Visible to the public A Memory-Deduplication Side-Channel Attack to Detect Applications in Co-Resident Virtual Machines

TitleA Memory-Deduplication Side-Channel Attack to Detect Applications in Co-Resident Virtual Machines
Publication TypeConference Paper
Year of Publication2018
AuthorsLindemann, Jens, Fischer, Mathias
Conference NameProceedings of the 33rd Annual ACM Symposium on Applied Computing
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5191-1
Keywordscloud computing, composability, cryptography, cyber physical systems, pubcrawl, Resiliency, security, Side-channel attack, virtual machine security, virtualization
Abstract

Virtualization offers the possibility of hosting services of multiple customers on shared hardware. When more than one Virtual Machine (VM) run on the same host, memory deduplication can save physical memory by merging identical pages of the VMs. However, this comes at the cost of leaking information between VMs. Based on that, we propose a novel timing-based side-channel attack that allows to identify software versions running in co-resident VMs or on the host. Our attack tests for the existence of memory pages in co-resident VMs that are unique among all versions of the respective software. Our evaluation results indicate that with few repetitions of our attack we can precisely identify software versions within reasonable time frames.

URLhttps://dl.acm.org/citation.cfm?doid=3167132.3167151
DOI10.1145/3167132.3167151
Citation KeylindemannMemorydeduplicationSidechannelAttack2018