Authors
Yinqian Zhang, Ari Juels, Michael K Reiter, Thomas Ristenpart
Publication date
2012/10/16
Book
Proceedings of the 2012 ACM conference on Computer and communications security
Pages
305-316
Description
This paper details the construction of an access-driven side-channel attack by which a malicious virtual machine (VM) extracts fine-grained information from a victim VM running on the same physical computer. This attack is the first such attack demonstrated on a symmetric multiprocessing system virtualized using a modern VMM (Xen). Such systems are very common today, ranging from desktops that use virtualization to sandbox application or OS compromises, to clouds that co-locate the workloads of mutually distrustful customers. Constructing such a side-channel requires overcoming challenges including core migration, numerous sources of channel noise, and the difficulty of preempting the victim with sufficient frequency to extract fine-grained information from it. This paper addresses these challenges and demonstrates the attack in a lab setting by extracting an ElGamal decryption key from a victim using the …
Total citations
2011201220132014201520162017201820192020202120222023202433691051289911298118927361549
Scholar articles
Y Zhang, A Juels, MK Reiter, T Ristenpart - Proceedings of the 2012 ACM conference on …, 2012