-
-
[转帖]Cross-VM Side Channels and Their Use to Extract Private Keys
-
发表于: 2012-10-29 14:18 1487
-
Cross-VM Side Channels and Their Use to Extract Private Keys
by Yinqian Zhang, Michael K. Reiter, Ari Juels, Thomas Ristenpart
CCS.rar
by Yinqian Zhang, Michael K. Reiter, Ari Juels, Thomas Ristenpart
This paper details the construction of an access-driven side-channel attack by which a malicious virtual machine(VM) extracts fine-grained information from a victim VM running on the same physical computer. This attack is the first such attack demonstrated on a symmetric multiprocessing system virtualized using a modern VMM (Xen). Such systems are very common today, ranging from desktops that use virtualization to sandbox application or OS compromises, to clouds that co-locate the workloads of mutually distrustful customers. Constructing such a side-channel requires overcoming challenges including core migration, numerous sources of channel noise, and the difficulty of preempting the victim with sufficient frequency to extract fine-grained information from it. This paper addresses these challenges and demonstrates the attack in a lab setting by extracting an ElGamal decryption key from a victim using the most recent version of the libgcrypt cryptographic library.
CCS.rar
赞赏
他的文章
看原图
赞赏
雪币:
留言: