Cross-VM micro-architectural covert channel attacks in L1 cache
In virtualized platforms, virtual machines are logically isolated by privileged hypervisors. These hypervisors provide abstraction and prevent virtual machines or processes from communicating with one another. Although the prevention of direct communication is enforced by these privileged hypervisor...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/148686 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Summary: | In virtualized platforms, virtual machines are logically isolated by privileged hypervisors. These hypervisors provide abstraction and prevent virtual machines or processes from communicating with one another. Although the prevention of direct communication is enforced by these privileged hypervisors, these virtual machines or processes utilize the same hardware components like CPU core, CPU cache, bus, DRAM, etc. This sharing of hardware components opens up the possibility of two processes exchanging messages through what we call covert channels. In this paper, I would like to determine if the bandwidth L1 cache covert channels are useful in data exfiltration or are of any use to begin with, and compare it with L2 cache covert channels [1] |
---|