TY - JOUR
T1 - Denial-of-Service attacks on PCI passthrough devices
T2 - Demonstrating the impact on network- and storage-I/O performance
AU - Richter, Andre
AU - Herber, Christian
AU - Wild, Thomas
AU - Herkersdorf, Andreas
N1 - Publisher Copyright:
© 2015 Elsevier B.V. All rights reserved.
PY - 2015/11/1
Y1 - 2015/11/1
N2 - PCI Passthrough is an established x86 server technology for directly assigning PCIe devices to Virtual Machines (VMs). In combination with Single Root I/O Virtualization, which enables concurrent sharing of single physical PCIe I/O devices, PCI Passthrough enables low overhead and high performance I/O virtualization. Besides server environments, the combination is also a promising approach for sharing I/O in future multi-core embedded systems. In this paper, we demonstrate that PCI Passthrough has yet-to-be-solved problems regarding performance isolation, because it is prone to Denial-of-Service (DoS) attacks. VMs executing DoS attacks on Passthrough devices can degrade the I/O performance of devices that share PCIe links with the DoS victim, which may affect concurrent VMs and the host. We evaluate how attacks on an SR-IOV capable Gigabit Ethernet NIC cause a degradation of the system's network- and storage-I/O performance. The attacked NIC's TCP throughput drops by 35%; other NICs that share PCIe links with the victim see degradations of 46% and 65%; performance of a host-assigned SSD degrades by 77%. We investigate what influences the severity of such attacks and introduce three protection approaches.
AB - PCI Passthrough is an established x86 server technology for directly assigning PCIe devices to Virtual Machines (VMs). In combination with Single Root I/O Virtualization, which enables concurrent sharing of single physical PCIe I/O devices, PCI Passthrough enables low overhead and high performance I/O virtualization. Besides server environments, the combination is also a promising approach for sharing I/O in future multi-core embedded systems. In this paper, we demonstrate that PCI Passthrough has yet-to-be-solved problems regarding performance isolation, because it is prone to Denial-of-Service (DoS) attacks. VMs executing DoS attacks on Passthrough devices can degrade the I/O performance of devices that share PCIe links with the DoS victim, which may affect concurrent VMs and the host. We evaluate how attacks on an SR-IOV capable Gigabit Ethernet NIC cause a degradation of the system's network- and storage-I/O performance. The attacked NIC's TCP throughput drops by 35%; other NICs that share PCIe links with the victim see degradations of 46% and 65%; performance of a host-assigned SSD degrades by 77%. We investigate what influences the severity of such attacks and introduce three protection approaches.
KW - Passthrough I/O
KW - Performance Isolation
KW - SR-IOV
KW - Virtualization
UR - http://www.scopus.com/inward/record.url?scp=84948583921&partnerID=8YFLogxK
U2 - 10.1016/j.sysarc.2015.07.003
DO - 10.1016/j.sysarc.2015.07.003
M3 - Article
AN - SCOPUS:84948583921
SN - 1383-7621
VL - 61
SP - 592
EP - 599
JO - Journal of Systems Architecture
JF - Journal of Systems Architecture
IS - 10
ER -