2015 IEEE 35th International Conference on Distributed Computing Systems Workshops 2015
DOI: 10.1109/icdcsw.2015.28
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on the Security of Hypervisors in Cloud Computing

Abstract: This survey paper focuses on the security of hypervisors in the cloud. Topics covered in this paper include attacks that allow a malicious virtual machine (VM) to compromise the hypervisor, as well as techniques used by malicious VMs to steal more than their allocated share of physical resources, and ways to bypass the isolation between the VMs by using side-channels to steal data. Also discussed are the security requirements and architectures for hypervisors to successfully defend against such attacks.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(20 citation statements)
references
References 16 publications
0
20
0
Order By: Relevance
“…misconfiguration, design and implementation bugs) an attacker can compromise the hypervisor, evade from isolation and potentially take over all the other guests [139]. We refer to such situation as virtual machine escape [102]. Escaped VMs can access data and information belonging to other VMs [126], resulting in paramount confidentiality issues.…”
Section: Confidentialitymentioning
confidence: 99%
See 2 more Smart Citations
“…misconfiguration, design and implementation bugs) an attacker can compromise the hypervisor, evade from isolation and potentially take over all the other guests [139]. We refer to such situation as virtual machine escape [102]. Escaped VMs can access data and information belonging to other VMs [126], resulting in paramount confidentiality issues.…”
Section: Confidentialitymentioning
confidence: 99%
“…Appropriate security mechanisms are therefore required for isolating virtual machines from each other and hence preventing data leakage. Some possible techniques for isolation enforcement are described in [126], while in [102], techniques for providing integrity of VMM are reported.…”
Section: Confidentialitymentioning
confidence: 99%
See 1 more Smart Citation
“…If the code hash approach failed, a kernel data signature based approach from kernel data aspect will be used to determine the OS version. Security of hypervisors are surveyed in [23], focusing on attacks that allow a malicious virtual machine (VM) to compromise the hypervisor, as well as techniques used by the malicious VMs for hunting further allocation of physical resources, and strategies for bypassing the isolation between the VMs via side-channels. Side channel attacks bypass virtual machine isolation in the Cloud environment.…”
Section: Data Privacy and Cloud Securitymentioning
confidence: 99%
“…The metrics of the VMs and host server were collected by running the VMs on the Xen (hypervisor) [37,38], which was installed on the host server in combination with preprocessing (reported in Table 3) using Ganglia metrics software. Because these metrics exist in the form of numerical data, the numerical variables had to be transformed into their categorical counterparts (binning) before constructing their frequency table to use them as input for the network topology structure [39].…”
Section: Determination Of Network Parametersmentioning
confidence: 99%