Detecting VMs co-residency in the cloud: Using cache-based side channel attacks

15Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

Abstract

Virtual machine technology enables the cloud to offer large scale and flexible computing ability. However, it also introduces a range of new vulnerabilities. Malicious users can extract sensitive information from other users covertly via side channel attacks, which breaks the isolation between the virtual machines (VMs). In this paper, we investigate such a security threat and propose the VMs Co-residency Detection Scheme via cache-based side channel attacks (VCDS) to get the location of the specified VM. Using load pre-processor based on cubic spline interpolation, VCDS makes the raw measurements more smoothing and relevant. With the load predictor based on linear regression model, VCDS probes cache load changes produced by the victim VM more accurately. Based on the normal cloud model, VCDS computes the co-residency probability to describe VMs co-residency quantitatively. The experimental results show that VCDS improves the true detection rate even with the interference of the co-resident noisy VM compared to the existing schemes.

Cite

CITATION STYLE

APA

Yu, S., Gui, X., Lin, J., Zhang, X., & Wang, J. (2013). Detecting VMs co-residency in the cloud: Using cache-based side channel attacks. Elektronika Ir Elektrotechnika, 19(5), 73–78. https://doi.org/10.5755/j01.eee.19.5.2422

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free