Load-based covert channels between Xen virtual machines
- 22 March 2010
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 173-180
- https://doi.org/10.1145/1774088.1774125
Abstract
Multiple virtual machines on a single virtual machine monitor are isolated from each other. A malicious user on one virtual machine usually cannot relay secret data to other virtual machines without using explicit communication media such as shared files or a network. However, this isolation is threatened by communication in which CPU load is used as a covert channel. Unfortunately, this threat has not been fully understood or evaluated. In this study, we quantitatively evaluate the threat of CPU-based covert channels between virtual machines on the Xen hypervisor. We have developed CCCV, a system that creates a covert channel and communicates data secretly using CPU loads. CCCV consists of two user processes, a sender and a receiver. The sender runs on one virtual machine, and the receiver runs on another virtual machine on the same hypervisor. We measured the bandwidth and communication accuracy of the covert channel. CCCV communicated 64-bit data with a 100% success rate in an ideal environment, and with a success rate of over 90% in an environment where Web servers are processing requests on other virtual machines.Keywords
Funding Information
- KAKENHI (19700024)
This publication has 10 references indexed in Scilit:
- Hey, you, get off of my cloudPublished by Association for Computing Machinery (ACM) ,2009
- Managing the risk of covert information flows in virtual machine systemsPublished by Association for Computing Machinery (ACM) ,2007
- Quantifying the performance isolation properties of virtualization systemsPublished by Association for Computing Machinery (ACM) ,2007
- Container-based operating system virtualizationPublished by Association for Computing Machinery (ACM) ,2007
- Covert and Side Channels Due to Processor ArchitecturePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Building a MAC-Based Security Architecture for the Xen Open-Source HypervisorPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Cache Attacks and Countermeasures: The Case of AESPublished by Springer Nature ,2006
- Xen and the art of virtualizationPublished by Association for Computing Machinery (ACM) ,2003
- Reducing timing channels with fuzzy timePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A note on the confinement problemCommunications of the ACM, 1973