首页> 外文会议>2012 IEEE 25th computer security foundations symposium >Cache-Leakage Resilient OS Isolation in an Idealized Model of Virtualization
【24h】

Cache-Leakage Resilient OS Isolation in an Idealized Model of Virtualization

机译:理想化的虚拟化模型中的缓存泄漏弹性操作系统隔离

获取原文
获取原文并翻译 | 示例

摘要

Virtualization platforms allow multiple operating systems to run on the same hardware. One of their central goal is to provide strong isolation between guest operating systems, unfortunately, they are often vulnerable to practical side-channel attacks. Cache attacks are a common class of side-channel attacks that use the cache as a side channel. We formalize an idealized model of virtualization that features the cache and the Translation Look aside Buffer (TLB), and that provides an abstract treatment of cache-based side-channels. We then use the model for reasoning about cache-based attacks and countermeasures, and for proving that isolation between guest operating systems can be enforced by flushing the cache upon context switch. In addition, we show that virtualized platforms are transparent, i.e. a guest operating system cannot distinguish whether it executes alone or together with other guest operating systems on the platform. The models and proofs have been machine-checked in the Coqproof assistant.
机译:虚拟化平台允许多个操作系统在同一硬件上运行。他们的主要目标之一是在来宾操作系统之间提供强大的隔离,但不幸的是,它们通常容易受到实际的边信道攻击。高速缓存攻击是将高速缓存用作辅助通道的常见一类旁路攻击。我们对理想化的虚拟化模型进行形式化,该模型具有缓存和转换后备缓冲区(TLB),并提供了对基于缓存的辅助通道的抽象处理。然后,我们使用该模型对基于缓存的攻击和对策进行推理,并证明可以通过在上下文切换时刷新缓存来实现来宾操作系统之间的隔离。此外,我们显示虚拟化平台是透明的,即来宾操作系统无法区分它是单独执行还是与平台上的其他来宾操作系统一起执行。模型和样张已在Coqproof助手中进行了机器检查。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号