2014 IEEE Symposium on Security and Privacy 2014
DOI: 10.1109/sp.2014.42
|View full text |Cite
|
Sign up to set email alerts
|

Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG

Abstract: Abstract-Virtualized environments are widely thought to cause problems for software-based random number generators (RNGs), due to use of virtual machine (VM) snapshots as well as fewer and believed-to-be lower quality entropy sources. Despite this, we are unaware of any published analysis of the security of critical RNGs when running in VMs. We fill this gap, using measurements of Linux's RNG systems (without the aid of hardware RNGs, the most common use case today) on Xen, VMware, and Amazon EC2. Despite CPU … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 26 publications
(11 citation statements)
references
References 13 publications
(31 reference statements)
0
11
0
Order By: Relevance
“…Our initiator client offered a set of cipher suites chosen from the most commonly supported options observed by Adrian et al [3]. 17 We tested this packet on the default configuration of our vulnerable NetScreen device to verify that it was accepted.…”
Section: Counting Screenos Devicesmentioning
confidence: 99%
See 1 more Smart Citation
“…Our initiator client offered a set of cipher suites chosen from the most commonly supported options observed by Adrian et al [3]. 17 We tested this packet on the default configuration of our vulnerable NetScreen device to verify that it was accepted.…”
Section: Counting Screenos Devicesmentioning
confidence: 99%
“…As new use cases arose, the security desiderata have been revised and expanded. For example, Ristenpart and Yilek analyzed application-level randomness reuse in virtual machines whose state is reset and rolled back [38], and Everspaugh et al [17] extended the analysis to kernel-level randomness.…”
Section: Related Workmentioning
confidence: 99%
“…Realistic initialization: Relatedly, the current PWI formalism cannot model setup procedures, such as those used by the ISK-RNG. Addressing this shortcoming is particularly important since weak initialization has led to attacks on real-world PWIs [9,6]; security definitions should expose these vulnerabilities.…”
Section: Improvements To the Pwi Modelmentioning
confidence: 99%
“…The variety of seed values created in this way satisfies the security requirements of the initialization process as described by the National Institute of Standards and Technology (NIST) [2]. The security of entropy sources is a research topic in the areas of operating system virtualization and cloud services [4]- [10]. However, with respect to the design of deterministic random generators as microelectronic systems, this problem has not been sufficiently studied in the literature.…”
Section: Introductionmentioning
confidence: 99%