Breaking VM isolation: An in-depth look into the cross flush reload cache timing attack

Danny Philippe-Jankovic, Tanveer Zia

Research output: Contribution to journalArticlepeer-review

Abstract

Cloud computing has led to a lot of improvements in the way we manage our IT infrastructure, but this convenience has led to new security challenges. In this paper, we recreate a cross Virtual Machine Flush+Reload cache timing attack and document our attack methodology in depth. Cache timing attacks are highly technical, and executing them in a virtualized environment makes them more complex. We have not come across any literature that documents these attacks adequately, and so this paper aims to deliver detailed insight into the entire lifecycle of these types of attacks. Our attack methodology dissects the life cycle of a side channel attack in a virtualized environment from beginning to end. We present an in-depth analysis of the environment, the attack setup, the attack execution, and how these attacks can be used to gather and analyse results. This research will shed some valuable insight into what is a very technical and complex topic. By documenting our attack environment and methodology we hope to help new researchers in this field gain a foothold in a research topic that has recently gained popularity and may be difficult to enter. Finally, we examine how meaningful results are collected and analysed by the attacker. We believe this insight will also be valuable for cloud administrators and developers, and that they may use their understanding of the attack lifecycle and result analysis tools to mitigate and disrupt attack attempts.
Original languageEnglish
Pages (from-to)181-193
Number of pages13
JournalInternational Journal of Computer Science and Network Security
Volume17
Issue number2
Publication statusPublished - 2017

Fingerprint

Dive into the research topics of 'Breaking VM isolation: An in-depth look into the cross flush reload cache timing attack'. Together they form a unique fingerprint.

Cite this