IPSJ SIG Technical Report IaaS VM 1 1 1, 2 IaaS VM VM VM VM VM VM IaaS VM VM VM FBCrypt-V FBCrypt-V VM VMM FBCrypt-V Xen TightVNC VM Preventing Inform

Similar documents
Vol.53 No (Feb. 2012) IaaS 1 1 1, , IaaS VM VM VM VM VM VM IaaS VM IaaS FBCrypt FBCrypt VNC VMM VM VM FBCrypt Xen TightVNC S

VM VM VM VM I/O UVBond VM % 3.2% 2 VM 3 UVBond VM VM VM VM VM VM SSH VNC VM Google [16] 28% [11] 35% [4] VM 1 IaaS VM VM VM VM VM [5]

IPSJ SIG Technical Report Vol.2011-IOT-12 No /3/ , 6 Construction and Operation of Large Scale Web Contents Distribution Platfo

卒業論文2.dvi

VMware VirtualCenter: Virtual Infrastructure Management Software

LAN LAN LAN LAN LAN LAN,, i

デスクトップ仮想化の理解

Web Web ID Web 16 Web Web i

今から間にあう仮想化入門とXenについて

2reN-A14.dvi

Web Web Web Web i

Vol.57 No (Mar. 2016) 1,a) , L3 CG VDI VDI A Migration to a Cloud-based Information Infrastructure to Support

ECU RTOS 1),2) µitron 3) OSEK OS 4) API API DUOS Dual API Real-time OS ECU RTOS RTOS DUOS API ECU-A アプリケーションA RTOS-A CPU 30MHz ECU-B アプリケーションB RTOS-B

1 Microsoft Windows Server 2012 Windows Server Windows Azure Hyper-V Windows Server 2012 Datacenter/Standard Hyper-V Windows Server Windo

HPE Moonshot System HDI ソリューション

WikiWeb Wiki Web Wiki 2. Wiki 1 STAR WARS [3] Wiki Wiki Wiki 2 3 Wiki 5W1H Wiki Web 2.2 5W1H 5W1H 5W1H 5W1H 5W1H 5W1H 5W1H 2.3 Wiki 2015 Informa

1 / 1 idrac8 CPU 1 Intel Xeon E v5 Intel Pentium Intel Core i3 Intel Celeron Intel C236 Microsoft Windows Server 2008 R2 SP1 Microsoft Windows S

PC Development of Distributed PC Grid System,,,, Junji Umemoto, Hiroyuki Ebara, Katsumi Onishi, Hiroaki Morikawa, and Bunryu U PC WAN PC PC WAN PC 1 P

統合運用管理ソフトウェア FUJITSU Software Systemwalker 総合カタログ

IPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS

untitled

Alkanet[1, 2] Alkanet CPU CPU 2 Alkanet Alkanet (VMM) VMM Alkanet Windows Alkanet 1 Alkanet VMM BitVisor[3] BitVisor OS ユーザモード カーネルモード マルウェア観測用 PC VM

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro


2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055

Part 1 IT CPU IT IT 1998 Windows NT Server 4.0, Terminal Server Edition 1 Windows Based Terminal WBT Windows CE 1 100Mbps 1Gbps LAN OS 1 PC 1 OS 2

HPE Moonshot System ~ビッグデータ分析&モバイルワークプレイスを新たなステージへ~

Vol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L

( )

3_23.dvi

PeerPool IP NAT IP UPnP 2) Bonjour 3) PeerPool CPU 4) 2 UPnP Bonjour PeerPool CPU PeerPool PeerPool PPv2 PPv2 2. PeerPool 2.1 PeerPool PeerPool PoolGW

Ver. 3.7 Ver E v3 2.4GHz, 20M cache, 8.00GT/s QPI,, HT, 8C/16T 85W E v3 1.6GHz, 15M cache, 6.40GT/s QPI,, HT,

7,, i

Who is ETGEAR? Milestone ETWORK STORAGE PRODUCTS Who is ETGEAR IDEX 3 ETGEAR Ready DATA ReadyAS ,70,8 0G iscsi X- in $ mil

P2P P2P peer peer P2P peer P2P peer P2P i

11U Dell CPU RAID 1U 1 Intel Xeon E v5 Intel Pentium Intel Core i3 Intel Celeron Intel C236 Microsoft Windows Server 2008 R2/2008 R2 SP1 Standar

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment

template.dvi

1_26.dvi

71-78.indd

, : GUI Web Java 2.1 GUI GUI GUI 2 y = x y = x y = x

Core1 FabScalar VerilogHDL Cache Cache FabScalar 1 CoreConnect[2] Wishbone[3] AMBA[4] AMBA 1 AMBA ARM L2 AMBA2.0 AMBA2.0 FabScalar AHB APB AHB AMBA2.0

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for

The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). The material has been made available on the website

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int

IPSJ SIG Technical Report Vol.2016-ARC-221 No /8/9 GC 1 1 GC GC GC GC DalvikVM GC 12.4% 5.7% 1. Garbage Collection: GC GC Java GC GC GC GC Dalv

Web ( ) [1] Web Shibboleth SSO Web SSO Web Web Shibboleth SAML IdP(Identity Provider) Web Web (SP:ServiceProvider) ( ) IdP Web Web MRA(Mail Retrieval

untitled

IPSJ SIG Technical Report Vol.2014-IOT-27 No.14 Vol.2014-SPT-11 No /10/10 1,a) 2 zabbix Consideration of a system to support understanding of f

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-

IPSJ SIG Technical Report PIN(Personal Identification Number) An Examination of Icon-based User Authentication Method for Mobile Terminals Fum

60 90% ICT ICT [7] [8] [9] 2. SNS [5] URL 1 A., B., C., D. Fig. 1 An interaction using Channel-Oriented Interface. SNS SNS SNS SNS [6] 3. Processing S

MAC root Linux 1 OS Linux 2.6 Linux Security Modules LSM [1] Security-Enhanced Linux SELinux [2] AppArmor[3] OS OS OS LSM LSM Performance Monitor LSMP

スライド 1

WS_EOS_user_Web

DEIM Forum 2009 E

Vol. 28 No. 2 Apr Web Twitter/Facebook UI Twitter Web Twitter/Facebook e.g., Web Web UI 1 2 SNS 1, 2 2

揃 Lag [hour] Lag [day] 35

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf

, IT.,.,..,.. i

Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking

名称未設定

GPGPU

01ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐02ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐03ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐04ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐05ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐06ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六

1 Web Web 1,,,, Web, Web : - i -

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe

Web Web Web Web Web, i

IPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU

: ( ) ( ) 1 *1 *2 *3 [1] *4 () *1 *2 e-portfolio *3 *4 [2] [1] (1) (2) ICT *5 CMS / LMS *6 ([3], ) 2 Mahara[4] () *7 *5 Information and Commu

Fortinet社

Dual Stack Virtual Network Dual Stack Network RS DC Real Network 一般端末 GN NTM 端末 C NTM 端末 B IPv4 Private Network IPv4 Global Network NTM 端末 A NTM 端末 B

FAX-760CLT

名称未設定

”Лï−wŁfl‰IŠv‚æ89“ƒ/‚qfic“NŸH

スライド 1

T330_ indd

MATLAB® における並列・分散コンピューティング ~ Parallel Computing Toolbox™ & MATLAB Distributed Computing Server™ ~

17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System

[2] 2. [3 5] 3D [6 8] Morishima [9] N n 24 24FPS k k = 1, 2,..., N i i = 1, 2,..., n Algorithm 1 N io user-specified number of inbetween omis

IPSJ SIG Technical Report Vol.2014-CG-155 No /6/28 1,a) 1,2,3 1 3,4 CG An Interpolation Method of Different Flow Fields using Polar Inter

Amazon EC2 IaaS (Infrastructure as a Service) HPCI HPCI ( VM) VM VM HPCI VM OS VM HPCI HPC HPCI RENKEI-PoP 2 HPCI HPCI 1 HPCI HPCI HPC CS

(^^

1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan

ActionScript Flash Player 8 ActionScript3.0 ActionScript Flash Video ActionScript.swf swf FlashPlayer AVM(Actionscript Virtual Machine) Windows

Iteration 0 Iteration 1 1 Iteration 2 Iteration 3 N N N! N 1 MOPT(Merge Optimization) 3) MOPT MOP

Wi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i

21 e-learning Development of Real-time Learner Detection System for e-learning


1996 Only One Technology NetJapan System Data Protection Solutions 2009 ActiveImage Protector ActiveImage Protector OS NetJapan System Protection Solu

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS ) GPS Global Positioning System

080528LinuxWorldXen入門

KASPERSKY ENDPOINT SECURITY FOR BUSINESS IT IT IT IT IT Kaspersky Endpoint Security for Business IT IT IT IT 2013 NAC Advanced 2013 Select Select Work

Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain forward-looking statements that involv

HP ProLiant 500シリーズ

FabHetero FabHetero FabHetero FabCache FabCache SPEC2000INT IPC FabCache 0.076%

,480 9,720 12,960 19,440 3,240 3, ,440 9,660 12,880 19,320 3,220 3, ,390 9,580 12,780 19,170 3,195 3, ,350 9,520

Transcription:

IaaS VM 1 1 1, 2 IaaS VM VM VM VM VM VM IaaS VM VM VM FBCrypt-V FBCrypt-V VM VMM FBCrypt-V Xen TightVNC VM Preventing Information Leakage from Screens via Management VMs in IaaS Naoki Nishimura, 1 Tomohisa Egawa 1 and Kenichi Kourai 1, 2 In IaaS clouds, the users manage their virtual machines (user VMs) remotely. Even at failures on user VMs, they can perform remote management if they access their VMs via privileged VMs called management VMs. However, since management VMs are not always trustworthy in IaaS, screen information of user VMs may leak. To solve this problem, this paper proposes FBCrypt-V, which prevents information leakage from screens of the user VMs via the management VMs. FBCrypt-V replicates and encrypts the virtual frame buffers of the user VMs in the VMM and decrypts them in the client sides. We have implemented FBCrypt-V in Xen and TightVNC and confirmed that screen information does not leak. 1 2 CREST 1. Infrastructure as a Service IaaS VM VM VNC SSH VM VM Desktop as a Service DaaS VM OS VM VM VM VM VM VM VM IaaS VM VM VM VM VM VM FBCrypt-V FBCrypt-V VM VFB VMM VM VFB 2 VFB VMM VFB VM FBCrypt-V VMM Linux FBCrypt-V Xen 4.1.1 1) TightVNC Java Viewer 2.0.95 2) VMM VM VM VFB VM VFB VM VNC 2 VFB VFB RC5 3) FBCrypt-V VM VNC VM 1 c 2012 Information Processing Society of Japan

2 IaaS 3 FBCrypt-V 4 5 FBCrypt-V 6 7 2. VM IaaS VNC VM VNC VM VM VNC VM VM VNC VM OS OS VNC VM 1 VM VNC VM VM VM VM VM VM VM VM VM OS IaaS Xen VMware ESX VM VM VM VM VM IaaS VM VM VM VM VM VM VM VM VM 1 VM VNC 1 VNC VNC VPN SSH VM VM VNC VM VNC VM VM VM DaaS 3. FBCrypt-V VM VM FBCrypt-V 3.1 FBCrypt-V VM VM VM VM 2 c 2012 Information Processing Society of Japan

3 2 FBCrypt-V VM VM PC VNC 3.2 FBCrypt-V FBCrypt-V 2 VMM VM VFB VFB VM VFB VM VFB VMM VM VFB 2 VFB VM VNC VFB VNC VNC VM FBCrypt-V VM VM VM VM VFB VFB VMM VFB VM VNC VNC VM VFB FBCrypt-V VMM VMM TPM VMM VNC VMM 3 VM VMM VMM IaaS VMM VNC VMM VM VM VMM VMM VNC VMM VNC VMM TPM VMM 3 c 2012 Information Processing Society of Japan

VM VMM 4. FBCrypt-V Xen 4.1.1 1) TightVNC Java Viewer 2.0.95 2) Xen VM 0 VM U VM QEMU VNC VM OS Linux 2.6.39.3 4.1 FBCrypt-V U VFB Linux U VFB 0 U Linux fbfront VFB U VFB 0 VFB 0 FBCrypt-V VMM U VFB VMM U VFB 0 0 U VFB FBCrypt-V 0 VFB 2 VFB U VFB 0 VMM VFB 0 VFB 0 VNC VFB VNC VNC U VFB VNC 4.2 VFB FBCrypt VMM VFB VMM VFB VFB U 0 U VFB 0 VFB U 0 XenStore 4 U VFB VMM U XenStore VFB 0 VFB VFB VMM U OS U XenStore VMM U 0 XenBus XenBus XenStore XenStore 2 U XenStore 16 XenStore XenStore VFB device/vfb/0/page-ref VFB XenBus 0 VMM XenStore VMM XenStore 1 VFB VFB VMM U 0 U XenStore XenStore 0 U VMM VMM U 4 c 2012 Information Processing Society of Japan

5 VFB CPU RSI VMM VFB VFB VFB VFB VFB VFB VFB U VFB VMM VFB VFB VMM VFB VFB VFB FBCrypt-V 0 U VFB 0 U VMM 0 VFB VMM VFB 4.3 VFB FBCrypt-V U VFB VMM VFB U fbfront XenBus 0 VNC XenBus U 0 VMM VFB VFB I/O I/O 0 VMM 2 VFB VFB U X x 0 VFB VFB VMM RC5 3) RC5 Xen VFB 32 FBCrypt-V RC5 x y FBCrypt-V 2 Xen VNC 32 8 32 VNC 24 2 48 I/O x VNC VNC Xen 2 5 c 2012 Information Processing Society of Japan

6 7 5. VM Intel Core i7 870 CPU 4GB VNC Intel Xeon W3550 CPU 6GB VMM FBCrypt-V Xen 4.1.1 0 U OS Linux 2.6.39.3 0 2GB U 1GB VNC FBCrypt-V TightVNC Java Viewer 2.0.95 Windows 7 Java 1.6.0 24 5.1 0 U VNC VFB VFB U FBCrypt-V VNC 6 FBCrypt-V VMM VFB VM VM 6 FBCrypt-V VM VM 5.2 FBCrypt-V 800 600 U 1.4MB RC5 16 192 7 13ms VMM C TighetVNC Java 5.3 FBCrypt-V VNC U VNC VNC 6 c 2012 Information Processing Society of Japan

8 9 VNC U 8 FBCrypt-V 48ms VNC FBCrypt-V VMM FBCrypt-V 1 3 9 VNC VM 1 6. FBCrypt 4) VM VM VNC VMM VM VM VMCrypt 5) VM VM VM VM VMM VM VM VM VFB FBCrypt-V VFB VMCrypt VFB VMware vsphere Hypervisor (ESXi) 6) VMM VNC VMM VM VM VM VNC FBCrypt-V VNC VMM VMM 7 c 2012 Information Processing Society of Japan

Xoar 7) VNC QEMU QemuVM VM Xen QEMU VM VM OS mini-os VM VNC BitVisor 8) OS VMM OS I/O VMM USB PC BitVisor VM VMM VMM CloudVisor 9) VMM VM CloudVisor VM VMM VM VM VMM Xen VNC Proxy xvp 10) VM VM xvp VM VM VM xvp VNC 7. VM VM FBCrypt-V FBCrypt-V VM VFB VMM VNC VM FBCrypt-V Xen TightVNC VM AES AES 128 16 VNC FBCrypt VM Windows OS 1) P.Barham, B.Dragovic, K.Fraser, S.Hand, T.Harris, A.Ho, R.Neugebauer, I.Pratt, and A.Warfield. Xen and the Art of Virtualization. In Proc. of the 19th Symposium on Operating Systems Principles, pp. 164 177, 2003. 2) TightVNC Group. TightVNC. http://www.tightvnc.com/. 3) RonaldL. Rivest. The RC5 Encryption Algorithm. 2001. 4),. VM. 118 OS, 2011. 5),,. IaaS VM. 117 OS, 2011. 6) VMware Inc. VMware vsphere Hypervisor. http://www.vmware.com/. 7) Patrick Colp, Mihir Nanavati, Jun Zhu, William Aiello, George Coker, Tim Deegan, Pete Loscocco, and Andrew Warfield. Breaking Up is Hard to Do: Security and Functionality in a Commodity Hypervisor. 23rd ACM Symposium on Operating Systems Principles (SOSP), 2011. 8) Takahiro Shinagawa, Hideki Eiraku, Kouichi Tanimoto, Kazumasa Omote, Shoichi Hasegawa, Takashi Horie, Manabu Hirano, Kenichi Kourai, Yoshihiro Oyama, Eiji Kawai, Kenji Kono, Shigeru Chiba, Yasushi Shinjo, and Kazuhiko Kato. BitVisor. Proc. Intl. Conf. Virtual Execution Environments and VEE 09, pp. 121 130, 2009. 9) Fengzhe Zhang, Jin Chen, Haibo Chen, and Binyu Zang. CloudVisor: Retrofitting Protection of Virtual Machines in Multi-tenant Cloud with Nested Virtualization. 2011. 10) xvp Project. Xen VNC Proxy Cross-platform VNC-based and Web-based Management for Citrix XenServer and Xen Cloud Platform. http://www.xvpsource.org/. 8 c 2012 Information Processing Society of Japan