TY - GEN
T1 - An exploration of L2 cache covert channels in virtualized environments
AU - Xu, Yunjing
AU - Bailey, Michael
AU - Jahanian, Farnam
AU - Joshi, Kaustubh
AU - Hiltunen, Matti
AU - Schlichting, Richard
PY - 2011
Y1 - 2011
N2 - Recent exploration into the unique security challenges of cloud computing have shown that when virtual machines belonging to different customers share the same physical machine, new forms of cross-VM covert channel communication arise. In this paper, we explore one of these threats, L2 cache covert channels, and demonstrate the limits of these this threat by providing a quantification of the channel bit rates and an assessment of its ability to do harm. Through progressively refining models of cross-VM covert channels from the derived maximums, to implementable channels in the lab, and finally in Amazon EC2 itself we show how a variety of factors impact our ability to create effective channels. While we demonstrate a covert channel with considerably higher bit rate than previously reported, we assess that even at such improved rates, the harm of data exfiltration from these channels is still limited to the sharing of small, if important, secrets such as private keys.
AB - Recent exploration into the unique security challenges of cloud computing have shown that when virtual machines belonging to different customers share the same physical machine, new forms of cross-VM covert channel communication arise. In this paper, we explore one of these threats, L2 cache covert channels, and demonstrate the limits of these this threat by providing a quantification of the channel bit rates and an assessment of its ability to do harm. Through progressively refining models of cross-VM covert channels from the derived maximums, to implementable channels in the lab, and finally in Amazon EC2 itself we show how a variety of factors impact our ability to create effective channels. While we demonstrate a covert channel with considerably higher bit rate than previously reported, we assess that even at such improved rates, the harm of data exfiltration from these channels is still limited to the sharing of small, if important, secrets such as private keys.
KW - Bit rate
KW - Covert channel
UR - http://www.scopus.com/inward/record.url?scp=80955157902&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=80955157902&partnerID=8YFLogxK
U2 - 10.1145/2046660.2046670
DO - 10.1145/2046660.2046670
M3 - Conference contribution
AN - SCOPUS:80955157902
SN - 9781450310048
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 29
EP - 39
BT - CCSW'11 - Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop
T2 - 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW'11, Co-located with the 18th ACM Conference on Computer and Communications Security, CCS 2011
Y2 - 21 October 2011 through 21 October 2011
ER -