{"id":212860,"created":"2025-01-19T01:13:47.240388+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00212860","sets":["581:10433:10442"]},"path":["10442"],"owner":"44499","recid":"212860","title":["SVTester: Finding DoS Vulnerabilities of Virtual Switches "],"pubdate":{"attribute_name":"公開日","attribute_value":"2021-09-15"},"_buckets":{"deposit":"c43be4f5-7e12-4322-b877-a53eca022b30"},"_deposit":{"id":"212860","pid":{"type":"depid","value":"212860","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"SVTester: Finding DoS Vulnerabilities of Virtual Switches ","author_link":["543723","543726","543728","543725","543724","543727"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"SVTester: Finding DoS Vulnerabilities of Virtual Switches "},{"subitem_title":"SVTester: Finding DoS Vulnerabilities of Virtual Switches ","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[特集:Society 5.0を実現するコンピュータセキュリティ技術] virtual network, security testing, DoS attack","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2021-09-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"National Defense Academy of Japan"},{"subitem_text_value":"National Defense Academy of Japan"},{"subitem_text_value":"National Defense Academy of Japan"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"National Defense Academy of Japan","subitem_text_language":"en"},{"subitem_text_value":"National Defense Academy of Japan","subitem_text_language":"en"},{"subitem_text_value":"National Defense Academy of Japan","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/212860/files/IPSJ-JNL6209011.pdf","label":"IPSJ-JNL6209011.pdf"},"date":[{"dateType":"Available","dateValue":"2023-09-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL6209011.pdf","filesize":[{"value":"579.5 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"5"},{"tax":["include_tax"],"price":"0","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"a2ade60b-1b6d-42b1-b3db-d7da6fc09568","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2021 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Son, Duc Nguyen"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Mamoru, Mimura"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hidema, Tanaka"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Son, Duc Nguyen","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Mamoru, Mimura","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hidema, Tanaka","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Nowadays, virtualization is being deployed in many companies and institutions' systems. However, a noticeable security problem of virtualization is the fact that multiple virtual machines are run on one physical host machine called hypervisor. Hypervisors often implement a virtual switch to manage network connections between the internal virtual network and the external physical network. However, an adversary could exploit virtual switch flaws and use them to sabotage the entire virtual network. As a consequence, the attack could make all applications running on virtual machines unavailable. In this paper, we present SVTester, a fuzzing-based testing tool that can automatically identify possible vulnerabilities of a virtual switch that can be exploited for certain types of Denial-of-Service attack. We used an initial version of SVTester to check several hypervisors that implement the virtual switch. The results show that SVTester was able to rediscover DoS weaknesses on an old version of VMware hypervisor and found a novel possible vulnerability in the Oracle VirtualBox hypervisor. Our results also prove the effectiveness and potential of SVTester in evaluating virtual network security.\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.29(2021) (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.29.581\n------------------------------","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Nowadays, virtualization is being deployed in many companies and institutions' systems. However, a noticeable security problem of virtualization is the fact that multiple virtual machines are run on one physical host machine called hypervisor. Hypervisors often implement a virtual switch to manage network connections between the internal virtual network and the external physical network. However, an adversary could exploit virtual switch flaws and use them to sabotage the entire virtual network. As a consequence, the attack could make all applications running on virtual machines unavailable. In this paper, we present SVTester, a fuzzing-based testing tool that can automatically identify possible vulnerabilities of a virtual switch that can be exploited for certain types of Denial-of-Service attack. We used an initial version of SVTester to check several hypervisors that implement the virtual switch. The results show that SVTester was able to rediscover DoS weaknesses on an old version of VMware hypervisor and found a novel possible vulnerability in the Oracle VirtualBox hypervisor. Our results also prove the effectiveness and potential of SVTester in evaluating virtual network security.\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.29(2021) (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.29.581\n------------------------------","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicIssueDates":{"bibliographicIssueDate":"2021-09-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"9","bibliographicVolumeNumber":"62"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"updated":"2025-01-19T17:20:54.672347+00:00","links":{}}