2019
DOI: 10.6028/nist.ir.8221
|View full text |Cite
|
Sign up to set email alerts
|

Methodology for enabling forensic analysis using hypervisor vulnerabilities data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…Regardless of how super powers were gained, privileged attackers have full control of the entire cloud stack, and can thus use many potential vectors to exploit systems' weaknesses and steal or alter sensitive data (and/or code) while it is in-use, as detailed in the following. Attacks launched via virtualization layer -Threat reports indicate that most popular hypervisors (e.g., Xen, KVM, VMware) expose vulnerabilities to escape the virtualized environment, i.e., the guest OS [15], by leveraging functionalities such as SoftMMU, VMExit, Hypercalls. In the context of container-based virtualization (e.g., Kubernetes), an attacker can exploit vulnerabilities in the Orchestrator or in the container image registry [16].…”
Section: Threat Modelmentioning
confidence: 99%
“…Regardless of how super powers were gained, privileged attackers have full control of the entire cloud stack, and can thus use many potential vectors to exploit systems' weaknesses and steal or alter sensitive data (and/or code) while it is in-use, as detailed in the following. Attacks launched via virtualization layer -Threat reports indicate that most popular hypervisors (e.g., Xen, KVM, VMware) expose vulnerabilities to escape the virtualized environment, i.e., the guest OS [15], by leveraging functionalities such as SoftMMU, VMExit, Hypercalls. In the context of container-based virtualization (e.g., Kubernetes), an attacker can exploit vulnerabilities in the Orchestrator or in the container image registry [16].…”
Section: Threat Modelmentioning
confidence: 99%