Memory Deduplication as a Protective Factor in Virtualized Systems

被引:2
作者
Albalawi, Abdullah [1 ]
Vassilakis, Vassilios [1 ]
Calinescu, Radu [1 ]
机构
[1] Univ York, Dept Comp Sci, York, N Yorkshire, England
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2021 | 2021年 / 12809卷
关键词
Side-channel attacks; Memory deduplication; Flush plus reload; Flush plus flush; SIDE-CHANNEL ATTACKS; CLOUD;
D O I
10.1007/978-3-030-81645-2_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce a method for protection against a side-channel attack made possible by the use of a cloud-computing feature called memory deduplication. Memory deduplication improves the efficiency with which physical memory is used by the virtual machines (VMs) running on the same server by keeping in memory only one copy of the libraries and other software used by multiple VMs. However, this allows an attacker's VM to find out the memory locations (and thus the operations) used by a victim's VM, as these locations are cached and can be accessed faster than memory locations not used by the victim. To perform the attack, the malicious VM needs to execute an abnormal sequence of cache flushes, and our new method detects this by monitoring memory locations associated with sensitive (e.g., encryption) operations and using logistic regression to identify the abnormal cached operations. Furthermore, by using its own cache flushing, our method disrupts the side channel, making it more difficult for the attacker to acquire useful information. The experiments we ran using the KVM hypervisor and Ubuntu 18.04 LTS VMs on both Debian 10 and CentOS physical servers show that our method can detect attacks with 99% accuracy, and can feed fake information to an attacker with between 2-8% CPU overheads.
引用
收藏
页码:301 / 317
页数:17
相关论文
共 37 条
[11]   Success Factors for Deploying Cloud Computing [J].
Garrison, Gary ;
Kim, Sanghyun ;
Wakefield, Robin L. .
COMMUNICATIONS OF THE ACM, 2012, 55 (09) :62-68
[12]  
Gruss D, 2016, LECT NOTES COMPUT SC, V9721, P279, DOI 10.1007/978-3-319-40667-1_14
[13]   Cache Games - Bringing Access-Based Cache Attacks on AES to Practice [J].
Gullasch, David ;
Bangerter, Endre ;
Krenn, Stephan .
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, :490-505
[14]  
Gulmezoglu B., 2019, ARXIV PREPRINT ARXIV
[15]  
Hand S., 2011, P 4 EUR WORKSH SYST
[16]  
Hat R, 2 2 VIRTUAL PERFORMA
[17]  
Hornby T., 2016, SIDE CHANNEL ATTACKS
[18]  
Hussain Syed Asad, 2017, Applied Computing and Informatics, V13, P57, DOI 10.1016/j.aci.2016.03.001
[19]  
Irazoqui Gorka, 2014, Research in Attacks, Intrusions and Defenses. 17th International Symposium (RAID 2014). Proceedings: LNCS 8688, P299, DOI 10.1007/978-3-319-11379-1_15
[20]   Fine Grain Cross-VM Attacks on Xen and VMware [J].
Irazoqui, Gorka ;
Inci, Mehmet Sinan ;
Eisenbarth, Thomas ;
Sunar, Berk .
2014 IEEE FOURTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING (BDCLOUD), 2014, :737-744