Virtualization Technology: Cross-VM Side Channel Attacks Make it Vulnerable

aut.relation.conferenceACIS 2015en_NZ
aut.researcherLitchfield, Alan
dc.contributor.authorLitchfield, Aen_NZ
dc.contributor.authorShahzad, Aen_NZ
dc.date.accessioned2019-03-07T03:45:05Z
dc.date.available2019-03-07T03:45:05Z
dc.date.copyright2015-12-18en_NZ
dc.date.issued2015-12-18en_NZ
dc.description.abstractCloud computing provides an effective business model for the deployment of IT infrastructure, platform, and software services. Often, facilities are outsourced to cloud providers and this offers the service consumer virtualization technologies without the added cost burden of development. However, virtualization introduces serious threats to service delivery such as Denial of Service (DoS) attacks, Cross-VM Cache Side Channel attacks, Hypervisor Escape and Hyper-jacking. One of the most sophisticated forms of attack is the cross-VM cache side channel attack that exploits shared cache memory between VMs. A cache side channel attack results in side channel data leakage, such as cryptographic keys. Various techniques used by the attackers to launch cache side channel attack are presented, as is a critical analysis of countermeasures against cache side channel attacks.
dc.identifier.citationPresented at the Australasian Conference on Information Systems 2015 ( arXiv:1606.01356)
dc.identifier.urihttps://hdl.handle.net/10292/12327
dc.publisherAustralasian Conference on Information Systems (ACIS)
dc.relation.urihttps://arxiv.org/abs/1606.01356
dc.rightsCopyright: © 2015 AT Litchfield and A Shahzad. This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial 3.0 Australia License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and ACIS are credited.
dc.rights.accessrightsOpenAccessen_NZ
dc.subjectCloud Computing; Virtualization; Security; Cross-VM Cache Side Channels
dc.titleVirtualization Technology: Cross-VM Side Channel Attacks Make it Vulnerableen_NZ
dc.typeConference Contribution
pubs.elements-id194091
pubs.organisational-data/AUT
pubs.organisational-data/AUT/Design & Creative Technologies
pubs.organisational-data/AUT/Design & Creative Technologies/Engineering, Computer & Mathematical Sciences
pubs.organisational-data/AUT/PBRF
pubs.organisational-data/AUT/PBRF/PBRF Design and Creative Technologies
pubs.organisational-data/AUT/PBRF/PBRF Design and Creative Technologies/PBRF ECMS
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Cross-VM Side Channel Attack-ACIS2015-Camera Final1.pdf
Size:
357.81 KB
Format:
Adobe Portable Document Format
Description:
Conference contribution
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
AUT Grant of Licence for Scholarly Commons Feb2017.pdf
Size:
239.25 KB
Format:
Adobe Portable Document Format
Description: