Paper 2011/428
AES Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for AES-NI -
Tatsuya TAKEHISA, Hiroki NOGAWA, and Masakatu MORII
Abstract
In this paper, we propose a method for snooping AES encryption key on Virtual Machine Monitor (VMM), and we present countermeasures against this attack. Recently, virtualization technology has rapidly emerged as a key technology for cloud computing. In general, the virtualization technology composes two software parts: one is virtual machine (VM) management software called Virtual Machine Monitor (VMM), and the other is its associated software. The virtualization technology at present does not provide methods for certifying dependability of the VMMs. In this situation, the following case is possible: when malicious service providers serve tampered VMMs and their users run their VMs on these VMMs, the users will suffer unintended information leakage. As one leakage case, in this paper, we propose a method for snooping AES encryption key on the VMM. In addition, we present countermeasures against this key snooping.
Metadata
- Available format(s)
- Category
- Foundations
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- cryptanalysisimplementationAESVirtualizationSide Channel Attack
- Contact author(s)
- takehisa @ datacom co jp
- History
- 2011-08-12: received
- Short URL
- https://ia.cr/2011/428
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2011/428, author = {Tatsuya TAKEHISA and Hiroki NOGAWA and Masakatu MORII}, title = {{AES} Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for {AES}-{NI} -}, howpublished = {Cryptology {ePrint} Archive, Paper 2011/428}, year = {2011}, url = {https://eprint.iacr.org/2011/428} }