Proceedings of the 2012 ACM Conference on Computer and Communications Security 2012
DOI: 10.1145/2382196.2382230
|View full text |Cite
|
Sign up to set email alerts
|

Cross-VM side channels and their use to extract private keys

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
351
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 593 publications
(352 citation statements)
references
References 26 publications
1
351
0
Order By: Relevance
“…Kocher's suggestion that this class of attacks might be feasible has been more than borne out; see Acıiçmez and Koç's extensive survey [1], which describes attacks that take advantage of the data cache, the instruction cache, the branch prediction unit, and functional unit contention. Unlike simple timing attacks, microarchitectural timing attacks usually require an observer process to run on the same machine as the victim; virtualmachine co-tenancy in a cloud environment can suffice [53].…”
Section: Related Workmentioning
confidence: 99%
“…Kocher's suggestion that this class of attacks might be feasible has been more than borne out; see Acıiçmez and Koç's extensive survey [1], which describes attacks that take advantage of the data cache, the instruction cache, the branch prediction unit, and functional unit contention. Unlike simple timing attacks, microarchitectural timing attacks usually require an observer process to run on the same machine as the victim; virtualmachine co-tenancy in a cloud environment can suffice [53].…”
Section: Related Workmentioning
confidence: 99%
“…DoS attacks can be performed by overloading physical resources of a cloud node or through the virtual network [38]. Cross-VM side channel attacks can be performed by examining the behavior of virtual or physical hardware modules, such as the L2 cache [53], and deducing information about the state of other VMs. Additionally, an infected VM might try to escape the hypervisor using different mechanisms such as privilege escalation or memory brute force attacks.…”
Section: Threat Modelmentioning
confidence: 99%
“…Such behavior usually indicates an in-guest agent attempting to detect the presence of out-of-guest monitors [8]. Furthermore, the rapid querying of the TSC has also been used during side-channel attacks [53].…”
Section: Intrusion Detection and Analysismentioning
confidence: 99%
“…Even proposed hardware solutions can be probed by making benign writes to potentially sensitive addresses and then observing disruptions to unrelated I/O timings. Given the long history of TOCTTOU and other concurrency-based attacks [29,92], combined with a likely timing channel induced by the search mechanism and recent successes exploiting VM-level side channels [94], the risk of an attacker successfully racing with a detector is concerning.…”
Section: B Dynamic Kernel Object Manipulationmentioning
confidence: 99%