The security of virtual machine monitors (VMMs) is a challenging
and active field of research. In particular, due to the increasing
significance of hardware virtualization in cloud solutions, it is
important to clearly understand existing and arising VMM-related
threats. Unfortunately, there is still a lot of confusion around this
topic as many attacks presented in the past have never been implemented
in practice or tested in a realistic scenario
In this paper, we shed light on VM related threats and defences
by implementing, testing, and categorizing a wide range of known
and unknown attacks based on directly assigned devices. We
executed these attacks on an exhaustive set of VMM configurations
to determine their potential impact. Our experiments suggest that
most of the previously known attacks are ineffective in current
VMM setups.
more here...........http://s3.eurecom.fr/docs/asiaccs14_pek.pdf
and active field of research. In particular, due to the increasing
significance of hardware virtualization in cloud solutions, it is
important to clearly understand existing and arising VMM-related
threats. Unfortunately, there is still a lot of confusion around this
topic as many attacks presented in the past have never been implemented
in practice or tested in a realistic scenario
In this paper, we shed light on VM related threats and defences
by implementing, testing, and categorizing a wide range of known
and unknown attacks based on directly assigned devices. We
executed these attacks on an exhaustive set of VMM configurations
to determine their potential impact. Our experiments suggest that
most of the previously known attacks are ineffective in current
VMM setups.
more here...........http://s3.eurecom.fr/docs/asiaccs14_pek.pdf