convert important data. To overcome the challenge of changeable page tables, we grasp the feature of the target attack and filter out required records. Experiments show that this method can effectively detect controlled-channel attacks. In general, the performance overhead of the operations related to context switching will increase but within an acceptable range.
引用
收藏
页码:406 / 420
页数:15
相关论文
共 50 条
  • [1] Hardware Virtualization for Protection Against Power Analysis Attack
    Yang, Kai
    Park, Jungmin
    Tehranipoor, Mark
    Bhunia, Swarup
    [J]. PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2018, : 167 - 172
  • [2] Hidden Process Detection System based on Hardware-assisted Virtualization
    Li, Xue-xiang
    An, Xue-qing
    Zhang, Wenning
    [J]. 2013 SEVENTH INTERNATIONAL CONFERENCE ON INTERNET COMPUTING FOR ENGINEERING AND SCIENCE (ICICSE 2013), 2013, : 48 - 50
  • [3] Virtualization and hardware-based security
    Perez, Ronald
    Sailer, Reiner
    van Doorn, Leendert
    [J]. IEEE SECURITY & PRIVACY, 2008, 6 (05) : 24 - 31
  • [4] ROP Attack Detection Approach Based on Hardware Branch Information
    Li W.-W.
    Ma Y.
    Wang J.-J.
    Gao W.-Y.
    Yang Q.-S.
    Li M.-S.
    [J]. Ruan Jian Xue Bao/Journal of Software, 2020, 31 (11): : 3588 - 3602
  • [5] A hardware virtualization based component sandboxing architecture
    [J]. Goonasekera, N. (nuwan.goonasekera@student.qut.edu), 1600, Academy Publisher (07):
  • [6] Secure Browser Architecture Based on Hardware Virtualization
    Wu, Xin
    [J]. 2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 489 - 495
  • [7] Approach for hardware virtualization-based Rootkit detection via physical memory searching
    Zhou, Tian-Yang
    Zhu, Jun-Hu
    Li, He-Shuai
    Wang, Qing-Xian
    [J]. Ruan Jian Xue Bao/Journal of Software, 2011, 22 (SUPPL. 2): : 1 - 8
  • [8] Lightweight Hardware-Based Cache Side-Channel Attack Detection for Edge Devices (Edge-CaSCADe)
    Bhade, Pavitra
    Paturel, Joseph
    Sentieys, Olivier
    Sinha, Sharad
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2024, 23 (04)
  • [9] A LLC-based DoS Attack Technique on Virtualization System with Detection and Prevention Model
    Pimpalkar, Neha
    Abraham, Jibi
    [J]. 2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 419 - 424
  • [10] Fault attack hardware Trojan detection method based on ring oscillator
    Bi, Qiangjia
    Wu, Ning
    Zhou, Fang
    Zhang, Jinbao
    Yahya, Muhammad Rehan
    Ge, Fen
    [J]. IEICE ELECTRONICS EXPRESS, 2019, 16 (08)