A Memory-Deduplication Side-Channel Attack to Detect Applications in Co-Resident Virtual Machines
Title | A Memory-Deduplication Side-Channel Attack to Detect Applications in Co-Resident Virtual Machines |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Lindemann, Jens, Fischer, Mathias |
Conference Name | Proceedings of the 33rd Annual ACM Symposium on Applied Computing |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-5191-1 |
Keywords | cloud computing, composability, cryptography, cyber physical systems, pubcrawl, Resiliency, security, Side-channel attack, virtual machine security, virtualization |
Abstract | Virtualization offers the possibility of hosting services of multiple customers on shared hardware. When more than one Virtual Machine (VM) run on the same host, memory deduplication can save physical memory by merging identical pages of the VMs. However, this comes at the cost of leaking information between VMs. Based on that, we propose a novel timing-based side-channel attack that allows to identify software versions running in co-resident VMs or on the host. Our attack tests for the existence of memory pages in co-resident VMs that are unique among all versions of the respective software. Our evaluation results indicate that with few repetitions of our attack we can precisely identify software versions within reasonable time frames. |
URL | https://dl.acm.org/citation.cfm?doid=3167132.3167151 |
DOI | 10.1145/3167132.3167151 |
Citation Key | lindemannMemorydeduplicationSidechannelAttack2018 |