z-logo
open-access-imgOpen Access
Systemic threats to hypervisor non‐control data
Author(s) -
Ding Baozeng,
He Yeping,
Wu Yanjun,
Yu Jiageng
Publication year - 2013
Publication title -
iet information security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.308
H-Index - 34
eISSN - 1751-8717
pISSN - 1751-8709
DOI - 10.1049/iet-ifs.2012.0252
Subject(s) - hypervisor , computer science , virtualization , computer security , operating system , data integrity , embedded system , cloud computing
Hypervisors are becoming a widespread virtualisation layer in current computer systems. Recent successful attacks against hypervisors indicate that they face the similar integrity threats as traditional operating systems. Current approaches that secure hypervisors mainly focus on code or control‐data integrity, without paying attention to non‐control data integrity. In this study the authors construct attacks that target hypervisor non‐control data to demonstrate which types of data within the Xen hypervisor are critical to system security. It shows privilege, resource utilisation and security policy related data are vulnerable to return‐oriented programming or DMA attacks. By modifying their values from one to another, the whole system's performance will be affected. By discussing current approaches that secure hypervisors, which are not suitable for non‐control data, the work is to motivate new innovation in this area to protect them.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here