Volltext-Downloads (blau) und Frontdoor-Views (grau)
The search result changed since you submitted your search request. Documents might be displayed in a different sort order.
  • search hit 13 of 234
Back to Result List

CPU-based covert- and side-channels in cloud ecosystems

  • Covert and Side-Channels have been known for a long time due to their versatile forms of appearance. For nearly every technical improvement or change in technology, such channels have been (re-)created or known methods have been adapted. For example the introduction of hyperthreading technology has introduced new possibilities for covert communication between malicious processes because they canCovert and Side-Channels have been known for a long time due to their versatile forms of appearance. For nearly every technical improvement or change in technology, such channels have been (re-)created or known methods have been adapted. For example the introduction of hyperthreading technology has introduced new possibilities for covert communication between malicious processes because they can now share the arithmetic logical unit (ALU) as well as the L1 and L2 cache which enables establishing multiple covert channels. Even virtualization which is known for its isolation of multiple machines is prone to covert and side-channel attacks due to the sharing of resources. Therefore itis not surprising that cloud computing is not immune to this kind of attacks. Even more, cloud computing with multiple, possibly competing users or customers using the same shared resources may elevate the risk of unwanted communication. In such a setting the ”air gap” between physical servers and networks disappears and only the means of isolation and virtual separation serve as a barrier between adversary and victim. In the work at hand we will provide a survey on weak spots an adversary trying to exfiltrate private data from target virtual machines could exploit in a cloud environment. We will evaluate the feasibility of example attacks and point out possible mitigation solutions if they exist.show moreshow less

Export metadata

Additional Services

Search Google Scholar

Statistics

frontdoor_oas
Metadaten
Document Type:Conference Proceeding
Conference Type:Konferenzartikel
Zitierlink: https://opus.hs-offenburg.de/1424
Bibliografische Angaben
Title (English):CPU-based covert- and side-channels in cloud ecosystems
Conference:Baden-Württemberg Center of Applied Research Symposium on Information and Communication Systems (2. : 13. November 2015 : Konstanz)
Author:Johann-Wolfram BetzStaff Member, Dirk WesthoffStaff MemberGND
Year of Publication:2015
Creating Corporation:SInCom
Contributing Corporation:Hochschule Konstanz
Page Number:5
First Page:19
Last Page:23
Parent Title (English):2nd Baden-Württemberg Center of Applied Research Symposium on Information and Communication Systems - SInCom 2015
Editor:Dirk Benyoucef, Jürgen Freudenberger
ISBN:978-3-00-051859-1
URL:https://opus.htwg-konstanz.de/frontdoor/deliver/index/docId/444/file/proceedingsSInCom2015.pdf
Language:English
Inhaltliche Informationen
Institutes:Forschung / ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik
Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021)
Institutes:Bibliografie
GND Keyword:cloud computing
Formale Angaben
Open Access: Open Access 
Licence (German):License LogoUrheberrechtlich geschützt
Opac ID:Link zum Online-Katalog
SWB-ID:1725235269