메뉴 건너뛰기




Volumn , Issue , 2014, Pages 305-316

On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment

Author keywords

DMA attack; I O virtualization; Interrupt attack; MMIO; Passthrough; PIO; Virtual Machine Monitor

Indexed keywords

AUDIO SYSTEMS; HARDWARE; JAVA PROGRAMMING LANGUAGE; RECONFIGURABLE HARDWARE; VIRTUAL REALITY;

EID: 84948573889     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2590296.2590299     Document Type: Conference Paper
Times cited : (14)

References (51)
  • 1
    • 84976587570 scopus 로고    scopus 로고
    • Amazon EC2. http:/aws.amazon.com/.
    • Amazon EC2
  • 2
    • 84873626557 scopus 로고    scopus 로고
    • Google Compute Engine. https://cloud.google. com/products/compute-engine/.
    • Google Compute Engine
  • 4
    • 77955212682 scopus 로고    scopus 로고
    • Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
    • Washington, DC, USA, IEEE Computer Society
    • Zhi Wang and Xuxian Jiang. Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP '10, pages 380-395, Washington, DC, USA, 2010. IEEE Computer Society.
    • (2010) Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP '10 , pp. 380-395
    • Wang, Z.1    Jiang, X.2
  • 10
    • 77950798876 scopus 로고    scopus 로고
    • Subverting the xen hypervisor - Xen owning trilogy Part i
    • aug
    • Rafal Wojtczuk. Subverting the Xen Hypervisor - Xen Owning Trilogy part I. Black Hat USA, aug 2008.
    • (2008) Black Hat USA
    • Wojtczuk, R.1
  • 11
    • 84984879126 scopus 로고    scopus 로고
    • Preventing and detecting xen hypervisor subversions - Xen owning trilogy Part II
    • aug
    • Rafal Wojtczuk. Preventing and Detecting Xen Hypervisor Subversions - Xen Owning Trilogy part II. Black Hat USA, aug 2008.
    • (2008) Black Hat USA
    • Wojtczuk, R.1
  • 12
    • 84984927928 scopus 로고    scopus 로고
    • Bluepilling the xen hypervisor - Xen owning trilogy Part III
    • aug
    • Joanna Rutkowska and Alexander Tereshkin. Bluepilling the Xen Hypervisor - Xen Owning Trilogy part III. Black Hat USA, aug 2008.
    • (2008) Black Hat USA
    • Rutkowska, J.1    Tereshkin, A.2
  • 17
    • 77953995401 scopus 로고    scopus 로고
    • Evaluating standard-based self-virtualizing devices: A performance study on 10 GbE NICs with SR-IOV support
    • April
    • Jiuxing Liu. Evaluating standard-based self-virtualizing devices: A performance study on 10 GbE NICs with SR-IOV support. In IEEE Int'l Parallel & Distributed Processing Symp. (IPDPS), pages 1-12, April 2010.
    • (2010) IEEE Int'l Parallel & Distributed Processing Symp. (IPDPS , pp. 1-12
    • Liu, J.1
  • 26
    • 84984872950 scopus 로고    scopus 로고
    • IntelR virtualization technology for directed I/O
    • August
    • Intel. IntelR Virtualization Technology for Directed I/O. IntelR Technology Journal, 10, August 2006.
    • (2006) IntelR Technology Journal , vol.10
    • Intel1
  • 31
    • 78751647581 scopus 로고    scopus 로고
    • Programmed I/O accesses: A threat to Virtual Machine Monitors?
    • Loïc Duflot and Laurent Absil. Programmed I/O accesses: a threat to Virtual Machine Monitors? PacSec, 2007.
    • (2007) PacSec
    • Duflot, L.1    Absil, L.2
  • 34
    • 84984879137 scopus 로고    scopus 로고
    • Pciback: Question about the permissive flag
    • July
    • Joanna Rutkowska. pciback: question about the permissive flag. XEN-devel mailing list, Available at http://old-list-archives.xenproject.org/ archives/html/xen-devel/2010-07/ msg00257.html, July 2010.
    • (2010) XEN-devel Mailing List
    • Rutkowska, J.1
  • 37
    • 84984912351 scopus 로고    scopus 로고
    • XSA-59 blog. http://www.gossamer-threads. com/lists/xen/devel/318464?page=last.
    • XSA-59 Blog
  • 38
    • 84880098818 scopus 로고    scopus 로고
    • A survey of security issues in hardware virtualization
    • July
    • Gábor Pék, Levente Buttyán, and Boldizsár Bencsáth. A survey of security issues in hardware virtualization. ACM Comput. Surv., 45(3):40:1-40:34, July 2013.
    • (2013) ACM Comput. Surv. , vol.45 , Issue.3 , pp. 401-4034
    • Pék, G.1    Buttyán, L.2    Bencsáth, B.3
  • 42
    • 3042731401 scopus 로고    scopus 로고
    • A hardware-based memory acquisition procedure for digital investigations
    • Brian D. Carrier and Joe Grand. A hardware-based memory acquisition procedure for digital investigations. Digital Investigation, 2004.
    • (2004) Digital Investigation
    • Carrier, B.D.1    Grand, J.2
  • 46
    • 62349100397 scopus 로고    scopus 로고
    • Owned by an iPod
    • Maximillian Dornseif. Owned by an iPod. PacSec, 2004.
    • (2004) PacSec
    • Dornseif, M.1
  • 47
    • 34447541281 scopus 로고    scopus 로고
    • FireWire - All your memory are belong to us
    • May
    • Michael Becher, Maximillian Dornseif, and Christian N. Klein. FireWire - all your memory are belong to us. CanSecWest/core05, May 2005.
    • (2005) CanSecWest/core05
    • Becher, M.1    Dornseif, M.2    Klein, C.N.3
  • 50
    • 84984882841 scopus 로고    scopus 로고
    • Decreasing system availability on an avionic multicore processor using directly assigned pci express devices
    • Apr 2013. Prag
    • Kevin Müller, Daniel Münch, Ole Isfort, Michael Paulitsch, and Georg Sigl. Decreasing system availability on an avionic multicore processor using directly assigned pci express devices. In EUROSEC 2013, Apr 2013. Prag.
    • (2013) EUROSEC
    • Müller, K.1    Münch, D.2    Isfort, O.3    Paulitsch, M.4    Sigl, G.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.