【24h】

A proposed covert channel based on memory reclamation

机译:一种基于内存回收的隐蔽通道

获取原文
获取原文并翻译 | 示例

摘要

This paper proposes a covert channel that is specific to virtual machine monitors (VMMs); it is called VMM memory reclamation-based covert storage channel. The paper describes a prospective information leakage attack that can be launched on security-critical processes running in a targeted virtual machine (VM) using the discovered covert channel. This attack exploits a widely adopted VM dynamic memory allocation mechanism called ballooning to breach inter-VM isolation. It involves two cooperating malicious processes: the sender process and the receiver process executing in two VMs: the target VM and the attacking VM respectively. Both VMs run concurrently on top of the same bare-metal VMM. Both malicious processes have access to the dynamically-allocated shared physical memory that is managed by the VMM, and multiplexed between both VMs. The malicious processes exploit the shared memory as a communication medium to leak confidential data. Through VMM memory reclamation-based covert storage channel, the sender process and the receiver process cooperate to force the VMM to reclaim memory pages from the target VM and allocate them to the attacking VM as extra memory space, thereby leaking information from the sender process to the receiver process.
机译:本文提出了一个专用于虚拟机监视器(VMM)的秘密通道。它称为基于VMM内存回收的隐蔽存储通道。本文介绍了一种预期的信息泄漏攻击,该攻击可以使用发现的隐蔽通道在目标虚拟机(VM)中运行的安全性关键进程上启动。该攻击利用了一种广泛使用的VM动态内存分配机制,即所谓的ballooning,以破坏VM间的隔离。它涉及两个协作的恶意进程:在两个VM(分别是目标VM和攻击VM)中执行的发送方进程和接收方进程。两个VM均在同一裸机VMM上同时运行。这两个恶意进程都可以访问由VMM管理并在两个VM之间多路复用的动态分配的共享物理内存。恶意进程利用共享内存作为通信介质来泄漏机密数据。通过基于VMM内存回收的隐蔽存储通道,发送方进程和接收方进程协作以强制VMM从目标VM回收内存页,并将它们作为额外的内存空间分配给攻击VM,从而将信息从发送方进程泄漏到接收方进程。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号