Data Leakage in Isolated Virtualized Enterprise Computing Systems

Zechariah Wolf, Eric Larson, Mitchell Thornton

2023

Abstract

Previous literature has shown the effectiveness of power analysis as a side channel attack on cryptosystems. Power analysis is performed using an oscilloscope to measure power consumption information from hardware utilized during cryptographic algorithms, in order to extract an encryption key. In this paper, we further explore the potential of power analysis of side channels for leaking information in enterprise computing systems. By applying the concept of power analysis more broadly to the power consumption of an entire server rack, rather than individual hardware components, we find that basic patterns in system load can be clearly identified using signal processing techniques, demonstrating a potential side channel.

Download


Paper Citation


in Harvard Style

Wolf Z., Larson E. and Thornton M. (2023). Data Leakage in Isolated Virtualized Enterprise Computing Systems. In Proceedings of the 9th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-624-8, pages 118-123. DOI: 10.5220/0011691900003405


in Bibtex Style

@conference{icissp23,
author={Zechariah Wolf and Eric Larson and Mitchell Thornton},
title={Data Leakage in Isolated Virtualized Enterprise Computing Systems},
booktitle={Proceedings of the 9th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2023},
pages={118-123},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0011691900003405},
isbn={978-989-758-624-8},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 9th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Data Leakage in Isolated Virtualized Enterprise Computing Systems
SN - 978-989-758-624-8
AU - Wolf Z.
AU - Larson E.
AU - Thornton M.
PY - 2023
SP - 118
EP - 123
DO - 10.5220/0011691900003405