发明名称 |
DETECTION OF SIDE CHANNEL ATTACKS BETWEEN VIRTUAL MACHINES |
摘要 |
Technologies are directed to a detector to identify a side channel attack between virtual machines. According to some examples, an inter-processor interrupt (IPI) rate of a first virtual machine (VM), a time stamp counter (TSC) rate of a second VM, and a cache miss ratio (CMR) of a third VM may be monitored. A side channel attack may then be detected based on the IPI rate, the TSC rate, and the CMR. |
申请公布号 |
US2016044059(A1) |
申请公布日期 |
2016.02.11 |
申请号 |
US201314384677 |
申请日期 |
2013.12.04 |
申请人 |
EMPIRE TECHNOLOGY DEVELOPMENT LLC |
发明人 |
Fine Kevin S. |
分类号 |
H04L29/06 |
主分类号 |
H04L29/06 |
代理机构 |
|
代理人 |
|
主权项 |
1. A method to detect a side channel attack between virtual machines, the method comprising:
monitoring an inter-processor interrupt (IPI) rate of a first virtual machine (VM); monitoring a time stamp counter (TSC) rate of a second VM; monitoring a cache miss ratio (CMR) of a third VM; detecting the side channel attack based on the IPI rate, the TSC rate, and the CMR; and labeling the third VM as a victim candidate in response to a detection that the CRM exceeds a predetermined CRM threshold. |
地址 |
Wilimington DE US |