Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment
Pék G., Lanzi A., Srivastava A., Balzarotti D., Francillon A., Neumann C.  ASIA CCS 2014 (Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, Kyoto, Japan, Jun 4-6, 2014)305-316.2014.Type:Proceedings
Date Reviewed: Oct 8 2014

In recent years, virtual machines (VMs) have become clearly very important for the computing infrastructure of companies. It is therefore not surprising that attacks on VMs have increased. The paper looks at threats to, and defenses of, VMs through directly assigned devices. A device is assigned exclusively to one VM by directly mapping it into the VM’s address space. This increases the performance and one might also expect that it reduces covert channels; however, it opens VMs up to many possible attacks.

The authors replicated several previously described attacks and present them in detail. Moreover, they also found two new attacks. The authors categorize the attacks into several attack classes according to the violation of the isolation property: guest-to-VMM; guest-to-host; host-to-VMM; guest-to-guest; guest-to-self; and host-to-self.

The paper is important as it not only gives a comprehensive overview of existing attacks and presents two new attacks, but it also leads the way to having papers systematically reinvestigate known attacks, to verify their applicability and to present them in a condensed, well-organized form.

Reviewer:  Edgar R. Weippl Review #: CR142806 (1501-0072)
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (D.4.6 )
 
 
Error Handling And Recovery (D.2.5 ... )
 
 
Security and Protection (C.2.0 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Practical UNIX security
Garfinkel S., Spafford G., O’Reilly & Associates, Inc., Sebastopol, CA, 1991. Type: Book (9780937175729)
Jun 1 1992
Trusted products evaluation
Chokhani S. Communications of the ACM 35(7): 64-76, 1992. Type: Article
Oct 1 1993
An experience using two covert channel analysis techniques on a real system design
Haigh J., Kemmerer R., McHugh J., Young W. IEEE Transactions on Software Engineering SE-13(2): 157-168, 1987. Type: Article
Nov 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy