Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Detection of side-channel attacks between virtual machines

A side-channel attack and virtual machine technology, applied to computer security devices, instruments, computing, etc., can solve problems such as spying and fear

Inactive Publication Date: 2019-02-05
EMPIRE TECH DEV LLC
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

One barrier preventing customers from migrating to the cloud is the fear of spies from other users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection of side-channel attacks between virtual machines
  • Detection of side-channel attacks between virtual machines
  • Detection of side-channel attacks between virtual machines

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In the following detailed description, reference is made to the accompanying drawings, which form a part of the detailed description. In the drawings, similar symbols typically identify similar components, unless context dictates otherwise. The illustrative embodiments described in the detailed description, drawings, and claims are not meant to be limiting. Other embodiments may be utilized, and other changes may be made, without departing from the spirit or scope of the subject matter presented herein. As generally described herein and illustrated in the drawings, the aspects of the present disclosure may be arranged, substituted, combined, divided and designed in a wide variety of different configurations, all of which are expressly contemplated herein .

[0020] The present disclosure is directed, inter alia, to a method, apparatus, system, apparatus and / or computer program product generally described in relation to the operation of a detector that identifies side-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Technology involves a detector that identifies side-channel attacks between virtual machines. According to some examples, an interprocessor interrupt (IPI) rate of a first virtual machine (VM), a time stamp count (TSC) rate of a second virtual machine, and a cache miss ratio (CMR) of a third virtual machine may be monitored. Side-channel attacks can then be detected based on interprocessor interrupt rates, timestamp count rates, and cache miss ratios.

Description

Background technique [0001] This application is a national phase filing under 35 US.C. §371 of PCT Application Serial No. PCT / US13 / 73140 filed December 4, 2013. This PCT application is hereby incorporated by reference in its entirety. [0002] Unless otherwise indicated herein, the materials described in this section are not prior art to the claims in this application and are not admitted to be prior art by inclusion in this section. [0003] Cloud infrastructure providers can take advantage of economies of scale to provide dynamic and on-demand computing resources at a lower cost. Virtualization is one of the tools available to infrastructure providers to increase efficiency and enhance performance. Virtual machines (VMs) from multiple customers may share physical resources (such as servers). Shared resources can result in multiple mutually distrusting customers simultaneously sharing physical resources from the same provider. Customers may be aware of the shared nature o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/50
CPCG06F21/556G06F9/45533H04L63/1416H04L63/1425H04L63/1466
Inventor K·S·范
Owner EMPIRE TECH DEV LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products