Eliminating fine grained timers in Xen

B. C. Vattikonda, Sambit Das, H. Shacham
{"title":"Eliminating fine grained timers in Xen","authors":"B. C. Vattikonda, Sambit Das, H. Shacham","doi":"10.1145/2046660.2046671","DOIUrl":null,"url":null,"abstract":"The move to \"infrastructure-as-a-service\" cloud computing brings with it a new risk: cross-virtual machine side channels through shared physical resources such as the L2 cache. One approach to this risk is to rewrite sensitive code to eliminate the signal. In this paper we consider another approach: weakening malicious virtual machines' ability to receive the signal by eliminating fine-grained timers. Such \"fuzzy time\" was implemented in 1991 in the VAX security kernel, but it was not clearly applicabile to modern virtual machine managers such as Xen on platforms such as the x86, which exports a cycle counter through the RDTSC instruction.\n In this paper, we demonstrate that it is possible to modify the RDTSC instruction on Xen-virtualized x86 machines, making the timer provided by this instruction substantially more coarse. We perform a thorough evaluation of the impact of modifying this timer on the usability of the system, and we evaluate the limiting point of the timer coarseness.\n Our findings open the way to a specific research program for mitigating cloud computing side channels through fuzzy time: (1) What other sources of fine-grained time are available to a malicious VM, and is it possible to degrade them? (2) What distribution of noise should be introduced to RDTSC and other timing signals to maximize the effect on malicious VMs while minimizing the effect on legitimate ones? (3) What timing resolution is actually needed to make use of L2 cache side channels?","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"153 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"171","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cloud Computing Security Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2046660.2046671","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 171

Abstract

The move to "infrastructure-as-a-service" cloud computing brings with it a new risk: cross-virtual machine side channels through shared physical resources such as the L2 cache. One approach to this risk is to rewrite sensitive code to eliminate the signal. In this paper we consider another approach: weakening malicious virtual machines' ability to receive the signal by eliminating fine-grained timers. Such "fuzzy time" was implemented in 1991 in the VAX security kernel, but it was not clearly applicabile to modern virtual machine managers such as Xen on platforms such as the x86, which exports a cycle counter through the RDTSC instruction. In this paper, we demonstrate that it is possible to modify the RDTSC instruction on Xen-virtualized x86 machines, making the timer provided by this instruction substantially more coarse. We perform a thorough evaluation of the impact of modifying this timer on the usability of the system, and we evaluate the limiting point of the timer coarseness. Our findings open the way to a specific research program for mitigating cloud computing side channels through fuzzy time: (1) What other sources of fine-grained time are available to a malicious VM, and is it possible to degrade them? (2) What distribution of noise should be introduced to RDTSC and other timing signals to maximize the effect on malicious VMs while minimizing the effect on legitimate ones? (3) What timing resolution is actually needed to make use of L2 cache side channels?
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
消除Xen中的细粒度计时器
向“基础设施即服务”云计算的转变带来了一个新的风险:通过共享物理资源(如L2缓存)的跨虚拟机侧通道。解决这种风险的一种方法是重写敏感代码以消除信号。在本文中,我们考虑了另一种方法:通过消除细粒度计时器来削弱恶意虚拟机接收信号的能力。这种“模糊时间”于1991年在VAX安全内核中实现,但它并不明显适用于现代虚拟机管理器,例如x86平台上的Xen,它通过RDTSC指令导出周期计数器。在本文中,我们演示了在xen虚拟化的x86机器上修改RDTSC指令是可能的,从而使该指令提供的计时器实质上更加粗糙。我们对修改计时器对系统可用性的影响进行了全面的评估,并评估了计时器粗糙度的极限点。我们的研究结果为通过模糊时间减轻云计算侧通道的特定研究计划开辟了道路:(1)恶意VM可以使用哪些其他细粒度时间来源,是否有可能降低它们?(2)在RDTSC等定时信号中引入什么样的噪声分布,才能使对恶意虚拟机的影响最大化,而对合法虚拟机的影响最小化?(3)利用L2缓存侧通道实际需要什么时间分辨率?
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Side Channels in Multi-Tenant Environments How Private is Your Private Cloud?: Security Analysis of Cloud Control Interfaces Return of the Covert Channel, Data Center Style Fast Order-Preserving Encryption from Uniform Distribution Sampling Cloud Security: The Industry Landscape and the Lure of Zero-Knowledge Protection
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1