30th IEEE International Performance Computing and Communications Conference 2011
DOI: 10.1109/pccc.2011.6108094
|View full text |Cite
|
Sign up to set email alerts
|

Non-interactive OS fingerprinting through memory de-duplication technique in virtual machines

Abstract: OS fingerprinting tries to identify the type and version of a system based on gathered information of a target host. It is an essential step for many subsequent penetration attempts and attacks. Traditional OS fingerprinting depends on banner grabbing schemes or network traffic analysis results to identify the system. These interactive procedures can be detected by intrusion detection systems (IDS) or fooled by fake network packets. In this paper, we propose a new OS fingerprinting mechanism in virtual machine… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 35 publications
(25 citation statements)
references
References 13 publications
(12 reference statements)
0
20
0
Order By: Relevance
“…A small but growing handful of works have explored side channels in settings characteristic of IaaS clouds, to which tenants deploy tasks in the form of virtual machines (VMs). Demonstrated attacks include side channels by which an attacker VM can extract coarse load measurements of a victim VM with which it is co-located [32]; identify pages it shares with a co-located victim VM, allowing it to detect victim VM applications, downloaded files [33] and its operating system (OS) [29]; and even exfiltrate a victim VM's private decryption key [40]. However, only the first of these attacks was demonstrated on a public cloud, with the others being demonstrated in lab settings.…”
Section: Introductionmentioning
confidence: 99%
“…A small but growing handful of works have explored side channels in settings characteristic of IaaS clouds, to which tenants deploy tasks in the form of virtual machines (VMs). Demonstrated attacks include side channels by which an attacker VM can extract coarse load measurements of a victim VM with which it is co-located [32]; identify pages it shares with a co-located victim VM, allowing it to detect victim VM applications, downloaded files [33] and its operating system (OS) [29]; and even exfiltrate a victim VM's private decryption key [40]. However, only the first of these attacks was demonstrated on a public cloud, with the others being demonstrated in lab settings.…”
Section: Introductionmentioning
confidence: 99%
“…An implementation of the key extraction attack was presented in [23]. The delay caused by separation of deduplicated memory pages in virtual machines has been used to identify guest OS types [13] or derive out memory page contents [24].…”
Section: A Information Leakage Among Virtual Machinesmentioning
confidence: 99%
“…We will access the pages of F1 and F2 regularly to keep them in the main memory. We can estimate the progress of deduplication based on our previous research [13]. When this procedure is finished, we can initiate "writing" operations to the pages.…”
Section: Basic Ideas Of the Proposed Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…Fingerprinting has become a popular method for device identification, and has been used to identify home electronics [38], websites [39], [40], [41], [42], [43], [44], the operating system of VMs [45], [46], and the source of phone calls [47]. The concept of fingerprinting stems from leveraging measurable signals caused by hardware imperfections in analog circuitry to uniquely identify devices.…”
Section: A Fingerprintingmentioning
confidence: 99%