Chapter

Computer Security – ESORICS 2011

Volume 6879 of the series Lecture Notes in Computer Science pp 392-415

Automated Information Flow Analysis of Virtualized Infrastructures

  • Sören BleikertzAffiliated withIBM Research - Zurich
  • , Thomas GroßAffiliated withIBM Research - Zurich
  • , Matthias SchunterAffiliated withIBM Research - Zurich
  • , Konrad ErikssonAffiliated withInfraSight Labs

* Final gross prices may vary according to local VAT.

Get Access

Abstract

The use of server virtualization has been growing steadily, but many enterprises still are reluctant to migrate critical workloads to such infrastructures. One key inhibitor is the complexity of correctly configuring virtualized infrastructures, and in particular, of isolating workloads or subscribers across all potentially shared physical and virtual resources. Imagine analyzing systems with half a dozen virtualization platforms, thousands of virtual machines and hundreds of thousands of inter-resource connections by hand: large topologies demand tool support.

We study the automated information flow analysis of heterogeneous virtualized infrastructures. We propose an analysis system that performs a static information flow analysis based on graph traversal. The system discovers the actual configurations of diverse virtualization environments and unifies them in a graph representation. It computes the transitive closure of information flow and isolation rules over the graph and diagnoses isolation breaches from that. The system effectively reduces the analysis complexity for humans from checking the entire infrastructure to checking a few well-designed trust rules on components’ information flow.