Security Implications of Memory Deduplication in a Virtualized Environment

被引:0
|
作者
Xiao, Jidong [1 ]
Xu, Zhang [1 ]
Huang, Hai [2 ]
Wang, Haining [1 ]
机构
[1] Coll William & Mary, Williamsburg, VA 23186 USA
[2] IBM Corp, TJ Watson Res Ctr, Hawthorne, NY USA
来源
2013 43RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN) | 2013年
基金
美国国家科学基金会;
关键词
ROOTKITS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Memory deduplication has been widely used in various commodity hypervisors. By merging identical memory contents, it allows more virtual machines to run concurrently on top of a hypervisor. However, while this technique improves memory efficiency, it has a large impact on system security. In particular, memory deduplication is usually implemented using a variant of copy-on-write techniques, for which, writing to a shared page would incur a longer access time than those non-shared. In this paper, we investigate the security implication of memory deduplication from the perspectives of both attackers and defenders. On one hand, using the artifact above, we demonstrate two new attacks to create a covert channel and detect virtualization, respectively. On the other hand, we also show that memory deduplication can be leveraged to safeguard Linux kernel integrity.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Virtualized and Flexible ECC for Main Memory
    Yoon, Doe Hyun
    Erez, Mattan
    ACM SIGPLAN NOTICES, 2010, 45 (03) : 397 - 408
  • [32] Implementation of a Memory Disclosure Attack on Memory Deduplication of Virtual Machines
    Suzaki, Kuniyasu
    Iijima, Kengo
    Yagi, Toshiki
    Artho, Cyrille
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 215 - 224
  • [33] Virtualized and Flexible ECC for Main Memory
    Yoon, Doe Hyun
    Erez, Mattan
    ASPLOS XV: FIFTEENTH INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS, 2010, : 397 - 408
  • [34] Filesystem Layout Reorganization in Virtualized Environment
    Yamada, Masaya
    Yamaguchi, Saneyasu
    2012 9TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INTELLIGENCE & COMPUTING AND 9TH INTERNATIONAL CONFERENCE ON AUTONOMIC & TRUSTED COMPUTING (UIC/ATC), 2012, : 501 - 508
  • [35] vMerger: Server Consolidation in Virtualized Environment
    Deng, Li
    Jin, Hai
    Wu, Song
    2013 IEEE 11TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC), 2013, : 606 - 612
  • [36] Revisiting Memory Management on Virtualized Environments
    Wang, Xiaolin
    Weng, Lingmei
    Wang, Zhenlin
    Luo, Yingwei
    ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2013, 10 (04)
  • [37] VSWAPPER: A Memory Swapper for Virtualized Environments
    Amit, Nadav
    Tsafrir, Dan
    Schuster, Assaf
    ACM SIGPLAN NOTICES, 2014, 49 (04) : 349 - 365
  • [38] Common Virtualized Environment in Telematics Labs
    Fernandez, F. J.
    Sierra, A. J.
    Ariza, T.
    Madinabeitia, G.
    Vozmediano, J. M.
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2013, 9 (09) : 25 - 31
  • [39] Application Performance Modeling in a Virtualized Environment
    Kundu, Sajib
    Rangaswami, Raju
    Dutta, Kaushik
    Zhao, Ming
    HPCA-16 2010: SIXTEENTH INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, PROCEEDINGS, 2010, : 319 - +
  • [40] On the Cost of Measuring Traffic in a Virtualized Environment
    Gogunska, Karyna
    Barakat, Chadi
    Urvoy-Keller, Guillaume
    Lopez-Pacheco, Dino
    2018 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2018,