Memory Deduplication as a Protective Factor in Virtualized Systems

被引:2
作者
Albalawi, Abdullah [1 ]
Vassilakis, Vassilios [1 ]
Calinescu, Radu [1 ]
机构
[1] Univ York, Dept Comp Sci, York, N Yorkshire, England
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2021 | 2021年 / 12809卷
关键词
Side-channel attacks; Memory deduplication; Flush plus reload; Flush plus flush; SIDE-CHANNEL ATTACKS; CLOUD;
D O I
10.1007/978-3-030-81645-2_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce a method for protection against a side-channel attack made possible by the use of a cloud-computing feature called memory deduplication. Memory deduplication improves the efficiency with which physical memory is used by the virtual machines (VMs) running on the same server by keeping in memory only one copy of the libraries and other software used by multiple VMs. However, this allows an attacker's VM to find out the memory locations (and thus the operations) used by a victim's VM, as these locations are cached and can be accessed faster than memory locations not used by the victim. To perform the attack, the malicious VM needs to execute an abnormal sequence of cache flushes, and our new method detects this by monitoring memory locations associated with sensitive (e.g., encryption) operations and using logistic regression to identify the abnormal cached operations. Furthermore, by using its own cache flushing, our method disrupts the side channel, making it more difficult for the attacker to acquire useful information. The experiments we ran using the KVM hypervisor and Ubuntu 18.04 LTS VMs on both Debian 10 and CentOS physical servers show that our method can detect attacks with 99% accuracy, and can feed fake information to an attacker with between 2-8% CPU overheads.
引用
收藏
页码:301 / 317
页数:17
相关论文
共 37 条
[1]  
[Anonymous], INTEL VIRTUAL TARGET
[2]   Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey [J].
Anwar, Shahid ;
Inayat, Zakira ;
Zolkipli, Mohamad Fadli ;
Zain, Jasni Mohamad ;
Gani, Abdullah ;
Anuar, Nor Badrul ;
Khan, Muhammad Khurram ;
Chang, Victor .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 93 :259-279
[3]   Cache-timing attacks without a profiling phase [J].
Atici, Ali Can ;
Yilmaz, Cemal ;
Savas, Erkay .
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2018, 26 (04) :1953-1966
[4]  
Base V.K, 2014, VMWARE KNOWLEDGE BAS
[5]  
Bazm MM, 2018, 2018 THIRD INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), P7, DOI 10.1109/FMEC.2018.8364038
[6]  
Bernstein Daniel J, 2005, CACHE TIMING ATTACKS
[7]   CacheShield: Detecting Cache Attacks through Self-Observation [J].
Briongos, Samira ;
Irazoqui, Gorka ;
Malagon, Pedro ;
Eisenbarth, Thomas .
PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, :224-235
[8]   Real time detection of cache-based side-channel attacks using hardware performance counters [J].
Chiappetta, Marco ;
Savas, Erkay ;
Yilmaz, Cemal .
APPLIED SOFT COMPUTING, 2016, 49 :1162-1174
[9]   Real-Time Detection for Cache Side Channel Attack using Performance Counter Monitor [J].
Cho, Jonghyeon ;
Kim, Taehun ;
Kim, Soojin ;
Im, Miok ;
Kim, Taehyun ;
Shin, Youngjoo .
APPLIED SCIENCES-BASEL, 2020, 10 (03)
[10]   Performance Profiling of Virtual Machines [J].
Du, Jiaqing ;
Sehrawat, Nipun ;
Zwaenepoel, Willy .
ACM SIGPLAN NOTICES, 2011, 46 (07) :3-14