Yetian Xia, Xiaochao Zi, Lihong Yao, Li Pan, Jianhua Li
{"title":"Constructing the On/Off Covert Channel on Xen","authors":"Yetian Xia, Xiaochao Zi, Lihong Yao, Li Pan, Jianhua Li","doi":"10.1109/CIS.2012.133","DOIUrl":null,"url":null,"abstract":"Virtualization technology is the basis of cloud computing. Multiple virtual machines on a single physical host are isolated from each other. However, covert channel breaks the isolation and leaks sensitive information covertly. In this paper, we construct one type of classic covert timing channel, the on/off channel, on the Xen hyper visor using shared memory. And then we evaluate its bit rate and transmission accuracy. The results show that this type of covert channel is a threat to virtualization technology.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"97 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Eighth International Conference on Computational Intelligence and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.2012.133","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
Virtualization technology is the basis of cloud computing. Multiple virtual machines on a single physical host are isolated from each other. However, covert channel breaks the isolation and leaks sensitive information covertly. In this paper, we construct one type of classic covert timing channel, the on/off channel, on the Xen hyper visor using shared memory. And then we evaluate its bit rate and transmission accuracy. The results show that this type of covert channel is a threat to virtualization technology.