TY - GEN
T1 - Detecting malicious co-resident virtual machines indulging in load-based attacks
AU - Sundareswaran, Smitha
AU - Squcciarini, Anna C.
PY - 2013
Y1 - 2013
N2 - Virtualization provides many benefits for Cloud environments, as it helps users obtain dedicated environments abstracted from the physical layer. However, it also introduces new vulnerabilities to the Cloud such as making it possible for malicious VMs to mount cross-VM attacks through cache based side channels. In this paper, we investigate load-based measurement attacks born specifically as a result of the virtualization in Cloud systems. We develop a framework to identify these attacks based on the observation that the events taking place during the attacks lead to an identifiable sequence of exceptions. We test the accuracy of our framework using the Microsoft Azure infrastructure.
AB - Virtualization provides many benefits for Cloud environments, as it helps users obtain dedicated environments abstracted from the physical layer. However, it also introduces new vulnerabilities to the Cloud such as making it possible for malicious VMs to mount cross-VM attacks through cache based side channels. In this paper, we investigate load-based measurement attacks born specifically as a result of the virtualization in Cloud systems. We develop a framework to identify these attacks based on the observation that the events taking place during the attacks lead to an identifiable sequence of exceptions. We test the accuracy of our framework using the Microsoft Azure infrastructure.
UR - http://www.scopus.com/inward/record.url?scp=84893727334&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84893727334&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-02726-5_9
DO - 10.1007/978-3-319-02726-5_9
M3 - Conference contribution
AN - SCOPUS:84893727334
SN - 9783319027258
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 113
EP - 124
BT - Information and Communications Security - 15th International Conference, ICICS 2013, Proceedings
T2 - 15th International Conference on Information and Communications Security, ICICS 2013
Y2 - 20 November 2013 through 22 November 2013
ER -