On the Detection of Applications in Co-Resident Virtual Machines via a Memory Deduplication Side-Channel

被引:4
|
作者
Lindemann, Jens [1 ]
Fischer, Mathias [1 ]
机构
[1] Univ Hamburg, Secur & Privacy Grp, Dept Comp Sci, Hamburg, Germany
来源
APPLIED COMPUTING REVIEW | 2018年 / 18卷 / 04期
关键词
security; side-channel attack; virtualization; cloud computing;
D O I
10.1145/3307624.3307628
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, hosting services of multiple customers on the same hardware via virtualiation techniques is very common. Memory deduplication allows to save physical memory by merging identical memory pages of multiple Virtual Machines (VMs) running on the same host. However, this mechanism can leak information on memory pages to other. In this paper, we propose a timing-based side-channel to identify software versions running in co-resident VMs. The attack tests whether pages that are unique to a specific software version are present in co-resident VMs. We evaluate the attack in a setting without background load and in a more realistic setting with significant background load on the host memory. Our results indicate that, with few repetitions of our attack, we can precisely identify software versions within reasonable time frames and nearly independent of the background load. Finally, we discuss potential countermeasures against the presented side-channel attack.
引用
收藏
页码:31 / 46
页数:16
相关论文
共 25 条
  • [1] A Memory-Deduplication Side-Channel Attack to Detect Applications in Co-Resident Virtual Machines
    Lindemann, Jens
    Fischer, Mathias
    33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, : 183 - 192
  • [2] An Efficient Shared In-Memory File System for Co-Resident Virtual Machines
    Sha E.H.-M.
    Wu T.
    Zhuge Q.-F.
    Yang C.-S.
    Ma Z.-L.
    Chen X.-Z.
    Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (04): : 800 - 819
  • [3] Protecting Co-resident VMs from Side-Channel Attack in Cloud Environment: SAFEPERIMETER System
    Igarramen, Zakaria
    Hedabou, Mustapha
    PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES 2015 (MEDCT 2015), VOL 2, 2016, 381 : 539 - 547
  • [4] A Fast and Transparent Communication Protocol for Co-Resident Virtual Machines
    Ren, Yi
    Liu, Ling
    Liu, Xiaojian
    Kong, Jinzhu
    Dai, Huadong
    Wu, Qingbo
    Li, Yuan
    PROCEEDINGS OF THE 2012 8TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM 2012), 2012, : 70 - 79
  • [5] Secure Data Deduplication with Resistance to Side-Channel Attacks via Fog Computing
    Zhang, Fuyou
    Qi, Saiyu
    Yuan, Haoran
    Zhang, Meng
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2019, PT II, 2020, 11945 : 440 - 455
  • [6] HomeAlone: Co-Residency Detection in the Cloud via Side-Channel Analysis
    Zhang, Yinqian
    Juels, Ari
    Oprea, Alina
    Reiter, Michael K.
    2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, : 313 - 328
  • [7] Sparse Representation of Implicit Flows with Applications to Side-Channel Detection
    Rodrigues, Bruno
    Quintao Pereira, Fernando Magno
    Aranha, Diego F.
    PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON COMPILER CONSTRUCTION (CC 2016), 2016, : 110 - 120
  • [8] Secure Deduplication-Based Storage Systems With Resistance to Side-Channel Attacks via Fog Computing
    Lu, Youshui
    Qi, Yong
    Qi, Saiyu
    Zhang, Fuyou
    Wei, Wei
    Yang, Xu
    Zhang, Jingning
    Dong, Xinpei
    IEEE SENSORS JOURNAL, 2022, 22 (18) : 17529 - 17541
  • [9] Static Detection of Asymptotic Resource Side-Channel Vulnerabilities in Web Applications
    Chen, Jia
    Olivo, Oswaldo
    Dillig, Isil
    Lin, Calvin
    PROCEEDINGS OF THE 2017 32ND IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE'17), 2017, : 229 - 239
  • [10] On the Effectiveness of Hardware Trojan Horse Detection via Side-Channel Analysis
    Dupuis, Sophie
    Di Natale, Giorgio
    Flottes, Marie-Lise
    Rouzeyre, Bruno
    INFORMATION SECURITY JOURNAL, 2013, 22 (5-6): : 226 - 236