New computer network security threat identified

Feb 22, 2008

Large companies are vulnerable to hackers when they network their computers for cost-saving live virtual machine migration, University of Michigan researchers say.

Virtualization, which allows multiple operating systems, or "virtual machines" and their applications to share one physical server, has been possible for decades, but live virtual machine migration is relatively new.

It allows individual virtual machines to migrate among several servers throughout the day with little service downtime, equalizing the load on the servers as it fluctuates. The security of live virtual machine migration has not been studied extensively, but the set-up is common in large companies today.

Hackers could intercept data and compromise the integrity of a virtual machine's operating system during live migration, said Jon Oberheide, a doctoral candidate in the electrical engineering and computer science department. The most popular software doesn't encrypt the information as it travels from server to server.

How does Oberheide know this? He hacked into his own migrating virtual machines.

"I was setting up a live virtual machine migration network in my office and I started poking around, and I noticed that it was totally insecure," Oberheide said.

As a short-term fix, companies can isolate their migration network from other network traffic or install hardware encryption devices on all their physical servers, Oberheide said.

"The important thing is to raise awareness of the vulnerability," Oberheide said. "Solutions are feasible, but they're not implemented by the most popular vendors. What is really needed is authenticated and encrypted migration so the attacker cannot perform these attacks, so that even if he can see the migration, he can't modify it."

Oberheide details his findings in a talk at the Black Hat D.C. computer security conference this week. He will present the paper, "Empirical Exploitation of Live Virtual Machine Migration." Other authors are research fellow Evan Cooke and professor Farnam Jahanian, both of U-M's Department of Electrical Engineering and Computer Science.

Source: University of Michigan

Explore further: Forging a photo is easy, but how do you spot a fake?

add to favorites email to friend print save as pdf

Related Stories

Cutting the cloud computing carbon cost

Sep 12, 2014

Cloud computing involves displacing data storage and processing from the user's computer on to remote servers. It can provide users with more storage space and computing power that they can then access from anywhere in the ...

Samsung looks on as profits migrate to online ecosystems

Jul 09, 2014

There used to be a time when the launch of a Galaxy handset, a Macbook, or a fancy game console could set investor hearts on fire and firms on a path to untold riches. These days, new devices no longer have ...

Better tissue healing with disappearing hydrogels

Jun 06, 2014

When stem cells are used to regenerate bone tissue, many wind up migrating away from the repair site, which disrupts the healing process. But a technique employed by a University of Rochester research team ...

Recommended for you

Forging a photo is easy, but how do you spot a fake?

Nov 21, 2014

Faking photographs is not a new phenomenon. The Cottingley Fairies seemed convincing to some in 1917, just as the images recently broadcast on Russian television, purporting to be satellite images showin ...

Algorithm, not live committee, performs author ranking

Nov 21, 2014

Thousands of authors' works enter the public domain each year, but only a small number of them end up being widely available. So how to choose the ones taking center-stage? And how well can a machine-learning ...

Professor proposes alternative to 'Turing Test'

Nov 19, 2014

(Phys.org) —A Georgia Tech professor is offering an alternative to the celebrated "Turing Test" to determine whether a machine or computer program exhibits human-level intelligence. The Turing Test - originally ...

Image descriptions from computers show gains

Nov 18, 2014

"Man in black shirt is playing guitar." "Man in blue wetsuit is surfing on wave." "Black and white dog jumps over bar." The picture captions were not written by humans but through software capable of accurately ...

Converting data into knowledge

Nov 17, 2014

When a movie-streaming service recommends a new film you might like, sometimes that recommendation becomes a new favorite; other times, the computer's suggestion really misses the mark. Yisong Yue, assistant ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.