Virtualization Technology: Cross-VM Side Channel Attacks Make it Vulnerable
aut.relation.conference | ACIS 2015 | en_NZ |
aut.researcher | Litchfield, Alan | |
dc.contributor.author | Litchfield, A | en_NZ |
dc.contributor.author | Shahzad, A | en_NZ |
dc.date.accessioned | 2019-03-07T03:45:05Z | |
dc.date.available | 2019-03-07T03:45:05Z | |
dc.date.copyright | 2015-12-18 | en_NZ |
dc.date.issued | 2015-12-18 | en_NZ |
dc.description.abstract | Cloud computing provides an effective business model for the deployment of IT infrastructure, platform, and software services. Often, facilities are outsourced to cloud providers and this offers the service consumer virtualization technologies without the added cost burden of development. However, virtualization introduces serious threats to service delivery such as Denial of Service (DoS) attacks, Cross-VM Cache Side Channel attacks, Hypervisor Escape and Hyper-jacking. One of the most sophisticated forms of attack is the cross-VM cache side channel attack that exploits shared cache memory between VMs. A cache side channel attack results in side channel data leakage, such as cryptographic keys. Various techniques used by the attackers to launch cache side channel attack are presented, as is a critical analysis of countermeasures against cache side channel attacks. | |
dc.identifier.citation | Presented at the Australasian Conference on Information Systems 2015 ( arXiv:1606.01356) | |
dc.identifier.uri | https://hdl.handle.net/10292/12327 | |
dc.publisher | Australasian Conference on Information Systems (ACIS) | |
dc.relation.uri | https://arxiv.org/abs/1606.01356 | |
dc.rights | Copyright: © 2015 AT Litchfield and A Shahzad. This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial 3.0 Australia License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and ACIS are credited. | |
dc.rights.accessrights | OpenAccess | en_NZ |
dc.subject | Cloud Computing; Virtualization; Security; Cross-VM Cache Side Channels | |
dc.title | Virtualization Technology: Cross-VM Side Channel Attacks Make it Vulnerable | en_NZ |
dc.type | Conference Contribution | |
pubs.elements-id | 194091 | |
pubs.organisational-data | /AUT | |
pubs.organisational-data | /AUT/Design & Creative Technologies | |
pubs.organisational-data | /AUT/Design & Creative Technologies/Engineering, Computer & Mathematical Sciences | |
pubs.organisational-data | /AUT/PBRF | |
pubs.organisational-data | /AUT/PBRF/PBRF Design and Creative Technologies | |
pubs.organisational-data | /AUT/PBRF/PBRF Design and Creative Technologies/PBRF ECMS |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Cross-VM Side Channel Attack-ACIS2015-Camera Final1.pdf
- Size:
- 357.81 KB
- Format:
- Adobe Portable Document Format
- Description:
- Conference contribution
License bundle
1 - 1 of 1
Loading...
- Name:
- AUT Grant of Licence for Scholarly Commons Feb2017.pdf
- Size:
- 239.25 KB
- Format:
- Adobe Portable Document Format
- Description: