Study Shows Virtual Machine Spying Attack

Virtualisation may provide logical barriers that protect systems running on the same server, but such architectural protections are not foolproof, according to an academic research paper.

The finding serves as a lesson for cloud providers and enterprises that rely on virtual infrastructure that they should not assume that virtual machines are logically isolated and unable to spy on each other.

Virtual attack

In a paper presented in October, a group of academic and industry researchers described an attack that can reconstruct private encryption keys being used in another virtual machine on the same processor.

The technique exploits a vulnerability in the way a popular encryption library leaks information about the value of the keys being processed and can turn a decryption task of astronomical complexity into a trivial problem requiring a few hours or days to solve.

While the technique, known as a side-channel attack, requires the attacker to obtain a virtual machine running on the same processor as the targeted virtual system, that is easier than hacking the target.

“Any type of user can launch a virtual machine in the cloud,” said Yinqian Zhang, a PhD student in computer science at the University of North Carolina, Chapel Hill, and a co-author of the paper. “So you don’t need to compromise any system, you just have to use your credit card to launch a virtual machine and steal the keys in other virtual machines.”

The paper, presented at the ACM Conference on Computer and Communications Security by researchers from the UNC Chapel Hill, RSA Laboratories and the University of Wisconsin at Madison, showed how information from the activities of one virtual machine can be leaked to another machine running on the same system and processor. The researchers used inter-process interrupts to repeatedly gain control of the processor and measure attributes from which information could be gleaned about the targeted values.

Private key reconstructed

Using the attack to monitor a few hours of cryptographic calculations in the target virtual machine gave the researchers enough information to reconstruct the victim’s 457-bit private key with enough accuracy to reduce the number of possible keys to fewer than 10,000.

“With the private key, you can impersonate the server itself,” Zhang said. “In the research community, this type of crypto-key attack is more serious than password theft, because this crypto key is much stronger and is the root of security for the server.”

Side-channel attacks, popular among experts that break the security of smart cards, fall into three categories: timing attacks that divine information about the content of a cryptographic operation by focusing on the length of time taken by the calculations; trace-driven attacks that focus on some attribute of the processor, such as energy consumption, that may change with the values being processed; and access-driven attacks that focus on changes in a shared hardware component.

The side-channel attack presented at the conference is an access-driven attack, using information from the processor caches to observe the target VM’s activities.

Hardening virtual machines against the attack requires that cloud providers use host operating systems and encryption software that minimise the amount of information leaked between processes. In addition, the latest version of the Xen hypervisor, the virtual machine software studied by the attacker, has a schedule that makes observing side-channel information much more difficult.

“The new design in the Xen hypervisor is not because they know there is a security problem – they don’t – but to improve performance,” Zhang said.

Do you know all about UK tech leader ARM Holdings? Take our quiz!

Originally published on eWeek.

Robert Lemos

Robert Lemos covers cyber security for TechWeekEurope and eWeek

Recent Posts

Apple Sales Rise 6 Percent After Early iPhone 16 Demand

Fourth quarter results beat Wall Street expectations, as overall sales rise 6 percent, but EU…

22 hours ago

X’s Community Notes Fails To Stem US Election Misinformation – Report

Hate speech non-profit that defeated Elon Musk's lawsuit, warns X's Community Notes is failing to…

23 hours ago

Google Fined More Than World’s GDP By Russia

Good luck. Russia demands Google pay a fine worth more than the world's total GDP,…

24 hours ago

Spotify, Paramount Sign Up To Use Google Cloud ARM Chips

Google Cloud signs up Spotify, Paramount Global as early customers of its first ARM-based cloud…

2 days ago

Meta Warns Of Accelerating AI Infrastructure Costs

Facebook parent Meta warns of 'significant acceleration' in expenditures on AI infrastructure as revenue, profits…

2 days ago

AI Helps Boost Microsoft Cloud Revenues By 33 Percent

Microsoft says Azure cloud revenues up 33 percent for September quarter as capital expenditures surge…

2 days ago