Bypassing Full Disk Encryption with Virtual Machine Introspection

被引:0
|
作者
Hebbal, Yacine [1 ]
机构
[1] Orange Labs, Secur Dept, Caen, France
来源
2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019) | 2019年
关键词
Infrastructure-as-a-Service; Cloud Security; Full Disk Encryption; Virtual Machine Introspection; Binary Code Instrumentation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Full Disk Encryption (FDE) is a common practice today to reduce the risk of unauthorized access to personal data in public cloud environments. Some research works demonstrated that a malicious hypervisor employing Virtual Machine Introspection (VMI) can bypass FDE and perform unwanted file operations. However, these works provide restricted OS support, enable access only to user level files and may not support complex uses cases. In this paper, we present a new approach for bypassing FDE using VM kernel functions instrumentation. Our approach is portable over different FDE solutions, supports Linux and Windows OSes and provides fast access to user and system files on the VM disk. In addition it enables with no modification existing applications on the host OS to transparently bypass FDE and operate on the VM disk.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] Towards virtual machine introspection based security framework for cloud
    Bhavesh Borisaniya
    Dhiren Patel
    Sādhanā, 2019, 44
  • [42] CryptVMI: A Flexible and Encrypted Virtual Machine Introspection System in the Cloud
    Yao, Fangzhou
    Sprabery, Read
    Campbell, Roy H.
    SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 11 - 17
  • [43] Using Virtual Machine Introspection for Operating Systems Security Education
    Bhatt, Manish
    Ahmed, Irfan
    Lin, Zhiqiang
    SIGCSE'18: PROCEEDINGS OF THE 49TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, 2018, : 396 - 401
  • [44] Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection
    Proskurin, Sergej
    Lengyel, Tamas
    Momeu, Marius
    Eckert, Claudia
    Zarras, Apostolis
    34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, : 407 - 417
  • [45] Performance Analysis of Virtual Machine Introspection Tools in Cloud Environment
    Ainapure, Bharati
    Shah, Deven
    Rao, A. Ananda
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
  • [46] Extending Full Disk Encryption for the Future (Transcript of Discussion)
    Broz, Milan
    SECURITY PROTOCOLS XXV, 2017, 10476 : 116 - 122
  • [47] Haskell Library for Safer Virtual Machine Introspection (Experience Report)
    Otsuka, Takato
    Iwasaki, Hideya
    PROCEEDINGS OF THE 16TH ACM SIGPLAN INTERNATIONAL SYMPOSIUM ON HASKELL, HASKELL 2023, 2023, : 89 - 96
  • [48] Active and passive virtual machine introspection on AMD and ARM processors
    Dangl, Thomas
    Sentanoe, Stewart
    Reiser, Hans P.
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 149
  • [49] The growing impact of full disk encryption on digital forensics
    Casey, Eoghan
    Fellows, Geoff
    Geiger, Matthew
    Stellatos, Gerasimos
    DIGITAL INVESTIGATION, 2011, 8 (02) : 129 - 134
  • [50] Virtual Machine Introspection for Anomaly-Based Keylogger Detection
    Huseynov, Huseyn
    Kourai, Kenichi
    Saadawi, Tarek
    Igbe, Obinna
    2020 IEEE 21ST INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (IEEE HPSR), 2020,