Towards a framework for assessing the feasibility of side-channel attacks in virtualized environments

Vateva-Gurova, T. and Luna, J. and Pellegrino, G. and Suri, Neeraj (2014) Towards a framework for assessing the feasibility of side-channel attacks in virtualized environments. In: 2014 11th International Conference on Security and Cryptography (SECRYPT) :. IEEE, pp. 113-124. ISBN 9781467392402

Full text not available from this repository.

Abstract

Physically co-located virtual machines should be securely isolated from one another, as well as from the underlying layers in a virtualized environment. In particular the virtualized environment is supposed to guarantee the impossibility of an adversary to attack a virtual machine e.g., by exploiting a side-channel stemming from the usage of shared physical or software resources. However, this is often not the case and the lack of sufficient logical isolation is considered a key concern in virtualized environments. In the academic world this view has been reinforced during the last years by the demonstration of sophisticated side-channel attacks (SCAs). In this paper we argue that the feasibility of executing a SCA strongly depends on the actual context of the execution environment. To reflect on these observations, we propose a feasibility assessment framework for SCAs using cache based systems as an example scenario. As a proof of concept we show that the feasibility of cache-based side-channel attacks can be assessed following the proposed approach.

Item Type:
Contribution in Book/Report/Proceedings
Subjects:
?? feasibility analysisfeasibility factorssecurity classificationsside-channel attacksjava programming languageexecution environmentsfeasibility assessmentsecurity classificationside channel attacksoftware resourcesvirtualized environmentvirtual reality ??
ID Code:
137505
Deposited By:
Deposited On:
14 Oct 2019 13:46
Refereed?:
Yes
Published?:
Published
Last Modified:
16 Jul 2024 04:45