Skip to main content

Exploiting Virtual File Formats for Fun and Profit

  • Chapter
  • First Online:
ISSE 2012 Securing Electronic Business Processes
  • 1224 Accesses

Abstract

Virtual file formats describe entities of virtualization such as virtual machines or virtual hard drives. As virtualization technologies are part of almost every IT environment, all entities contributing to these technologies bare the potential to contain vulnerabilities – either in a technical or design way. In order to elaborate a new class of attacks in Cloud environments which is based on virtual file formats, this paper describes characteristics of these formats, analyzes potential attack vectors and describes found vulnerabilities. The impact of these vulnerabilities allows the access to the hypervisor from within a virtual guest system – the worst case of any threat modeling in virtual environments. This impact will also be used to illustrate how traditional trust and security models have to be adjusted in order to address the architectural changes introduced by Cloud environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literature

  1. Mell, Peter and Grance, Tomothy, NIST SP 800-145: The NIST Definition of Cloud Computing, NIST 2011

    Google Scholar 

  2. Catteddu, Daniele and Hogben, Giles, Cloud Computing Risk Assessment, ENISA, 2009

    Google Scholar 

  3. Rey, Enno and Luft, Matthias, The Key To Your Datacenter, Insinuator.net, 2011, http://www.insinuator.net/2011/07/the-key-to-your-datacenter/

  4. Somorovsky, Juraj and Heiderich, Mario, and Jensen, Meiko and Schwenk, Jörg and Gruschka,Nils and Iacono, Nils, All Your Clouds Are Belong To Us, Okt 2011,

    Google Scholar 

  5. Kostya Kortchinsky, Cloudburst, BlackHat US 2009.

    Google Scholar 

  6. Nelson Elhage, Virtunoid: Breaking out of KVM, Defcon 2011.

    Google Scholar 

  7. VMware, VMDK Technote, 2007.

    Google Scholar 

  8. VMware, Security Advisory 2010-0004, 2010.

    Google Scholar 

  9. VMware, Security Advisory 2011-007, 2011

    Google Scholar 

  10. Vanson Bourne, http://v-index.com, July 2012

  11. Anderson N.: How one man tracked down Anonymous—and paid a heavy price, Ars Technica, February 10, 2011, http://arstechnica.com/tech-policy/2011/02/how-one-security-firmtracked- anonymousand-paid-a-heavy-price/ retrived March 15, 2011

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Enno Rey .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Fachmedien Wiesbaden

About this chapter

Cite this chapter

Rey, E., Turbing, P., Mende, D., Luft, M. (2012). Exploiting Virtual File Formats for Fun and Profit. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2012 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-00333-3_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-658-00333-3_28

  • Published:

  • Publisher Name: Springer Vieweg, Wiesbaden

  • Print ISBN: 978-3-658-00332-6

  • Online ISBN: 978-3-658-00333-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics