Cross-VM micro-architectural covert channel attacks in L1 cache

In virtualized platforms, virtual machines are logically isolated by privileged hypervisors. These hypervisors provide abstraction and prevent virtual machines or processes from communicating with one another. Although the prevention of direct communication is enforced by these privileged hypervisor...

Full description

Saved in:
Bibliographic Details
Main Author: Ng, Joel Wei Jie
Other Authors: Zhang Tianwei
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2021
Subjects:
Online Access:https://hdl.handle.net/10356/148686
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
Description
Summary:In virtualized platforms, virtual machines are logically isolated by privileged hypervisors. These hypervisors provide abstraction and prevent virtual machines or processes from communicating with one another. Although the prevention of direct communication is enforced by these privileged hypervisors, these virtual machines or processes utilize the same hardware components like CPU core, CPU cache, bus, DRAM, etc. This sharing of hardware components opens up the possibility of two processes exchanging messages through what we call covert channels. In this paper, I would like to determine if the bandwidth L1 cache covert channels are useful in data exfiltration or are of any use to begin with, and compare it with L2 cache covert channels [1]