Home > Research > Publications & Outputs > Cross-VM Network Channel Attacks and Countermea...

Electronic data

  • IEEE TDSC Cross VM Cloud Attacks

    Rights statement: ©2020 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

    Accepted author manuscript, 4.45 MB, PDF document

    Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License

Links

Text available via DOI:

View graph of relations

Cross-VM Network Channel Attacks and Countermeasures within Cloud Computing Environments

Research output: Contribution to Journal/MagazineJournal articlepeer-review

E-pub ahead of print

Standard

Cross-VM Network Channel Attacks and Countermeasures within Cloud Computing Environments. / Saeed, Atif; Garraghan, Peter; Asad Hussain, Syed.
In: IEEE Transactions on Dependable and Secure Computing, Vol. 19, No. 3, 10.11.2020, p. 1783-1794.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Saeed, A, Garraghan, P & Asad Hussain, S 2020, 'Cross-VM Network Channel Attacks and Countermeasures within Cloud Computing Environments', IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 3, pp. 1783-1794. https://doi.org/10.1109/TDSC.2020.3037022

APA

Saeed, A., Garraghan, P., & Asad Hussain, S. (2020). Cross-VM Network Channel Attacks and Countermeasures within Cloud Computing Environments. IEEE Transactions on Dependable and Secure Computing, 19(3), 1783-1794. Advance online publication. https://doi.org/10.1109/TDSC.2020.3037022

Vancouver

Saeed A, Garraghan P, Asad Hussain S. Cross-VM Network Channel Attacks and Countermeasures within Cloud Computing Environments. IEEE Transactions on Dependable and Secure Computing. 2020 Nov 10;19(3):1783-1794. Epub 2020 Nov 10. doi: 10.1109/TDSC.2020.3037022

Author

Saeed, Atif ; Garraghan, Peter ; Asad Hussain, Syed. / Cross-VM Network Channel Attacks and Countermeasures within Cloud Computing Environments. In: IEEE Transactions on Dependable and Secure Computing. 2020 ; Vol. 19, No. 3. pp. 1783-1794.

Bibtex

@article{f694584cc3eb44faa6567f6f7d405fdc,
title = "Cross-VM Network Channel Attacks and Countermeasures within Cloud Computing Environments",
abstract = "Cloud providers attempt to maintain the highest levels of isolation between Virtual Machines (VMs) and inter-user processes to keep co-located VMs and processes separate. This logical isolation creates an internal virtual network to separate VMs co-residing within a shared physical network. However, as co-residing VMs share their underlying VMM (Virtual Machine Monitor), virtual network, and hardware are susceptible to cross VM attacks. It is possible for a malicious VM to potentially access or control other VMs through network connections, shared memory, other shared resources, or by gaining the privilege level of its non-root machine. This research presents a two novel zero-day cross-VM network channel attacks. In the first attack, a malicious VM can redirect the network traffic of target VMs to a specific destination by impersonating the Virtual Network Interface Controller (VNIC). The malicious VM can extract the decrypted information from target VMs by using open source decryption tools such as Aircrack. The second contribution of this research is a privilege escalation attack in a cross VM cloud environment with Xen hypervisor. An adversary having limited privileges rights may execute Return-Oriented Programming (ROP), establish a connection with the root domain by exploiting the network channel, and acquiring the tool stack (root domain) which it is not authorized to access directly. Countermeasures against this attacks are also presented",
keywords = "Cloud computing, Security, Cyber-security, Cloud security",
author = "Atif Saeed and Peter Garraghan and {Asad Hussain}, Syed",
note = "{\textcopyright}2020 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. ",
year = "2020",
month = nov,
day = "10",
doi = "10.1109/TDSC.2020.3037022",
language = "English",
volume = "19",
pages = "1783--1794",
journal = "IEEE Transactions on Dependable and Secure Computing",
issn = "1545-5971",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "3",

}

RIS

TY - JOUR

T1 - Cross-VM Network Channel Attacks and Countermeasures within Cloud Computing Environments

AU - Saeed, Atif

AU - Garraghan, Peter

AU - Asad Hussain, Syed

N1 - ©2020 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

PY - 2020/11/10

Y1 - 2020/11/10

N2 - Cloud providers attempt to maintain the highest levels of isolation between Virtual Machines (VMs) and inter-user processes to keep co-located VMs and processes separate. This logical isolation creates an internal virtual network to separate VMs co-residing within a shared physical network. However, as co-residing VMs share their underlying VMM (Virtual Machine Monitor), virtual network, and hardware are susceptible to cross VM attacks. It is possible for a malicious VM to potentially access or control other VMs through network connections, shared memory, other shared resources, or by gaining the privilege level of its non-root machine. This research presents a two novel zero-day cross-VM network channel attacks. In the first attack, a malicious VM can redirect the network traffic of target VMs to a specific destination by impersonating the Virtual Network Interface Controller (VNIC). The malicious VM can extract the decrypted information from target VMs by using open source decryption tools such as Aircrack. The second contribution of this research is a privilege escalation attack in a cross VM cloud environment with Xen hypervisor. An adversary having limited privileges rights may execute Return-Oriented Programming (ROP), establish a connection with the root domain by exploiting the network channel, and acquiring the tool stack (root domain) which it is not authorized to access directly. Countermeasures against this attacks are also presented

AB - Cloud providers attempt to maintain the highest levels of isolation between Virtual Machines (VMs) and inter-user processes to keep co-located VMs and processes separate. This logical isolation creates an internal virtual network to separate VMs co-residing within a shared physical network. However, as co-residing VMs share their underlying VMM (Virtual Machine Monitor), virtual network, and hardware are susceptible to cross VM attacks. It is possible for a malicious VM to potentially access or control other VMs through network connections, shared memory, other shared resources, or by gaining the privilege level of its non-root machine. This research presents a two novel zero-day cross-VM network channel attacks. In the first attack, a malicious VM can redirect the network traffic of target VMs to a specific destination by impersonating the Virtual Network Interface Controller (VNIC). The malicious VM can extract the decrypted information from target VMs by using open source decryption tools such as Aircrack. The second contribution of this research is a privilege escalation attack in a cross VM cloud environment with Xen hypervisor. An adversary having limited privileges rights may execute Return-Oriented Programming (ROP), establish a connection with the root domain by exploiting the network channel, and acquiring the tool stack (root domain) which it is not authorized to access directly. Countermeasures against this attacks are also presented

KW - Cloud computing

KW - Security

KW - Cyber-security

KW - Cloud security

U2 - 10.1109/TDSC.2020.3037022

DO - 10.1109/TDSC.2020.3037022

M3 - Journal article

VL - 19

SP - 1783

EP - 1794

JO - IEEE Transactions on Dependable and Secure Computing

JF - IEEE Transactions on Dependable and Secure Computing

SN - 1545-5971

IS - 3

ER -