Skip to main content

Cross-VM side channels and their use to extract private keys

Publication ,  Conference
Zhang, Y; Juels, A; Reiter, MK; Ristenpart, T
Published in: Proceedings of the ACM Conference on Computer and Communications Security
November 29, 2012

This paper details the construction of an access-driven side-channel attack by which a malicious virtual machine (VM) extracts fine-grained information from a victim VM running on the same physical computer. This attack is the first such attack demonstrated on a symmetric multiprocessing system virtualized using a modern VMM (Xen). Such systems are very common today, ranging from desktops that use virtualization to sandbox application or OS compromises, to clouds that co-locate the workloads of mutually distrustful customers. Constructing such a side-channel requires overcoming challenges including core migration, numerous sources of channel noise, and the difficulty of preempting the victim with sufficient frequency to extract fine-grained information from it. This paper addresses these challenges and demonstrates the attack in a lab setting by extracting an ElGamal decryption key from a victim using the most recent version of the libgcrypt cryptographic library. Copyright © 2012 ACM.

Duke Scholars

Published In

Proceedings of the ACM Conference on Computer and Communications Security

DOI

ISSN

1543-7221

Publication Date

November 29, 2012

Start / End Page

305 / 316
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Zhang, Y., Juels, A., Reiter, M. K., & Ristenpart, T. (2012). Cross-VM side channels and their use to extract private keys. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 305–316). https://doi.org/10.1145/2382196.2382230

Published In

Proceedings of the ACM Conference on Computer and Communications Security

DOI

ISSN

1543-7221

Publication Date

November 29, 2012

Start / End Page

305 / 316