Security Analysis of Encrypted Virtual Machines

被引:0
|
作者
Hetzelt, Felicitas [1 ]
Buhren, Robert [1 ]
机构
[1] Tech Univ Berlin, Berlin, Germany
关键词
Secure Encrypted Virtualization; AMD SEV; Cloud Computing; ATTACKS;
D O I
10.1145/3050748.3050763
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud computing has become indispensable in today's computer landscape. The flexibility it offers for customers as well as for providers has become a crucial factor for large parts of the computer industry. Virtualization is the key technology that allows for sharing of hardware resources among different customers. The controlling software component, called hypervisor, provides a virtualized view of the computer resources and ensures separation of different guest virtual machines. However, this important cornerstone of cloud computing is not necessarily trustworthy or bug-free. To mitigate this threat AMD introduced Secure Encrypted Virtualization, short SEV, which transparently encrypts a virtual machines memory. In this paper we analyse to what extend the proposed features can resist a malicious hypervisor and discuss the tradeoffs imposed by additional protection mechanisms. To do so, we developed a model of SEV's security capabilities based on the available documentation as actual silicon implementations are not yet on the market. We found that the first proposed version of SEV is not up to the task owing to three design shortcomings. First the virtual machine control block is not encrypted and handled directly by the hypervisor, allowing it to bypass VM memory encryption by executing conveniently chosen gadgets. Secondly, the general purpose registers are not encrypted upon vmexit, leaking potentially sensitive data. Finally, the control over the nested pagetables allows a malicious hypervisor to closely monitor the execution state of a VM and attack it with memory replay attacks.
引用
收藏
页码:129 / 142
页数:14
相关论文
共 50 条
  • [1] Virtual machines, virtual security?
    Bellovin, Steven M.
    [J]. COMMUNICATIONS OF THE ACM, 2006, 49 (10) : 104 - 104
  • [2] Extracting Secrets from Encrypted Virtual Machines
    Morbitzer, Mathias
    Huber, Manuel
    Horsch, Julian
    [J]. PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), 2019, : 221 - 230
  • [3] Real security for virtual machines
    Mattsson, Ulf
    [J]. Network Security, 2009, 2009 (04) : 15 - 17
  • [4] Security Architecture for Virtual Machines
    Tupakula, Udaya
    Varadharajan, Vijay
    Bichhawat, Abhishek
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PT I: ICA3PP 2011, 2011, 7916 : 218 - +
  • [5] Security analysis in the dynamic migration of virtual machines in cloud computing
    [J]. Shang, Huihua (Shanghuihua@163.com), 2017, Universidad Central de Venezuela (55):
  • [6] A security analysis for encrypted database
    Mingsheng, Zhang
    Chunyong, Yin
    [J]. 2007 International Symposium on Computer Science & Technology, Proceedings, 2007, : 987 - 990
  • [7] SEVerity: Code Injection Attacks against Encrypted Virtual Machines
    Morbitzer, Mathias
    Proskurin, Sergej
    Radev, Martin
    Dorfhuber, Marko
    Salas, Erick Quintanar
    [J]. 2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2021), 2021, : 444 - 455
  • [8] Live Migration of Operating System Containers in Encrypted Virtual Machines
    Pecholt, Joana
    Huber, Monika
    Wessel, Sascha
    [J]. PROCEEDINGS OF THE 2021 CLOUD COMPUTING SECURITY WORKSHOP, CCSW 2021, 2021, : 125 - 137
  • [9] The Application of Virtual Machines on System Security
    Zhao, Siqin
    Chen, Kong
    Zheng, Weimin
    [J]. FOURTH CHINAGRID ANNUAL CONFERENCE, PROCEEDINGS, 2009, : 222 - 229
  • [10] Integrated Security Architecture for Virtual Machines
    Varadharajan, Vijay
    Tupakula, Udaya
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 127 : 140 - 153