2018 IEEE 11th International Conference on Cloud Computing (CLOUD) 2018
DOI: 10.1109/cloud.2018.00084
|View full text |Cite
|
Sign up to set email alerts
|

A Cross-Virtual Machine Network Channel Attack via Mirroring and TAP Impersonation

Abstract: Data privacy and security is a leading concern for providers and customers of cloud computing, where Virtual Machines (VMs) can co-reside within the same underlying physical machine. Side channel attacks within multi-tenant virtualized cloud environments are an established problem, where attackers are able to monitor and exfiltrate data from co-resident VMs. Virtualization services have attempted to mitigate such attacks by preventing VM-to-VM interference on shared hardware by providing logical resource isola… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 15 publications
(8 reference statements)
0
4
0
Order By: Relevance
“…The findings of this investigation reveal that AES implementations in popular libraries and data encrypted with AES on primary cloud services still pose a security concern. Saeed et al [13] presented the zero-day cross-VM network channel attacks in their study where simulated internal cloud virtual network. Malicious VMs reroute network traffic to target VMs in the initial stages of attacks, and promptly, like Air cracks, use this opportunity to extract decrypted information of target VMs.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The findings of this investigation reveal that AES implementations in popular libraries and data encrypted with AES on primary cloud services still pose a security concern. Saeed et al [13] presented the zero-day cross-VM network channel attacks in their study where simulated internal cloud virtual network. Malicious VMs reroute network traffic to target VMs in the initial stages of attacks, and promptly, like Air cracks, use this opportunity to extract decrypted information of target VMs.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The attack of hypervisor on VM data is not considered in this work. Saeed et al (2018) introduced a new attack by malicious VM using TAP impersonation and mirroring to redirect and monitor network traffic of other VM. These attacks are very difficult to monitor as the malicious VM is not violating any resource capacity.…”
Section: IImentioning
confidence: 99%
“…The attack scenario and its steps are shown in Figure 4. Cloud providers permit bridging of a TAP interface that has no valid private Ethernet interface at the backend is the main vulnerability in the network architecture [15]. A cloud provider does not allow the bridging of a TAP interface that does not have a private Ethernet interface at the backend.…”
Section: Impersonation Attackmentioning
confidence: 99%
“…This paper is an extension of our conference paper [15], which proposed a novel zero-day network channel attack for redirecting the traffic of other co-located VMs. In this attack, the created dummy interface impersonates a TAP (Test Access Point) device.…”
Section: Introductionmentioning
confidence: 99%