Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

SEVered: Subverting AMD's virtual machine encryption

 
: Morbitzer, Mathias; Huber, Manuel; Horsch, Julian; Wessel, Sascha

:
Postprint urn:nbn:de:0011-n-4940886 (1.1 MByte PDF)
MD5 Fingerprint: 2b1790190d1d530693c3885a5f3df4d8
© ACM This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution.
Erstellt am: 15.5.2018


Association for Computing Machinery -ACM-:
EuroSec 2018, 11th European Workshop on Systems Security. Proceedings : Porto, Portugal, April 23 - 26, 2018
New York: ACM, 2018
ISBN: 978-1-4503-5652-7
Art. 1, 6 S.
European Workshop on Systems Security (EuroSec) <11, 2018, Porto>
Bundesministerium für Wirtschaft und Technologie BMWi
01MD16004B; CAR-BITS.de
Englisch
Konferenzbeitrag, Elektronische Publikation
Fraunhofer AISEC ()
AMD SEV; virtual machine encryption; page fault side channel; data extraction

Abstract
AMD SEV is a hardware feature designed for the secure encryption of virtual machines. SEV aims to protect virtual machine memory not only from other malicious guests and physical attackers, but also from a possibly malicious hypervisor. This relieves cloud and virtual server customers from fully trusting their server providers and the hypervisors they are using. We present the design and implementation of SEVered, an attack from a malicious hypervisor capable of extracting the full contents of main memory in plaintext from SEV-encrypted virtual machines. SEVered neither requires physical access nor colluding virtual machines, but only relies on a remote communication service, such as a web server, running in the targeted virtual machine. We verify the effectiveness of SEVered on a recent A MD SEV-enabled server platform running different services, such as web or SSH servers, in encrypted virtual machines. With these examples, we demonstrate that SEVered reliably and efficiently extracts all memory contents even in scenarios where the targeted virtual machine is under high load.

: http://publica.fraunhofer.de/dokumente/N-494088.html