Hausarbeiten logo
Shop
Shop
Tutorials
En De
Shop
Tutorials
  • How to find your topic
  • How to research effectively
  • How to structure an academic paper
  • How to cite correctly
  • How to format in Word
Trends
FAQ
Zur Shop-Startseite › Informatik - IT-Security

Security Issues in Hardware Virtualization

Titel: Security Issues in Hardware Virtualization

Seminararbeit , 2020 , 13 Seiten , Note: 1,3

Autor:in: Samuel Hopstock (Autor:in)

Informatik - IT-Security

Leseprobe & Details   Blick ins Buch
Zusammenfassung Leseprobe Details

Hardware virtualization is the core concept behind the huge success of cloud computing in the last years. Effective isolation among different virtual machines running on the same host is promised, as well as isolation from the operating system that might be present on the host itself. These barriers are necessary, as cloud computing may create a situation where both provider and customer do not trust each other: The provider wants to keep full control over their expensive server hardware and the customer may want to process sensitive data inside their virtual machine that neither the provider nor other customers are allowed to see. As such, there are several attacker models to be considered in this context, both customers and hosting providers wanting to take control over other virtual machines or the physical server itself. In this paper, we consider attacks for each of the attacker models, as well as possible mitigations. In the end, we will find that while preventing VM escapes only really depends on having secure hypervisor implementations, efforts to protect the VM from the host itself are still rather flawed.

Leseprobe


Inhaltsverzeichnis (Table of Contents)

  • Introduction
  • Virtualization Techniques
    • Bare-Metal Virtualization (Type I)
    • Hosted Virtualization (Type II)
  • Attacker Models
    • Guest VM User

Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)

This paper aims to explore security issues associated with hardware virtualization, a key technology behind the rise of cloud computing. The primary focus is on understanding the potential vulnerabilities and threats that arise in the context of isolating different virtual machines running on the same physical host. The paper explores various attacker models and their implications for the security of virtualized environments.

  • Security vulnerabilities in hardware virtualization
  • Attacker models and their implications
  • Mitigation strategies for VM isolation
  • The role of hypervisors in securing virtualized environments
  • The impact of side-channels on virtual machine security

Zusammenfassung der Kapitel (Chapter Summaries)

  • Introduction: This chapter provides an overview of the widespread adoption of cloud computing and the importance of hardware virtualization in this context. The chapter highlights the need for secure isolation between virtual machines and the physical host, particularly given the potential for distrust between service providers and customers.
  • Virtualization Techniques: This chapter discusses the fundamental concepts of virtualization and introduces two primary types of hypervisors: bare-metal and hosted. It explores the advantages and disadvantages of each approach, highlighting their role in managing resources and ensuring isolation between virtual machines.
  • Attacker Models: This chapter introduces various attacker models that might exploit vulnerabilities in virtualized environments. It focuses specifically on the Guest VM User model, where malicious users within a virtual machine attempt to break out of their isolation and gain control over other virtual machines or the physical host itself.

Schlüsselwörter (Keywords)

The main keywords and focus topics of this paper include hardware virtualization, VM escape, hypervisor, security vulnerabilities, attacker models, side-channels, and mitigation strategies. The paper explores the use of technologies like AMD SEV and Intel SGX in enhancing virtual machine security.

Ende der Leseprobe aus 13 Seiten  - nach oben

Details

Titel
Security Issues in Hardware Virtualization
Hochschule
Technische Universität München  (Department of Informatics)
Veranstaltung
Seminar Securing the Linux Kernel - Features and Attack Vectors
Note
1,3
Autor
Samuel Hopstock (Autor:in)
Erscheinungsjahr
2020
Seiten
13
Katalognummer
V933815
ISBN (eBook)
9783346262158
ISBN (Buch)
9783346262165
Sprache
Englisch
Schlagworte
Virtualization VM Escape Hypervisor AMD SEV Intel SGX
Produktsicherheit
GRIN Publishing GmbH
Arbeit zitieren
Samuel Hopstock (Autor:in), 2020, Security Issues in Hardware Virtualization, München, GRIN Verlag, https://www.hausarbeiten.de/document/933815
Blick ins Buch
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
Leseprobe aus  13  Seiten
Hausarbeiten logo
  • Facebook
  • Instagram
  • TikTok
  • Shop
  • Tutorials
  • FAQ
  • Zahlung & Versand
  • Über uns
  • Contact
  • Datenschutz
  • AGB
  • Impressum