Data Leakage in Isolated Virtualized Enterprise Computing Systems
Zechariah Wolf, Eric Larson, Mitchell Thornton
2023
Abstract
Previous literature has shown the effectiveness of power analysis as a side channel attack on cryptosystems. Power analysis is performed using an oscilloscope to measure power consumption information from hardware utilized during cryptographic algorithms, in order to extract an encryption key. In this paper, we further explore the potential of power analysis of side channels for leaking information in enterprise computing systems. By applying the concept of power analysis more broadly to the power consumption of an entire server rack, rather than individual hardware components, we find that basic patterns in system load can be clearly identified using signal processing techniques, demonstrating a potential side channel.
DownloadPaper Citation
in Harvard Style
Wolf Z., Larson E. and Thornton M. (2023). Data Leakage in Isolated Virtualized Enterprise Computing Systems. In Proceedings of the 9th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-624-8, pages 118-123. DOI: 10.5220/0011691900003405
in Bibtex Style
@conference{icissp23,
author={Zechariah Wolf and Eric Larson and Mitchell Thornton},
title={Data Leakage in Isolated Virtualized Enterprise Computing Systems},
booktitle={Proceedings of the 9th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2023},
pages={118-123},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0011691900003405},
isbn={978-989-758-624-8},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 9th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Data Leakage in Isolated Virtualized Enterprise Computing Systems
SN - 978-989-758-624-8
AU - Wolf Z.
AU - Larson E.
AU - Thornton M.
PY - 2023
SP - 118
EP - 123
DO - 10.5220/0011691900003405