{"title":"Performance Analysis of Linux RNG in Virtualized Environments","authors":"R. Kumari, Mohsen Alimomeni, R. Safavi-Naini","doi":"10.1145/2808425.2808434","DOIUrl":null,"url":null,"abstract":"We consider performance of Linux Random Number Generator(RNG) in virtualized environments and ask, (i) if the emulated hardware can provide sufficient entropy sources for the RNG and, (ii) if the RNG output of the host and the guest are isolated. These are important questions because insufficient entropy results in {\\em entropy starvation}, and the lack of isolation results in the host and the guest RNG output to be correlated. We give detailed comparison of the Linux RNGs that run on a host and a guest in different settings. Our results show that, as expected, hosts have higher entropy sources available and generate entropy at a higher rate (entropy bit per second). We also show that generating disk activity at high rate on the guest results in a significant flow of events from the guest to the host that could possibly be exploited by an adversary to find the output of the host RNG by controlling the guest.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cloud Computing Security Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2808425.2808434","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
We consider performance of Linux Random Number Generator(RNG) in virtualized environments and ask, (i) if the emulated hardware can provide sufficient entropy sources for the RNG and, (ii) if the RNG output of the host and the guest are isolated. These are important questions because insufficient entropy results in {\em entropy starvation}, and the lack of isolation results in the host and the guest RNG output to be correlated. We give detailed comparison of the Linux RNGs that run on a host and a guest in different settings. Our results show that, as expected, hosts have higher entropy sources available and generate entropy at a higher rate (entropy bit per second). We also show that generating disk activity at high rate on the guest results in a significant flow of events from the guest to the host that could possibly be exploited by an adversary to find the output of the host RNG by controlling the guest.