首页
社区
课程
招聘
[转帖]Cross-VM Side Channels and Their Use to Extract Private Keys
发表于: 2012-10-29 14:18 1471

[转帖]Cross-VM Side Channels and Their Use to Extract Private Keys

2012-10-29 14:18
1471
Cross-VM Side Channels and Their Use to Extract Private Keys
by Yinqian Zhang, Michael K. Reiter, Ari Juels, Thomas Ristenpart
This paper details the construction of an access-driven side-channel attack by which a malicious virtual machine(VM) extracts fine-grained information from a victim VM running on the same physical computer. This attack is the first such attack demonstrated on a symmetric multiprocessing system virtualized using a modern VMM (Xen). Such systems are very common today, ranging from desktops that use virtualization to sandbox application or OS compromises, to clouds that co-locate the workloads of mutually distrustful customers. Constructing such a side-channel requires overcoming challenges including core migration, numerous sources of channel noise, and the difficulty of preempting the victim with sufficient frequency to extract fine-grained information from it. This paper addresses these challenges and demonstrates the attack in a lab setting by extracting an ElGamal decryption key from a victim using the most recent version of the libgcrypt cryptographic library.

CCS.rar

[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)

上传的附件:
收藏
免费 1
支持
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回
//