Abstract
Currently Virtual Machines (VMs) have many applications and their use is growing constantly as the hardware gets more powerful and usage more regulated allowing for scaling, monitoring, portability, security applications and many other uses. There are many types of virtualization techniques that can be employed on many levels from simple sandbox to full fledged streamlined managed access. While scaling, software lifecycles and diversity are just some of security challenges faced by VM developers the failure to properly implement those mechanisms may lead to VM escape, host access, denial of service and more. There are many exploits found in the last couple of years which were fixed on latest versions but some systems are still running them and vulnerable as presented, mostly to host based attacks and some have dramatic consequences.











Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Shroff A, Donthireddy VR—itlinfosys.com. Virtualization imperatives and performance. http://www.infosys.com/IT-services/application-services/white-papers/Documents/virtualization-imperatives-performance.pdf. Accessed 10 Feb 2013
Reuben JS (2007) A survey on virtual machine security, TKK T-110.5290 seminar on network. http://www.tml.tkk.fi/Publications/C/25/papers/Reuben_final.pdf. Accessed 10 Feb 2013
Rose R (2004) Survey of system virtualization techniques. http://citeseer.ist.psu.edu/720518.html. Accessed 10 Feb 2013
Garfinkel T, Rosenblum M (2003) A virtual machine introspection based architecture for intrusion detection. In: Proc. Net. and Distributed Sys. Sec. Symp., Feb 2003
Nellitheertha H—InfoSys.com (2006) Virtualization technologies, white paper. http://216.52.49.31/IT-services/infrastructure-services/white-papers/virtualization-technologies.pdf. Accessed 10 Feb 2013
Reuben JS (2007) A survey on virtual machine security. Helsinki University of Technology. http://www.tml.tkk.fi/Publications/C/25/papers/Reuben_final.pdf. Accessed 10 Feb 2013
Nakajima J, Mallick AK (2007) Hybrid-virtualization—enhanced virtualization for Linux. In: Proc. of the 2007 Linux Symposium, 2007. http://kernel.org/doc/ols/2007/ols2007v2-pages-87-96.pdf. Accessed 10 Feb 2013
Menasc′e DA (2005) Virtualization: concepts, applications, and performance modeling. Int. CMG Conference, Orlando, Florida, USA, pp 407–414
Marinescu D, Kröger R. State of the art in autonomic computing and virtualization. Technical report, Distributed Systems Lab, Wiesbaden University of Applied Sciences. http://wwwvs.cs.hs-rm.de/downloads/extern/pubs/techreports/STAR.pdf. Accessed 10 Feb 2013
Cleeff AV, Pieters W, Wieringa R. Security implications of virtualization: a literature study. University of Twente. http://doc.utwente.nl/67484/1/Security_Implications_of_Virtualization.pdf. Accessed 10 Feb 2013
Garfinkel T, Rosenblum M (2005) When Virtual is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments. Tenth Workshop on Hot Topics in Operating Systems (HotOS), June 2005
Rehman A, Saba T (2012) Evaluation of artificial intelligent techniques to secure information in enterprises. Artif Intell Rev. doi:10.1007/s10462-012-9372-9
Higgins KJ (2007) Vm’s create potential risks. Technical report, dark READING. http://www.darkreading.com/document.asp?doc_id=117908. Accessed 10 Feb 2013
Sailer R, Valdez E, Jaeger T, Perez R, van Doorn L, Griffin JL, Berger S (2005) sHype: secure hypervisor approach to trusted virtualized systems. IBM, Yorktown Heights NY, RC23511
Ferrie P (2007) Attacks on virtual machine emulators. Symantec Advanced Threat Research
King ST, Chen PM (2006) SubVirt: implementing malware with virtual machines. University of Michigan, Ann Arbor
GOODFELLAS Security Research TEAM (2007) [http://goodfellas.shellcode.com.ar]. VmWare Inc version 6.0.0 CreateProcess & CreateProcessEx Remode code execution exploit. http://www.milw0rm.com/exploits/4245. Accessed 10 Feb 2013
Core Security Technologies—CoreLabs Advisory (2008) [http://www.coresecurity.com/corelabs/]. Sun xVM VirtualBox privilege escalation vulnerability. http://www.milw0rm.com/exploits/6218. Accessed 10 Feb 2013
Oberheide J, Cooke E, Jahanian F (2008) Empirical exploitation of live virtual machine migration. http://www.eecs.umich.edu/techreports/cse/2007/CSE-TR-539-07.pdf. Accessed 10 Feb 2013
Mann A (2007) The pros and cons of virtualization.BTQ. http://btquarterly.com/?mc=pros-consvirtualization&page=virt-view%research. Accessed 10 Feb 2013
Vilkeliskis T (2009) Sun’s VirtualBox host reboot PoC. http://www.milw0rm.com/exploits/9323. Accessed 10 Feb 2013
Huston B (2007) Security tip: 3 steps towards securing virtual machines. Security. http://security.itworld.com/4367/nlssecurity071009/page_1.html. Accessed 10 Feb 2013
Kirch J (2007) Virtual machine security guidelines. The center for internet security. http://www.cisecurity.org/tools2/vm/CIS_VM_Benchmark_v1.0.pdf. Accessed 10 Feb 2013
Alfredo. Persistent BIOS Infection. Phrack. [Online]. 13(66). http://phrack.org/issues.html?issue=66&id=7. Accessed 10 Feb 2013
Ferrie P (2013) Attacks on virtual machine Emulators. SYMANTEC ADVANCED THREAT RESEARCH. http://www.symantec.com/avcenter/reference/Virtual_Machine_Threats.pdf. Accessed 10 Feb 2013
Saba T, Rehman A (2012) Effects of artificially intelligent tools on pattern recognition. Int J Mach Learn Cybern. doi:10.1007/s13042-012-0082-z
Acknowledgments
My thanks and appreciation to the Deanship for Scientific Research at King Saud University Riyadh Saudi Arabia for funding this research.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Rehman, A., Alqahtani, S., Altameem, A. et al. Virtual machine security challenges: case studies. Int. J. Mach. Learn. & Cyber. 5, 729–742 (2014). https://doi.org/10.1007/s13042-013-0166-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13042-013-0166-4