[Resource Topic] 2011/428: AES Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for AES-NI -

Welcome to the resource topic for 2011/428

Title:
AES Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for AES-NI -

Authors: Tatsuya TAKEHISA, Hiroki NOGAWA, Masakatu MORII

Abstract:

In this paper, we propose a method for snooping AES encryption key on Virtual Machine Monitor (VMM), and we present countermeasures against this attack. Recently, virtualization technology has rapidly emerged as a key technology for cloud computing. In general, the virtualization technology composes two software parts: one is virtual machine (VM) management software called Virtual Machine Monitor (VMM), and the other is its associated software. The virtualization technology at present does not provide methods for certifying dependability of the VMMs. In this situation, the following case is possible: when malicious service providers serve tampered VMMs and their users run their VMs on these VMMs, the users will suffer unintended information leakage. As one leakage case, in this paper, we propose a method for snooping AES encryption key on the VMM. In addition, we present countermeasures against this key snooping.

ePrint: https://eprint.iacr.org/2011/428

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .