Proceedings of the Fourth European Workshop on System Security 2011
DOI: 10.1145/1972551.1972552
|View full text |Cite
|
Sign up to set email alerts
|

Memory deduplication as a threat to the guest OS

Abstract: Memory deduplication shares same-content memory pages and reduces the consumption of physical memory. It is effective on environments that run many virtual machines with the same operating system. Memory deduplication, however, is vulnerable to memory disclosure attacks, which reveal the existence of an application or file on another virtual machine. Such an attack takes advantage of a difference in write access times on deduplicated memory pages that are recreated by Copy-On-Write. In our experience on KSM (k… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
55
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 105 publications
(60 citation statements)
references
References 7 publications
0
55
0
Order By: Relevance
“…VM-hosted operating system: Both host and guest OS may be targeted [48], and to alleviate the impact of such an attack, adequate isolation must be enforced between guest virtual machines (VMs), as well as between the host and guest VMs. The adversary could attempt to break the isolation by exploiting, e.g., some aws of the virtualisation platform in use [49].…”
Section: Targetmentioning
confidence: 99%
“…VM-hosted operating system: Both host and guest OS may be targeted [48], and to alleviate the impact of such an attack, adequate isolation must be enforced between guest virtual machines (VMs), as well as between the host and guest VMs. The adversary could attempt to break the isolation by exploiting, e.g., some aws of the virtualisation platform in use [49].…”
Section: Targetmentioning
confidence: 99%
“…By default KSM in KVM scans 100 pages in every 200 milliseconds. This is why any memory disclosure attack, including ours, has to wait for a certain time before the deduplication takes effect upon which the attack can be performed [40][41][42].…”
Section: Ksm (Kernel Same-page Merging)mentioning
confidence: 99%
“…This is a real threat, as many providers allow multitenancy where the VMs of disjoint customers can reside at the same physical hardware. The risk of memory deduplication attacks in virtualized environments is highlighted in Suzaki et al [2011]. Memory deduplication is a well-known optimization technique applied by, for example, VMware ESX [Waldspurger 2002], Xen [Gupta et al 2010], and KSM (Kernel Samepage Merging) for the Linux kernel [Arcangeli et al 2009], where the VMM shares same-, or similar-content memory pages of various guests.…”
Section: Guest To Guest (G2g)mentioning
confidence: 99%