Thomas Ristenpart,Eran Tromer, Horav Shahcham and Stefan Savage

Slides:



Advertisements
Similar presentations
Distributed System Lab.1 Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds Thomas Ristenpart ¤, Eran Tromer, Hovav.
Advertisements

Memory.
Virtual Switching Without a Hypervisor for a More Secure Cloud Xin Jin Princeton University Joint work with Eric Keller(UPenn) and Jennifer Rexford(Princeton)
Rohit Kugaonkar CMSC 601 Spring 2011 May 9 th 2011
Lecture 5: Cloud Security: what’s new? Xiaowei Yang (Duke University)
Lecture 4: Cloud Computing Security: a first look Xiaowei Yang (Duke University)
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 3 02/15/2010 Security and Privacy in Cloud Computing.
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds Yan Qiang,
Virtualization and Cloud Computing. Definition Virtualization is the ability to run multiple operating systems on a single physical system and share the.
Resource-Freeing Attacks: Improve Your Cloud Performance (at Your Neighbor's Expense) (Venkat)anathan Varadarajan, Thawan Kooburat, Benjamin Farley, Thomas.
Public Clouds (EC2, Azure, Rackspace, …) VM Multi-tenancy Different customers’ virtual machines (VMs) share same server Provider: Why multi-tenancy? Improved.
Hey You, Get Off My Cloud: Exploring information Leakage in third party compute clouds T.Ristenpart, Eran Tromer, Hovav Shacham and Steven Savage ACM CCS.
Hey, You, Get Off of My Cloud
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
By Christopher Moran, Nicoara Talpes 1.  Solution is addressed to VMs that are web servers  Web servers should not have confidential information anyway.
NoHype: Virtualized Cloud Infrastructure without the Virtualization Eric Keller, Jakub Szefer, Jennifer Rexford, Ruby Lee ISCA 2010 Princeton University.
Towards High-Availability for IP Telephony using Virtual Machines Devdutt Patnaik, Ashish Bijlani and Vishal K Singh.
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds by Thomas Ristenpart et al. defended by Ning Xia & Najim Yaqubie.
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds By Thomas Ristenpart Eran Tromer Hovav Shacham Stefan Savage.
Authors: Thomas Ristenpart, et at.
Secure Cloud Computing with Virtualized Network Infrastructure HotCloud 10 By Xuanran Zong.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
1 Integrating a Network IDS into an Open Source Cloud Computing Environment 1st International Workshop on Security and Performance in Emerging Distributed.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 2 02/01/2010 Security and Privacy in Cloud Computing.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds Written by Thomas Ristenpart Eran Tromer Hovav Shacham Stehan.
Eliminating Fine Grained Timers in Xen Bhanu Vattikonda with Sambit Das and Hovav Shacham.
SECURITY IN CLOUD COMPUTING By Bina Bhaskar Anand Mukundan.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Department of Computer Science Engineering SRM University
Microkernels, virtualization, exokernels Tutorial 1 – CSC469.
Jakub Szefer, Eric Keller, Ruby B. Lee Jennifer Rexford Princeton University CCS October, 2011 報告人:張逸文.
Improving Network I/O Virtualization for Cloud Computing.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 4 09/10/2013 Security and Privacy in Cloud Computing.
Virtualization Part 2 – VMware. Virtualization 2 CS5204 – Operating Systems VMware: binary translation Hypervisor VMM Base Functionality (e.g. scheduling)
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
ARP Spoofing Attacks Dr. Neminath Hubballi IIT Indore © Neminath Hubballi.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Cloud security Tom Ristenpart CS Software-as-a-service Infrastructure-as-a- service Cloud providers Cloud computing NIST: Cloud computing is a model.
HEY, YOU, GET OFF OF MY CLOUD: EXPLORING INFORMATION LEAKAGE IN THIRD-PARTY COMPUTE CLOUDS Eran Tromer MIT Hovav Shacham UCSD Stefan Savage UCSD ACM CCS.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
A paper by Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security,
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Visual Studio Windows Azure Portal Rest APIs / PS Cmdlets US-North Central Region FC TOR PDU Servers TOR PDU Servers TOR PDU Servers TOR PDU.
Workpackage 3 New security algorithm design ICS-FORTH Ipswich 19 th December 2007.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Operating Systems Security
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Full and Para Virtualization
DoS/DDoS attack and defense
MIPv6Security: Dimension Of Danger Unauthorized creation (or deletion) of the Binding Cache Entry (BCE).
OSVT 北京大学 1 安全挑战 The practice of multi-tenancy enables various security attacks in the public cloud. There exist attacks that break the logical isolation.
References: “Hey, You, Get Off My Cloud: Exploring Information Leakage in Third-Party Compute Clouds” by Thomas Ristenpart, Eran Tromer – UC San Diego;
Hey, You, Get Off of My Cloud Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage Presented by Daniel De Graaf.
Memory Resource Management in VMware ESX Server By Carl A. Waldspurger Presented by Clyde Byrd III (some slides adapted from C. Waldspurger) EECS 582 –
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Computer Science Infrastructure Security for Virtual Cloud Computing Peng Ning 04/08/111BITS/ Financial Services Roundtable Supported by the US National.
Thomas Ristenpart , Eran Tromer, Hovav Shacham ,Stefan Savage CCS’09
SEMINAR ON.  OVERVIEW -  What is Cloud Computing???  Amazon Elastic Cloud Computing (Amazon EC2)  Amazon EC2 Core Concept  How to use Amazon EC2.
Mapping/Topology attacks on Virtual Machines
Hey, You, Get Off of My Cloud
CONNECTING TO THE INTERNET
Written by : Thomas Ristenpart, Eran Tromer, Hovav Shacham,
IS4680 Security Auditing for Compliance
SPEAKER: Yu-Shan Chou ADVISOR: DR. Kai-Wei Ke
Lecture 3: Secure Network Architecture
Exploring Information Leakage in Third-Party Compute Clouds
Presentation transcript:

Thomas Ristenpart,Eran Tromer, Horav Shahcham and Stefan Savage HEY,YOU,GET OFF MY CLOUD: EXPLORING INFORMATION LEAKAGE IN THIRD-PARTY COMPUTE CLOUDS Thomas Ristenpart,Eran Tromer, Horav Shahcham and Stefan Savage

Third-party cloud computing Microsoft’s Azure and Amazon’s EC2 Usage of Virtualization

Threats and cross-VM attacks Issues on cloud with Transparent sharing of physical resources Multi-tenancy Source of cross-VM attacks Steps for attacks-Placement and Extraction Attacks in multi-process environments

EC2 Service Services for guest Operating Systems – Linux,FreeBSD,OpenSolaris and Windows Xen Hypervisor and Domain0 An Instance Choose region,availability zone and instance-type related to hardware requirements Hardware – 5 types 32 bit – ‘m1.small’ and ‘c1.medium’ 64 bit – ‘m1.large’ ,’m1.xlarge’ and ‘c1.xlarge’ Connectivity to each instance

EC2 architecture

Network probing Study done for understanding VM placement Utilization of nmap,hping,wget Nmap – useful for TCP connect Hping – useful for TCP SYN traceroutes Wget – useful for retrieving web pages Targeted Ports – 80 and 443 Two types of probes – External and Internal

Cloud cartography Mapping the EC2 service DNS of EC2 Two data sets 1. Enumerating public EC2-based web servers 2. Launching a number of EC2 instances

Surveying public servers on ec2 IP address prefixes – a /16, /17, /18, /19 Instance placement parameters

Preventing cloud cartography Providers Reasons Hide the infrastructure Local IP addresses static Difficult Administration Translating victim’s IP address

Determining co-residence Achieving placement Co-resident checks Network based co-resident checks Instances likely co-resident if (1) matching Dom0 IP address, (2) small packet round-trip time, or (3) numerically close internal IP address Veracity of the co-residence checks and Obfuscating co-residence

Exploiting placement in ec2 Towards understanding placement Placement Locality

Brute-forcing placement Strategy - Run numerous instances and see how many targets one can achieve co- residence with Working of the strategy Analysis Number of probe instances – 1785 Number of unique Dom0 IPs – 78 Number of co-residents – 141 Attack achieved 8.4% coverage of target set

Abusing placement locality Attacker launches instances relatively soon after launch of target victim Engagement in instance flooding Dynamic nature of cloud computing Experimental Reports

Effect of increased time lag Window of opportunity an attacker has for launching instances is quite large Result for the experiment measuring the effects of increasing time lag between victim launch and probe launch

Cross-vm information leakage Ability of malicious instances Usage of time-shared caches Stealing cryptographic keys Other channels and denial of service

Measuring cache usage Measuring the utilization of CPU caches Estimation of current load of machine Load Measurement Prime+Trigger+Probe technique

Process of load measurement Contiguous buffer B of b bytes s – Cache line size in bytes To generate each load sample Prime – Read B at s-byte offset Trigger – Busy-loop until the CPU’s cycle counter jumps by a larger value Probe – Measure time it takes to again read B

Cache based covert channel Significant when communication is forbidden Simplest cache-covert channel attack Creation of the effective cross-VM covert channel Partitioning of the cache set Use of differential coding Protocol has three parameters – a, b and d ‘a’ > attacked cache level, ‘b’ < attacked cache level and ‘d’ is cache line size times a power of 2

Defining the difference 1. Allocate a contiguous buffer B of b bytes 2. Sleep briefly 3. Prime – Read all of B 4. Trigger – Busy-loop until CPU’s cycle counter jumps by a larger value 5. Probe – Decide ‘0’ if difference is positive Receiver takes average of multiple samples for making his decision

Load-based co-residence detection Testing co-residence without using network-based techniques Case when the condition holds true - Publicly-accessible service on target and Adversary has a priori information Example – Running a webserver

Estimating traffic rates Load measurement for estimating number of visitors to a co-resident web server Report on initial experimentation with estimation Four separate runs of 1000 cache load measurements in which we sent (1) sent no HTTP requests (2) sent at a rate of 50/minute (3) 100/min (4) 200/min

Keystroke timing attack Measure time between keystrokes Network taps with co-residence and local measurements Spike in load on an otherwise idle machine Experimental setup – Opteron CPUs, Xen Hypervisor and Linux kernels(similar to EC2) Prime+Trigger+Probe load measurement technique to detect spikes Cache sets accessed to filter out false positives Implemented on the machine with variants exploiting L1 or L2 cache Condition for EC2- VMs should time-share a core

Inhibiting side-channel attacks Preventing side-channel vulnerabilities Use of blinding attacks Drawbacks of countermeasures 1. Impractical 2. Confident that all possible-side channels have been disabled Security against cross-VM attacks - Resort to avoiding co-residence

conclusion Mitigating the risks Obfuscate the internal structure of their services and placement policy Employing blinding techniques Customers need to demand for strong privacy requirements

Questions ?