Defending against VM rollback attack

@article{Xia2012DefendingAV,
  title={Defending against VM rollback attack},
  author={Yubin Xia and Yutao Liu and Haibo Chen and B. Zang},
  journal={IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)},
  year={2012},
  pages={1-5}
}
  • Yubin Xia, Yutao Liu, +1 author B. Zang
  • Published 2012
  • Computer Science
  • IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)
Recently it became a hot topic to protect VMs from a compromised or even malicious hypervisor. However, most previous systems are vulnerable to rollback attack, since it is hard to distinguish from normal suspend/resume and migration operations that an IaaS platform usually offers. Some of the previous systems simply disable these features to defend rollback attack, while others heavily need user involvement. In this paper, we propose a new solution to make a balance between security and… Expand
30 Citations
Architecture support for guest-transparent VM protection from untrusted hypervisor and physical attacks
  • Yubin Xia, Y. Liu, H. Chen
  • Computer Science
  • 2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA)
  • 2013
  • 66
  • PDF
Extended-HyperWall: Hardware support for rollback secure virtualization
  • 4
VirtAV: An agentless antivirus system based on in-memory signature scanning for virtual machine
  • 3
  • PDF
A Review of Virtualization, Hypervisor and VM Allocation Security: Threats, Vulnerabilities, and Countermeasures
  • 1
Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation
  • 79
  • PDF
A Survey on the Security of Hypervisors in Cloud Computing
  • Andrew R. Riddle, S. Chung
  • Computer Science
  • 2015 IEEE 35th International Conference on Distributed Computing Systems Workshops
  • 2015
  • 19
A Trusted IaaS Environment with Hardware Security Module
  • 8
SvTPM: A Secure and Efficient vTPM in the Cloud
  • PDF
...
1
2
3
...

References

SHOWING 1-10 OF 11 REFERENCES
Architectural support for secure virtualization under a vulnerable hypervisor
  • 79
  • PDF
CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization
  • 359
  • PDF
Architectural support for hypervisor-secure virtualization
  • 116
  • PDF
Memoir: Practical State Continuity for Protected Modules
  • 97
  • PDF
Lest we remember: cold-boot attacks on encryption keys
  • 1,178
  • PDF
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
  • 2,047
  • PDF
Self-migration of operating systems
  • 84
  • PDF
Bluepilling the Xen Hypervisor
  • Bluepilling the Xen Hypervisor
  • 2008
Cve and cce statistics query page
  • Cve and cce statistics query page
...
1
2
...