2013 International Conference on Cloud Computing and Big Data 2013
DOI: 10.1109/cloudcom-asia.2013.62
|View full text |Cite
|
Sign up to set email alerts
|

Exploring Virtual Machine Covert Channel via I/O Performance Interference

Abstract: The weakness of performance isolation in system virtualization leaks a time window for various kinds of attacks which can be leveraged by malicious users to threaten the security of the virtual machines (VMs) atop or construct hidden information channel. In this paper, we propose vLeaker, a practical covert timing channel built on fine-grained VM I/O performance interference, by which VMs co-resident in storage aspect can exchange the information with relatively high transmission speed and low data error rate.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2016
2016

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 20 publications
(32 reference statements)
0
1
0
Order By: Relevance
“…As a result, they have been able to achieve a bandwidth of 0.1 bit/s, which is still low but a significant improvement compared with the original bandwidth. A general transmission protocol for I/O–based CCs has been proposed by Yang et al, which they use to construct a hard disk CC, achieving 125 bit/s in a laboratory environment. Elimination would be possible by having distinct volumes per VM, which is costly and reduces scalability since the space required in the future is not predictable.…”
Section: Mapping Of Covert Channels To Cloud Componentsmentioning
confidence: 99%
“…As a result, they have been able to achieve a bandwidth of 0.1 bit/s, which is still low but a significant improvement compared with the original bandwidth. A general transmission protocol for I/O–based CCs has been proposed by Yang et al, which they use to construct a hard disk CC, achieving 125 bit/s in a laboratory environment. Elimination would be possible by having distinct volumes per VM, which is costly and reduces scalability since the space required in the future is not predictable.…”
Section: Mapping Of Covert Channels To Cloud Componentsmentioning
confidence: 99%