Volltext-Downloads (blau) und Frontdoor-Views (grau)
The search result changed since you submitted your search request. Documents might be displayed in a different sort order.
  • search hit 44 of 81
Back to Result List

Survey on covert channels in virtual machines and cloud computing

  • Covert channels have been known for a long time because of their versatile forms of appearance. For nearly every technical improvement or change in technology, such channels have been (re-)created or known methods have been adapted. For example, the introduction of hyperthreading technology has introduced new possibilities for covert communication between malicious processes because they can nowCovert channels have been known for a long time because of their versatile forms of appearance. For nearly every technical improvement or change in technology, such channels have been (re-)created or known methods have been adapted. For example, the introduction of hyperthreading technology has introduced new possibilities for covert communication between malicious processes because they can now share the arithmetic logical unit as well as the L1 and L2 caches, which enable establishing multiple covert channels. Even virtualization, which is known for its isolation of multiple machines, is prone to covert- and side-channel attacks because of the sharing of resources. Therefore, it is not surprising that cloud computing is not immune to this kind of attacks. Moreover, cloud computing with multiple, possibly competing users or customers using the same shared resources may elevate the risk of illegitimate communication. In such a setting, the “air gap” between physical servers and networks disappears, and only the means of isolation and virtual separation serve as a barrier between adversary and victim. In the work at hand, we will provide a survey on vulnerable spots that an adversary could exploit trying to exfiltrate private data from target virtual machines through covert channels in a cloud environment. We will evaluate the feasibility of example attacks and point out proposed mitigation solutions in case they exist.show moreshow less

Export metadata

Additional Services

Search Google Scholar

Statistics

frontdoor_oas
Metadaten
Document Type:Article (reviewed)
Zitierlink: https://opus.hs-offenburg.de/2351
Bibliografische Angaben
Title (English):Survey on covert channels in virtual machines and cloud computing
Author:Johann-Wolfram BetzStaff Member, Dirk WesthoffStaff MemberGND, Günter Müller
Year of Publication:2016
Date of first Publication:2016/12/07
Page Number:16
Parent Title (English):Transactions on emerging Telecommunications Technologies
Volume:28
Issue:6
DOI:https://doi.org/10.1002/ett.3134
Language:English
Inhaltliche Informationen
Institutes:Forschung / ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik
Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021)
Institutes:Bibliografie
GND Keyword:Cloud Computing; Datensicherung; Virtualisierung
Formale Angaben
Open Access: Closed Access 
Licence (German):License LogoUrheberrechtlich geschützt