A proposed covert channel based on memory reclamation
dc.Affiliation | October University for modern sciences and Arts (MSA) | |
dc.contributor.author | Hussein, Omar | |
dc.contributor.author | Hamza, Nermin | |
dc.contributor.author | Hefny, Hesham | |
dc.date.accessioned | 2020-02-13T10:34:00Z | |
dc.date.available | 2020-02-13T10:34:00Z | |
dc.date.issued | 2015 | |
dc.description | MSA Google Scholar | en_US |
dc.description.abstract | This paper proposes a covert channel that is specific to virtual machine monitors (VMMs); it is called VMM memory reclamation-based covert storage channel. The paper describes a prospective information leakage attack that can be launched on security-critical processes running in a targeted virtual machine (VM) using the discovered covert channel. This attack exploits a widely adopted VM dynamic memory allocation mechanism called ballooning to breach inter-VM isolation. It involves two cooperating malicious processes: the sender process and the receiver process executing in two VMs: the target VM and the attacking VM respectively. Both VMs run concurrently on top of the same bare-metal VMM. Both malicious processes have access to the dynamically-allocated shared physical memory that is managed by the VMM, and multiplexed between both VMs. The malicious processes exploit the shared memory as a communication medium to leak confidential data. Through VMM memory reclamation-based covert storage channel, the sender process and the receiver process cooperate to force the VMM to reclaim memory pages from the target VM and allocate them to the attacking VM as extra memory space, thereby leaking information from the sender process to the receiver process. | en_US |
dc.description.sponsorship | IEEE | en_US |
dc.description.uri | https://www.scimagojr.com/journalsearch.php?q=21100463145&tip=sid&clean=0 | |
dc.identifier.citation | 1. J. Smith, R. Nair, Virtual Machines: Versatile Platforms for Systems and Processes, San Francisco:Morgan kaukfmann Publishers, 2005. Show Context Google Scholar 2. W. Hagen, Professional Xen Virtualization, Indiana:Wiley Publishing, 2008. Show Context Google Scholar 3. "Amazon Web Services", Amazon elastic compute cloud, 2013, [online] Available: http://aws.amazon.com/ec2/. Show Context Google Scholar 4. "Trusted Computer System Evaluation Criteria, United States Department of Defense Standard", 1985. Show Context 5. T. Ristenpart, E. Tromer, H. Shacham, S. Savage, "Hey you get off of my cloud: exploring information leakage in third-party compute clouds", Proc. CCS'09, pp. 199-212, 2009. Show Context Access at ACM Google Scholar 6. K. Okamura, Y. Oyama, "Load-based covert channels between Xen virtual machines", Proc. SAC'10, pp. 173-180, 2010. Show Context Access at ACM Google Scholar 7. C. Waldspurger, "Memory resource management in VMware ESX server", Proc. OSDI'02, pp. 181-194, 2002. Show Context Access at ACM Google Scholar 8. P. Barham et al., "Xen and the art of virtualization", Proc. SOSP‘03, pp. 164-177, 2003. Show Context Access at ACM Google Scholar 9. I. Banerjee, P. Moltmann, K. Tati, R. Venkatasubramanian, "VMware ESX memory resource management: swap", 2014, [online] Available: https://labs.vmware.com/vmtj/vmware-esx-memory-resource-management-swap. | en_US |
dc.identifier.doi | https://doi.org/10.1109/IntelCIS.2015.7397244 | |
dc.identifier.isbn | 978-1-5090-1949-6 | |
dc.identifier.other | https://doi.org/10.1109/IntelCIS.2015.7397244 | |
dc.identifier.uri | https://t.ly/g7202 | |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartofseries | Intelligent Computing and Information Systems (ICICIS), 2015 IEEE Seventh International Conference on;Pages: 343-347 | |
dc.subject | October University for University of Hardware , Internet , Read only memory | en_US |
dc.title | A proposed covert channel based on memory reclamation | en_US |
dc.type | Book chapter | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- avatar_scholar_256.png
- Size:
- 6.31 KB
- Format:
- Portable Network Graphics
- Description:
- Faculty Of Computer Science Research Paper
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 51 B
- Format:
- Item-specific license agreed upon to submission
- Description: