Affiliation:
1. Technical University of Berlin, Berlin, Germany
Abstract
Cloud computing has become indispensable in today's computer landscape. The flexibility it offers for customers as well as for providers has become a crucial factor for large parts of the computer industry. Virtualization is the key technology that allows for sharing of hardware resources among different customers. The controlling software component, called hypervisor, provides a virtualized view of the computer resources and ensures separation of different guest virtual machines. However, this important cornerstone of cloud computing is not necessarily trustworthy or bug-free. To mitigate this threat AMD introduced Secure Encrypted Virtualization, short SEV, which transparently encrypts a virtual machines memory.
In this paper we analyse to what extend the proposed features can resist a malicious hypervisor and discuss the tradeoffs imposed by additional protection mechanisms. To do so, we developed a model of SEV's security capabilities based on the available documentation as actual silicon implementations are not yet on the market.
We found that the first proposed version of SEV is not up to the task owing to three design shortcomings. First the virtual machine control block is not encrypted and handled directly by the hypervisor, allowing it to bypass VM memory encryption by executing conveniently chosen gadgets. Secondly, the general purpose registers are not encrypted upon vmexit, leaking potentially sensitive data. Finally, the control over the nested pagetables allows a malicious hypervisor to closely monitor the execution state of a VM and attack it with memory replay attacks.
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Graphics and Computer-Aided Design,Software
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Protecting Confidential Virtual Machines from Hardware Performance Counter Side Channels;2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN);2024-06-24
2. WeSee: Using Malicious #VC Interrupts to Break AMD SEV-SNP;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
3. KVSEV;Proceedings of the 2023 ACM Symposium on Cloud Computing;2023-10-30
4. FlexSEE;Proceedings of the 20th ACM International Conference on Computing Frontiers;2023-05-09
5. PwrLeak: Exploiting Power Reporting Interface for Side-Channel Attacks on AMD SEV;Detection of Intrusions and Malware, and Vulnerability Assessment;2023