A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit <a rel="external noopener" href="http://vxheaven.org/lib/pdf/Practical%20overview%20of%20a%20Xen%20covert%20channel.pdf">the original URL</a>. The file type is <code>application/pdf</code>.
Practical overview of a Xen covert channel
<span title="2009-08-19">2009</span>
<i title="Springer Nature">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2d7g6o4q6fapxklbwer3jf6asq" style="color: black;">Journal in Computer Virology</a>
</i>
Covert channels have been known since a long time and under various forms. Methods used by designers to exchange information with discretion depend mainly on their creativity. These streams of data are so stealthy that they can be easily used by some dishonest persons or malwares. In an (supposed) other world, the virtualization of operating systems has brought a higher flexibility in the deployment of server farms and shared hosting. It also brings hopes concerning security through
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11416-009-0131-7">doi:10.1007/s11416-009-0131-7</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/p25zas3kazdxpetoywvbgy5aou">fatcat:p25zas3kazdxpetoywvbgy5aou</a>
</span>
more »
... . These two subjects are not so obviously linked, but for each form of new technologie we need to think about past errors to be able to bypass them before they come up. The designer may not know all threats, and new exploitation techniques can appear, more or less planned. In this context, this article explains technologies used by the Xen paravirtualizer about memory management and virtual guests. Thereafter, it explains how to exploit this mechanism to reach a new method of covert channel for virtual machines. Finally, experimental results show that the proof of concept can stealthily transfer data between virtual machines.
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170828235724/http://vxheaven.org/lib/pdf/Practical%20overview%20of%20a%20Xen%20covert%20channel.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/f4/fa/f4faa62cb7d35c6bd73aa9fc62505eb4e5c9b2af.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11416-009-0131-7">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="external alternate icon"></i>
springer.com
</button>
</a>