Defending against VM rollback attack
@article{Xia2012DefendingAV, title={Defending against VM rollback attack}, author={Yubin Xia and Yutao Liu and Haibo Chen and B. Zang}, journal={IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)}, year={2012}, pages={1-5} }
Recently it became a hot topic to protect VMs from a compromised or even malicious hypervisor. However, most previous systems are vulnerable to rollback attack, since it is hard to distinguish from normal suspend/resume and migration operations that an IaaS platform usually offers. Some of the previous systems simply disable these features to defend rollback attack, while others heavily need user involvement. In this paper, we propose a new solution to make a balance between security and… Expand
30 Citations
Architecture support for guest-transparent VM protection from untrusted hypervisor and physical attacks
- Computer Science
- 2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA)
- 2013
- 66
- PDF
Extended-HyperWall: Hardware support for rollback secure virtualization
- Computer Science
- 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)
- 2016
- 4
VirtAV: An agentless antivirus system based on in-memory signature scanning for virtual machine
- Engineering
- 2016 18th International Conference on Advanced Communication Technology (ICACT)
- 2016
- 3
- PDF
VirtAV: An agentless antivirus system based on in-memory signature scanning for virtual machine
- Computer Science
- 2016
- 3
A Review of Virtualization, Hypervisor and VM Allocation Security: Threats, Vulnerabilities, and Countermeasures
- Computer Science
- 2018 International Conference on Computational Science and Computational Intelligence (CSCI)
- 2018
- 1
Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation
- Computer Science
- CCS
- 2015
- 79
- PDF
A Survey on the Security of Hypervisors in Cloud Computing
- Computer Science
- 2015 IEEE 35th International Conference on Distributed Computing Systems Workshops
- 2015
- 19
A Trusted IaaS Environment with Hardware Security Module
- Computer Science
- IEEE Transactions on Services Computing
- 2016
- 8
References
SHOWING 1-10 OF 11 REFERENCES
Architectural support for secure virtualization under a vulnerable hypervisor
- Computer Science
- 2011 44th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)
- 2011
- 79
- PDF
CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization
- Computer Science
- SOSP
- 2011
- 359
- PDF
Memoir: Practical State Continuity for Protected Modules
- Computer Science
- 2011 IEEE Symposium on Security and Privacy
- 2011
- 97
- PDF
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
- Computer Science
- CCS
- 2009
- 2,047
- PDF
Bluepilling the Xen Hypervisor
- Bluepilling the Xen Hypervisor
- 2008
Cve and cce statistics query page
- Cve and cce statistics query page