DocumentCode :
3716750
Title :
The Impact of Hypervisor Scheduling on Compromising Virtualized Environments
Author :
Tsvetoslava Vateva-Gurova;Neeraj Suri;Avi Mendelson
Author_Institution :
Dept. of CS, Tech. Univ. Darmstadt, Darmstadt, Germany
fYear :
2015
Firstpage :
1910
Lastpage :
1917
Abstract :
A virtualized environment (VE) is expected to provide secure logical isolation across the co-located tenants encapsulated in the virtual machines. In particular the VE should prevent covert-channels exploitation stemming from the usage of shared resources. However, as sophisticated covert-and side-channel attacks exist, the logical isolation in a VE is often considered insufficient to raise concerns about the security in VEs e.g., the Cloud. Technically, the actual feasibility of such attacks strongly depends on the specific context of the execution environment and the resource allocation schemas used in the virtualization solution. Addressing these VE aspects, we detail the effect of scheduling parameters on the noise (affecting the information leakage) in the covert-channel and empirically validate the impact on the feasibility of covert-channel attacks, using a real VE.
Keywords :
"Virtual machine monitors","Security","Receivers","Timing","Cloud computing","Hardware","Processor scheduling"
Publisher :
ieee
Conference_Titel :
Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference on
Type :
conf
DOI :
10.1109/CIT/IUCC/DASC/PICOM.2015.283
Filename :
7363329
Link To Document :
بازگشت