𝔖 Bobbio Scriptorium
✦   LIBER   ✦

[ACM Press the 3rd ACM workshop - Chicago, Illinois, USA (2011.10.21-2011.10.21)] Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW '11 - An exploration of L2 cache covert channels in virtualized environments

✍ Scribed by Xu, Yunjing; Bailey, Michael; Jahanian, Farnam; Joshi, Kaustubh; Hiltunen, Matti; Schlichting, Richard


Book ID
126987827
Publisher
ACM Press
Year
2011
Tongue
English
Weight
595 KB
Category
Article
ISBN
1450310044

No coin nor oath required. For personal study only.

✦ Synopsis


Recent exploration into the unique security challenges of cloud computing have shown that when virtual machines belonging to different customers share the same physical machine, new forms of cross-VM covert channel communication arise. In this paper, we explore one of these threats, L2 cache covert channels, and demonstrate the limits of these this threat by providing a quantification of the channel bit rates and an assessment of its ability to do harm. Through progressively refining models of cross-VM covert channels from the derived maximums, to implementable channels in the lab, and finally in Amazon EC2 itself we show how a variety of factors impact our ability to create effective channels. While we demonstrate a covert channel with considerably higher bit rate than previously reported, we assess that even at such improved rates, the harm of data exfiltration from these channels is still limited to the sharing of small, if important, secrets such as private keys.


πŸ“œ SIMILAR VOLUMES


[ACM Press the 3rd ACM workshop - Chicag
✍ Brown, Andrew; Chase, Jeffrey S. πŸ“‚ Article πŸ“… 2011 πŸ› ACM Press 🌐 English βš– 481 KB

The applications we use are increasingly packaged as network services running in the cloud under the control of a service provider. Users of these services have no basis to determine if these services are trustworthy, beyond the assurances of the service provider. Our work addresses the problem of h