Defeating TCG TOCTOU Attacks in Trusted HVM

Xiaolin Chang,Han Zhen,JiQiang Liu,Bin Xing,Jogesh K. Muppala
DOI: https://doi.org/10.1109/mines.2010.131
2010-01-01
Abstract:Virtualization technologies have been explored to mitigate the vulnerabilities in the current TCG architecture. But only a small number of efforts address the handling of the detected TCG TOCTOU attacks. This paper aims to defeat TCG TOCTOU attacks occurring in Xen hardware virtual machines. We propose an efficient response approach (ERA) in the environment of the Xen virtual machine monitor and the virtual TPM facility shipped with the Xen. ERA has the following features: (1) Effective in defeating the TCG TOCTOU attacks; (2) Impose less overhead on the system during normal execution; and (3) Transparent to guest virtual machines. We describe the ERA implementation in detail and evaluate its ability via experiments.
What problem does this paper attempt to address?