DocumentCode :
3680238
Title :
WindTalker: An Efficient and Robust Protocol of Cloud Covert Channel Based on Memory Deduplication
Author :
Hong Rong;Huimei Wang;Jian Liu;Xiaochen Zhang;Ming Xian
Author_Institution :
State Key Lab. of Complex Electromagn. Environ. Effects on Electron. &
fYear :
2015
Firstpage :
68
Lastpage :
75
Abstract :
As information security and privacy are primary concerns for most enterprises and individuals, a threat called Cross-VM (Virtual Machine) Attack certainly impedes their adoption of public or hybrid cloud computing. Specifically, Cross-VM Attack enables hostile tenants to leverage various forms of covert channels to exfiltrate sensitive information of victims on the same physical host. A new covert channel has been demonstrated by exploiting a special feature of memory deduplication which is widely used in virtualization products, that is, writing to a shared page would incur longer access delay than those non-shared. However, this sort of covert channel attack is merely considered as "potential threat" due to lack of practical protocol. In this paper, we study how to design an efficient and reliable protocol of CCCMD (Cloud Covert Channel based on Memory Deduplication). We first analyze the CCCMD working scheme in a virtualized environment, and uncover its major defects and implementation difficulties. We then build a prototype named WindTalker which overcomes these obstacles. Our experiments show that WindTalker performs much better with lower bit error rate and achieves a reasonable transmission speed adaptive to noisy environment.
Keywords :
"Receivers","Protocols","Merging","Delays","Synchronization","Encoding","Uncertainty"
Publisher :
ieee
Conference_Titel :
Big Data and Cloud Computing (BDCloud), 2015 IEEE Fifth International Conference on
Type :
conf
DOI :
10.1109/BDCloud.2015.12
Filename :
7310718
Link To Document :
بازگشت