Eliminating the Hypervisor Attack Surface for a More Secure Cloud

被引:0
|
作者
Szefer, Jakub [1 ]
Keller, Eric [1 ]
Lee, Ruby B. [1 ]
Rexford, Jennifer [1 ]
机构
[1] Princeton Univ, Princeton, NJ 08544 USA
基金
美国国家科学基金会;
关键词
Secure Cloud Computing; Hypervisor Security; Attack Vectors; Virtualization; Multicore; Hardware Security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology enabling cloud providers to host services for a large number of customers. Unfortunately, virtualization software is large, complex, and has a considerable attack surface. As such, it is prone to bugs and vulnerabilities that a malicious virtual machine (VM) can exploit to attack or obstruct other VMs - a major concern for organizations wishing to move "to the cloud." In contrast to previous work on hardening or minimizing the virtualization software, we eliminate the hypervisor attack surface by enabling the guest VMs to run natively on the underlying hardware while maintaining the ability to run multiple VMs concurrently. Our NoHype system embodies four key ideas: (i) pre-allocation of processor cores and memory resources, (ii) use of virtualized I/O devices, (iii) minor modifications to the guest OS to perform all system discovery during bootup, and (iv) avoiding indirection by bringing the guest virtual machine in more direct contact with the underlying hardware. Hence, no hypervisor is needed to allocate resources dynamically, emulate I/O devices, support system discovery after bootup, or map interrupts and other identifiers. NoHype capitalizes on the unique use model in cloud computing, where customers specify resource requirements ahead of time and providers offer a suite of guest OS kernels. Our system supports multiple tenants and capabilities commonly found in hosted cloud infrastructures. Our prototype utilizes Xen 4.0 to prepare the environment for guest VMs, and a slightly modified version of Linux 2.6 for the guest OS. Our evaluation with both SPEC and Apache benchmarks shows a roughly 1% performance gain when running applications on NoHype compared to running them on top of Xen 4.0. Our security analysis shows that, while there are some minor limitations with current commodity hardware, NoHype is a significant advance in the security of cloud computing.
引用
收藏
页码:401 / 412
页数:12
相关论文
共 50 条
  • [21] Return-Oriented Programming Attack on the Xen Hypervisor
    Ding, Baozeng
    Wu, Yanjun
    He, Yeping
    Tian, Shuo
    Guan, Bei
    Wu, Guowei
    [J]. 2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 479 - 484
  • [22] Architectural Support for Secure Virtualization under a Vulnerable Hypervisor
    Jin, Seongwook
    Ahn, Jeongseob
    Cha, Sanghoon
    Huh, Jaehyuk
    [J]. PROCEEDINGS OF THE 2011 44TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO 44), 2011, : 272 - 283
  • [23] μRTZVisor: A Secure and Safe Real-Time Hypervisor
    Martins, Jose
    Alves, Joao
    Cabral, Jorge
    Tavares, Adriano
    Pinto, Sandro
    [J]. ELECTRONICS, 2017, 6 (04):
  • [24] Secure data storage in cloud computing to avoiding some cipher text attack
    Swathi, Gundala
    [J]. JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2018, 39 (04): : 843 - 855
  • [25] An efficient attack detection and prevention approach for secure WSN mobile cloud environment
    Vellela, Sai Srinivas
    Balamanigandan, R.
    [J]. Soft Computing, 2024, 28 (19) : 11279 - 11293
  • [26] New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing
    Munivel, E.
    Kannammal, A.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [27] Secure design for cloud control system against distributed denial of service attack
    Ali Y.
    Xia Y.
    Ma L.
    Hammad A.
    [J]. Control Theory and Technology, 2018, 16 (1) : 14 - 24
  • [28] A secure virtualization architecture based on a nested Nova hypervisor
    Naji, Hala Zineb
    Zbakh, Mostapha
    [J]. PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2017, : 279 - 285
  • [29] Adversarial Attack by Limited Point Cloud Surface Modifications
    Arya, Atrin
    Naderi, Hanieh
    Kasaei, Shohreh
    [J]. 2023 6TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION AND IMAGE ANALYSIS, IPRIA, 2023,
  • [30] A METHOD OF ELIMINATING CLOUD INTERFERENCE IN SATELLITE STUDIES OF SEA SURFACE TEMPERATURES
    LAVIOLET.PE
    CHABOT, PL
    [J]. DEEP-SEA RESEARCH, 1969, 16 (05): : 539 - &