Paper 2011/428

AES Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for AES-NI -

Tatsuya TAKEHISA, Hiroki NOGAWA, and Masakatu MORII

Abstract

In this paper, we propose a method for snooping AES encryption key on Virtual Machine Monitor (VMM), and we present countermeasures against this attack. Recently, virtualization technology has rapidly emerged as a key technology for cloud computing. In general, the virtualization technology composes two software parts: one is virtual machine (VM) management software called Virtual Machine Monitor (VMM), and the other is its associated software. The virtualization technology at present does not provide methods for certifying dependability of the VMMs. In this situation, the following case is possible: when malicious service providers serve tampered VMMs and their users run their VMs on these VMMs, the users will suffer unintended information leakage. As one leakage case, in this paper, we propose a method for snooping AES encryption key on the VMM. In addition, we present countermeasures against this key snooping.

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
Published elsewhere. Unknown where it was published
Keywords
cryptanalysisimplementationAESVirtualizationSide Channel Attack
Contact author(s)
takehisa @ datacom co jp
History
2011-08-12: received
Short URL
https://ia.cr/2011/428
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2011/428,
      author = {Tatsuya TAKEHISA and Hiroki NOGAWA and Masakatu MORII},
      title = {AES Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for AES-NI -},
      howpublished = {Cryptology ePrint Archive, Paper 2011/428},
      year = {2011},
      note = {\url{https://eprint.iacr.org/2011/428}},
      url = {https://eprint.iacr.org/2011/428}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.