首页> 外文期刊>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences >Implementation of a Memory Disclosure Attack on Memory Deduplication of Virtual Machines
【24h】

Implementation of a Memory Disclosure Attack on Memory Deduplication of Virtual Machines

机译:虚拟机内存重复数据删除的内存泄露攻击的实现

获取原文
获取原文并翻译 | 示例
       

摘要

Memory deduplication improves the utilization of physical memory by sharing identical blocks of data. Although memory deduplication is most effective when many virtual machines with same operating systems run on a CPU, cross-user memory deduplication is a covert channel and causes serious memory disclosure attack. It reveals the existence of an application or file on another virtual machine. The covert channel is a difference in write access time on deduplicated memory pages that are re-created by Copy-On-Write, but it has some interferences caused by execution environments. This paper indicates that the attack includes implementation issues caused by memory alignment, self-reflection between page cache and heap, and run-time modification (swap-out, anonymous pages, ASLR, preloading mechanism, and self-modification code). However, these problems are avoidable with some techniques. In our experience on KSM (kernel samepage merging) with the KVM virtual machine, the attack could detect the security level of attacked operating systems, find vulnerable applications, and confirm the status of attacked applications.
机译:内存重复数据删除通过共享相同的数据块来提高物理内存的利用率。尽管当许多具有相同操作系统的虚拟机在CPU上运行时,内存重复数据删除是最有效的方法,但跨用户内存重复数据删除是一个秘密通道,会引起严重的内存泄露攻击。它揭示了另一个虚拟机上是否存在应用程序或文件。隐式通道是在通过写时复制重新创建的重复数据消除的内存页面上的写访问时间的差异,但它会由于执行环境而产生一些干扰。本文指出,该攻击包括内存对齐,页面缓存和堆之间的自反映以及运行时修改(交换,匿名页面,ASLR,预加载机制和自修改代码)引起的实现问题。但是,使用某些技术可以避免这些问题。根据我们在KVM虚拟机上进行KSM(内核同一页合并)的经验,这种攻击可以检测受攻击操作系统的安全级别,找到易受攻击的应用程序,并确定受攻击应用程序的状态。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号