首页
社区
课程
招聘
[转帖]Cross-VM Side Channels and Their Use to Extract Private Keys
发表于: 2012-10-29 14:18 1576

[转帖]Cross-VM Side Channels and Their Use to Extract Private Keys

2012-10-29 14:18
1576
Cross-VM Side Channels and Their Use to Extract Private Keys
by Yinqian Zhang, Michael K. Reiter, Ari Juels, Thomas Ristenpart
This paper details the construction of an access-driven side-channel attack by which a malicious virtual machine(VM) extracts fine-grained information from a victim VM running on the same physical computer. This attack is the first such attack demonstrated on a symmetric multiprocessing system virtualized using a modern VMM (Xen). Such systems are very common today, ranging from desktops that use virtualization to sandbox application or OS compromises, to clouds that co-locate the workloads of mutually distrustful customers. Constructing such a side-channel requires overcoming challenges including core migration, numerous sources of channel noise, and the difficulty of preempting the victim with sufficient frequency to extract fine-grained information from it. This paper addresses these challenges and demonstrates the attack in a lab setting by extracting an ElGamal decryption key from a victim using the most recent version of the libgcrypt cryptographic library.

CCS.rar

[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课

上传的附件:
收藏
免费 1
支持
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回