Detection of side channel attacks between virtual machines

A side-channel attack and virtual machine technology, applied to computer security devices, instruments, computing, etc., can solve problems such as spying and fear

Inactive Publication Date: 2016-08-31
EMPIRE TECH DEV LLC
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

One barrier preventing customers from migrating t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection of side channel attacks between virtual machines
  • Detection of side channel attacks between virtual machines
  • Detection of side channel attacks between virtual machines

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In the following detailed description, reference is made to the accompanying drawings, which form a part of the detailed description. In the drawings, similar symbols typically identify similar components, unless context dictates otherwise. The illustrative embodiments described in the detailed description, drawings, and claims are not meant to be limiting. Other embodiments may be utilized, and other changes may be made, without departing from the spirit or scope of the subject matter presented herein. As generally described herein and illustrated in the drawings, the aspects of the present disclosure may be arranged, substituted, combined, divided and designed in a wide variety of different configurations, all of which are expressly contemplated herein .

[0019] The present disclosure is directed, inter alia, to a method, apparatus, system, apparatus and / or computer program product generally described in relation to the operation of a detector that identifies side-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Technologies are directed to a detector to identify a side channel attack between virtual machines. According to some examples, an inter-processor interrupt (IPI) rate of a first virtual machine (VM), a time stamp counter (TSC) rate of a second VM, and a cache miss ratio (CMR) of a third VM may be monitored. A side channel attack may then be detected based on the IPI rate, the TSC rate, and the CMR.

Description

Background technique [0001] Unless otherwise indicated herein, the materials described in this section are not prior art to the claims in this application and are not admitted to be prior art by inclusion in this section. [0002] Cloud infrastructure providers can take advantage of economies of scale to provide dynamic and on-demand computing resources at a lower cost. Virtualization is one of the tools available to infrastructure providers to increase efficiency and enhance performance. Virtual machines (VMs) from multiple customers may share physical resources (such as servers). Shared resources can result in multiple mutually distrusting customers simultaneously sharing physical resources from the same provider. Customers may be aware of the shared nature of the cloud infrastructure. One barrier preventing customers from migrating to the cloud is the fear of spies from other users. Contents of the invention [0003] This disclosure generally describes techniques for ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/50
CPCG06F21/556G06F9/45533H04L63/1416H04L63/1425H04L63/1466
Inventor K·S·范
Owner EMPIRE TECH DEV LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products