Browse > Article
http://dx.doi.org/10.13089/JKIISC.2019.29.5.961

Implementation of Covert Channel Using Mutex Shared Resources in Virtual Machine  

Ko, Ki-Wan (Sungkyunkwan University)
Choi, Hyoung-Kee (Sungkyunkwan University)
Abstract
Isolation between virtual machines in a cloud computing environment is an important security factor. The violation of isolation between virtual machines leads to interferences of shared resources and the implementation of covert channels. In this paper, the structure of Hyper-V hypervisor is analyzed to implement covert channels between virtual machines. Hyper-V uses a mutex technique for mutual exclusion between virtual machines. It indicates that isolation of virtual machines is violated and covert channels can be implemented due to mutex. We implemented several covert channels by designing a method for searching mutex resources applicable to Hyper-V with complex architectures. The mutex-based covert channel is not hardware dependent. If the covert channel is detected or defended, the defensive technique can be avoided by using the other covert channel among several covert channels.
Keywords
Cloud Computing; Virtualization; Covert Channel;
Citations & Related Records
연도 인용수 순위
  • Reference
1 F. Liu, Q. Ge and Y. Yarom, "Catalyst: Defeating last-level cache side channel attacks in cloud computing," Proceedings of the 2016 IEEE International Symposium on High Performance Computer Architecture, pp. 406-418, Mar. 2016.
2 P. Barham, B. Dragovic and K. Fraser, "Xen and the art of virtualization," Proceedings of the ACM Special Interest Group in Operating Systems operating systems review, pp. 164-177, Dec. 2003.
3 A. Velte, and T. Velte, "Microsoft Virtualization with Hyper-V," McGraw-Hill, Inc., New York. USA, 448 pages, 2009.
4 Microsoft Hyper-V Integration Service, "https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/reference/integration-services"
5 K. Okamura and Y. Oyama, "Load-based covert channels between xen virtual machines," Proceedings of the 2010 ACM Symposium on Applied Computing, pp. 173-180, Mar. 2010.
6 Y. Xu, M. Bailey and K. Joshi, "An exploration of L2 cache covert channels in virtualized environments," Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, pp. 29-40, Oct. 2011.
7 Z. Wu, Z. Xu, and H. Wang, "Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud," Proceedings of the 21st USENIX Conference on Security Symposium, pp. 9-9, Aug. 2012.
8 T. Ristenpar, E. Tromer and H. Shacham, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 199-212, Nov. 2009.
9 F. Liu, Y. Yarom and Q. Ge, "Last-level cache side-channel attacks are practical," Proceedings of the 2015 IEEE Symposium on Security and Privacy, pp. 605-622, May. 2015.
10 D. Sullivan, O. Arias and T. meade, "Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in IaaS Clouds," Proceedings of the Network and Distributed System Security Symposium, Feb. 2018.
11 Z. Yang and P. Chen, "Exploring virtual machine covert channel via i/o performance interference," Proceedings of the 2013 International Conference on Cloud Computing and Big Data, pp. 232-239, Dec. 2013.
12 M. Salaun, "Practical overview of a Xen covert channel," Journal in Computer Virology, Vol. 6, No. 4, pp. 317-328, Nov. 2010.   DOI
13 Y. Zhang and M.K. Reiter, "Duppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud," Proceedings of the 2013 ACM Special Interest Group on Security, Audit and Control, pp. 827-838, Nov. 2013.
14 J.Z. Wu, L. Ding and Y. Wang, "Identification and evaluation of sharing memory covert timing channel in Xen virtual machines" Proceedings of the IEEE 4th International Conference on Cloud Computing, pp. 283-291, Jul. 2011.
15 Q. Shen, M. Wan and Z. Zhang, "A covert channel using event channel state on xen hypervisor," Proceedings of the International Conference on Information and Communications Security, pp. 125-134, Nov. 2013.