SlideShare a Scribd company logo
1 of 3
Download to read offline
Swiper: Exploiting Virtual Machine Vulnerability in Third-Party Clouds
with Competition for I/O Resources
Abstract:
The emerging paradigm of cloud computing, e.g., Amazon Elastic
Compute Cloud (EC2), promises a highly flexible yet robust environment
for large-scale applications. Ideally, while multiple virtual machines (VM)
share the same physical resources (e.g., CPUs, caches, DRAM, and I/O
devices), each application should be allocated to an independently
managed VM and isolated from one another. Unfortunately, the absence of
physical isolation inevitably opens doors to a number of security threats. In
this paper, we demonstrate in EC2 a new type of security vulnerability
caused by competition between virtual I/O workloads-i.e., by leveraging
the competition for shared resources, an adversary could intentionally slow
down the execution of a targeted application in a VM that shares the same
hardware. In particular, we focus on I/O resources such as hard-drive
throughput and/or network bandwidth-which are critical for data-intensive
applications. We design and implement Swiper, a framework which uses a
carefully designed workload to incur significant delays on the targeted
application and VM with minimum cost (i.e., resource consumption). We
conduct a comprehensive set of experiments in EC2, which clearly
demonstrates that Swiper is capable of significantly slowing down various
server applications while consuming a small amount of resources.
Hardware Requirements:
• System : Pentium IV 2.4 GHz.
• Hard Disk ` : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• RAM : 256 Mb.
Software Requirements:
• Operating system : - Windows XP.
• Front End : - JSP
• Back End : - SQL Server
Software Requirements:
• Operating system : - Windows XP.
• Front End : - .Net
• Back End : - SQL Server

More Related Content

What's hot

A tutorial on CloudSim
A tutorial on CloudSimA tutorial on CloudSim
A tutorial on CloudSimHabibur Rahman
 
Cloudsim & Green Cloud
Cloudsim & Green CloudCloudsim & Green Cloud
Cloudsim & Green CloudNeda Maleki
 
Clearing The Air On Cloud
Clearing The Air On CloudClearing The Air On Cloud
Clearing The Air On CloudChris Yeo
 
Amazon Virtual Private Cloud
Amazon Virtual Private CloudAmazon Virtual Private Cloud
Amazon Virtual Private CloudElastra
 
Cloud computing
Cloud computingCloud computing
Cloud computingSabaSam3
 
What is Virtualization. Talk from Pycon 2013 India.
What is Virtualization. Talk from Pycon 2013 India.What is Virtualization. Talk from Pycon 2013 India.
What is Virtualization. Talk from Pycon 2013 India.Rahul Krishna Upadhyaya
 
Windows Azure presentation By Kamlesh Asati
Windows Azure presentation By Kamlesh AsatiWindows Azure presentation By Kamlesh Asati
Windows Azure presentation By Kamlesh AsatiKartik Asati
 
Presenting Cloud Computing
Presenting Cloud ComputingPresenting Cloud Computing
Presenting Cloud ComputingNaveen Karn
 
Study and implementation a cloud solution based on
Study and implementation a cloud solution based onStudy and implementation a cloud solution based on
Study and implementation a cloud solution based onDendani Bilal
 
An adaptive distributed simulator for cloud andmap reduce algorithms and arch...
An adaptive distributed simulator for cloud andmap reduce algorithms and arch...An adaptive distributed simulator for cloud andmap reduce algorithms and arch...
An adaptive distributed simulator for cloud andmap reduce algorithms and arch...Pradeeban Kathiravelu, Ph.D.
 
A tutorial on GreenCloud
A tutorial on GreenCloudA tutorial on GreenCloud
A tutorial on GreenCloudHabibur Rahman
 
SECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTING
SECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTINGSECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTING
SECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTINGTannishtha Sengupta
 
Cloudsim & greencloud
Cloudsim & greencloud Cloudsim & greencloud
Cloudsim & greencloud nedamaleki87
 

What's hot (20)

Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
A tutorial on CloudSim
A tutorial on CloudSimA tutorial on CloudSim
A tutorial on CloudSim
 
Cloudsim & Green Cloud
Cloudsim & Green CloudCloudsim & Green Cloud
Cloudsim & Green Cloud
 
Clearing The Air On Cloud
Clearing The Air On CloudClearing The Air On Cloud
Clearing The Air On Cloud
 
Amazon Virtual Private Cloud
Amazon Virtual Private CloudAmazon Virtual Private Cloud
Amazon Virtual Private Cloud
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Microsoft azure kt
Microsoft azure ktMicrosoft azure kt
Microsoft azure kt
 
Harshit.ppt
Harshit.pptHarshit.ppt
Harshit.ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
What is Virtualization. Talk from Pycon 2013 India.
What is Virtualization. Talk from Pycon 2013 India.What is Virtualization. Talk from Pycon 2013 India.
What is Virtualization. Talk from Pycon 2013 India.
 
Cloud sim
Cloud simCloud sim
Cloud sim
 
Ankit ppt
Ankit pptAnkit ppt
Ankit ppt
 
Windows Azure presentation By Kamlesh Asati
Windows Azure presentation By Kamlesh AsatiWindows Azure presentation By Kamlesh Asati
Windows Azure presentation By Kamlesh Asati
 
Presenting Cloud Computing
Presenting Cloud ComputingPresenting Cloud Computing
Presenting Cloud Computing
 
Study and implementation a cloud solution based on
Study and implementation a cloud solution based onStudy and implementation a cloud solution based on
Study and implementation a cloud solution based on
 
An adaptive distributed simulator for cloud andmap reduce algorithms and arch...
An adaptive distributed simulator for cloud andmap reduce algorithms and arch...An adaptive distributed simulator for cloud andmap reduce algorithms and arch...
An adaptive distributed simulator for cloud andmap reduce algorithms and arch...
 
A tutorial on GreenCloud
A tutorial on GreenCloudA tutorial on GreenCloud
A tutorial on GreenCloud
 
SECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTING
SECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTINGSECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTING
SECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTING
 
Cloudsim & greencloud
Cloudsim & greencloud Cloudsim & greencloud
Cloudsim & greencloud
 

Viewers also liked

Aarbog 14 1984_titel_og_indholdfortegnelse
Aarbog 14 1984_titel_og_indholdfortegnelseAarbog 14 1984_titel_og_indholdfortegnelse
Aarbog 14 1984_titel_og_indholdfortegnelseSFAH
 
Matematicas 4º eso areas y volumenes problemas con solucion
Matematicas 4º eso areas y volumenes problemas con solucionMatematicas 4º eso areas y volumenes problemas con solucion
Matematicas 4º eso areas y volumenes problemas con solucionmgarmon965
 
Andreina arevalo la empresa
Andreina arevalo la empresaAndreina arevalo la empresa
Andreina arevalo la empresaandreina arevalo
 
Photo Management System Software
Photo Management System SoftwarePhoto Management System Software
Photo Management System SoftwareShiva Infotech
 
Organizacion Ing. Edgar Orta
Organizacion Ing. Edgar OrtaOrganizacion Ing. Edgar Orta
Organizacion Ing. Edgar Ortaedgarortablanco
 
Alternating direction-implicit-finite-difference-method-for-transient-2 d-hea...
Alternating direction-implicit-finite-difference-method-for-transient-2 d-hea...Alternating direction-implicit-finite-difference-method-for-transient-2 d-hea...
Alternating direction-implicit-finite-difference-method-for-transient-2 d-hea...Abimbola Ashaju
 

Viewers also liked (12)

Aarbog 14 1984_titel_og_indholdfortegnelse
Aarbog 14 1984_titel_og_indholdfortegnelseAarbog 14 1984_titel_og_indholdfortegnelse
Aarbog 14 1984_titel_og_indholdfortegnelse
 
Mapa empatía
Mapa empatíaMapa empatía
Mapa empatía
 
Matematicas 4º eso areas y volumenes problemas con solucion
Matematicas 4º eso areas y volumenes problemas con solucionMatematicas 4º eso areas y volumenes problemas con solucion
Matematicas 4º eso areas y volumenes problemas con solucion
 
Andreina arevalo la empresa
Andreina arevalo la empresaAndreina arevalo la empresa
Andreina arevalo la empresa
 
CA-Rishu chitkara (1)
CA-Rishu chitkara (1)CA-Rishu chitkara (1)
CA-Rishu chitkara (1)
 
Photo Management System Software
Photo Management System SoftwarePhoto Management System Software
Photo Management System Software
 
E commerce
E commerceE commerce
E commerce
 
Brief spaghettifestijn verkenners
Brief spaghettifestijn verkennersBrief spaghettifestijn verkenners
Brief spaghettifestijn verkenners
 
Organizacion Ing. Edgar Orta
Organizacion Ing. Edgar OrtaOrganizacion Ing. Edgar Orta
Organizacion Ing. Edgar Orta
 
Alternating direction-implicit-finite-difference-method-for-transient-2 d-hea...
Alternating direction-implicit-finite-difference-method-for-transient-2 d-hea...Alternating direction-implicit-finite-difference-method-for-transient-2 d-hea...
Alternating direction-implicit-finite-difference-method-for-transient-2 d-hea...
 
Ang mundo
Ang mundoAng mundo
Ang mundo
 
38624866 gardu-distribusi
38624866 gardu-distribusi38624866 gardu-distribusi
38624866 gardu-distribusi
 

Similar to Swiper exploiting virtual machine vulnerability in third party clouds with competition for io resources

Cloud computing
Cloud computingCloud computing
Cloud computingprasanth82
 
The IoT Academy_awstraining_part2_aws_ec2_iaas
The IoT Academy_awstraining_part2_aws_ec2_iaasThe IoT Academy_awstraining_part2_aws_ec2_iaas
The IoT Academy_awstraining_part2_aws_ec2_iaasThe IOT Academy
 
Ericsson Cloud Computing
Ericsson Cloud Computing Ericsson Cloud Computing
Ericsson Cloud Computing scotgardner
 
Whitepaper nebucom intelligent application broking and provisioning in a hybr...
Whitepaper nebucom intelligent application broking and provisioning in a hybr...Whitepaper nebucom intelligent application broking and provisioning in a hybr...
Whitepaper nebucom intelligent application broking and provisioning in a hybr...Nebucom
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyKingsley Mensah
 
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky ModelSecurity Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky ModelIOSR Journals
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingKelvin Lam
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 reportsuthi
 
Isolation of vm
Isolation of vmIsolation of vm
Isolation of vmHome
 
Chapter3 ec2 and usage.ppt
Chapter3 ec2 and usage.pptChapter3 ec2 and usage.ppt
Chapter3 ec2 and usage.pptvokoco
 
OIT552 Cloud Computing - Question Bank
OIT552 Cloud Computing - Question BankOIT552 Cloud Computing - Question Bank
OIT552 Cloud Computing - Question Bankpkaviya
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)ahmed elmeghiny
 
Cloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projectsCloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projectsVijay Karan
 
Cloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 ProjectsCloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 ProjectsVijay Karan
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 

Similar to Swiper exploiting virtual machine vulnerability in third party clouds with competition for io resources (20)

Z26167171
Z26167171Z26167171
Z26167171
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
The IoT Academy_awstraining_part2_aws_ec2_iaas
The IoT Academy_awstraining_part2_aws_ec2_iaasThe IoT Academy_awstraining_part2_aws_ec2_iaas
The IoT Academy_awstraining_part2_aws_ec2_iaas
 
Ericsson Cloud Computing
Ericsson Cloud Computing Ericsson Cloud Computing
Ericsson Cloud Computing
 
Whitepaper nebucom intelligent application broking and provisioning in a hybr...
Whitepaper nebucom intelligent application broking and provisioning in a hybr...Whitepaper nebucom intelligent application broking and provisioning in a hybr...
Whitepaper nebucom intelligent application broking and provisioning in a hybr...
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
50120130405007
5012013040500750120130405007
50120130405007
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky ModelSecurity Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 report
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Isolation of vm
Isolation of vmIsolation of vm
Isolation of vm
 
Chapter3 ec2 and usage.ppt
Chapter3 ec2 and usage.pptChapter3 ec2 and usage.ppt
Chapter3 ec2 and usage.ppt
 
OIT552 Cloud Computing - Question Bank
OIT552 Cloud Computing - Question BankOIT552 Cloud Computing - Question Bank
OIT552 Cloud Computing - Question Bank
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)
 
Cloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projectsCloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projects
 
Cloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 ProjectsCloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 Projects
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 

More from ieeeprojectschennai

Parallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionParallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionieeeprojectschennai
 
Dynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityDynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityieeeprojectschennai
 
Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...ieeeprojectschennai
 
Parallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionParallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionieeeprojectschennai
 
Dynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityDynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityieeeprojectschennai
 
Practical conflict graphs in the wild
Practical conflict graphs in the wildPractical conflict graphs in the wild
Practical conflict graphs in the wildieeeprojectschennai
 
Design and analysis of medium access protocol throughput and short term fairn...
Design and analysis of medium access protocol throughput and short term fairn...Design and analysis of medium access protocol throughput and short term fairn...
Design and analysis of medium access protocol throughput and short term fairn...ieeeprojectschennai
 
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...ieeeprojectschennai
 
Ensuring predictable contact opportunity for scalable vehicular internet acce...
Ensuring predictable contact opportunity for scalable vehicular internet acce...Ensuring predictable contact opportunity for scalable vehicular internet acce...
Ensuring predictable contact opportunity for scalable vehicular internet acce...ieeeprojectschennai
 
Utilize signal traces from others a crowdsourcing perspective of energy savin...
Utilize signal traces from others a crowdsourcing perspective of energy savin...Utilize signal traces from others a crowdsourcing perspective of energy savin...
Utilize signal traces from others a crowdsourcing perspective of energy savin...ieeeprojectschennai
 
Swimming seamless and efficient wi fi based internet access from moving vehicles
Swimming seamless and efficient wi fi based internet access from moving vehiclesSwimming seamless and efficient wi fi based internet access from moving vehicles
Swimming seamless and efficient wi fi based internet access from moving vehiclesieeeprojectschennai
 
On availability performability tradeoff in wireless mesh networks
On availability performability tradeoff in wireless mesh networksOn availability performability tradeoff in wireless mesh networks
On availability performability tradeoff in wireless mesh networksieeeprojectschennai
 
Impact of location popularity on throughput and delay in mobile ad hoc networks
Impact of location popularity on throughput and delay in mobile ad hoc networksImpact of location popularity on throughput and delay in mobile ad hoc networks
Impact of location popularity on throughput and delay in mobile ad hoc networksieeeprojectschennai
 
Frequency diversity aware wi-fi using ofdm-based bloom filters
Frequency diversity aware wi-fi using ofdm-based bloom filtersFrequency diversity aware wi-fi using ofdm-based bloom filters
Frequency diversity aware wi-fi using ofdm-based bloom filtersieeeprojectschennai
 
attack resilinet mxi zones over road networks architecture and algorithms
attack resilinet mxi zones over road networks architecture and algorithmsattack resilinet mxi zones over road networks architecture and algorithms
attack resilinet mxi zones over road networks architecture and algorithmsieeeprojectschennai
 
Economic analysis of 4 g upgrade timing
Economic analysis of 4 g upgrade timingEconomic analysis of 4 g upgrade timing
Economic analysis of 4 g upgrade timingieeeprojectschennai
 
Cooperative pseudo bayesian backoff
Cooperative pseudo bayesian backoffCooperative pseudo bayesian backoff
Cooperative pseudo bayesian backoffieeeprojectschennai
 
Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...ieeeprojectschennai
 

More from ieeeprojectschennai (20)

Parallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionParallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and prediction
 
Dynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityDynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalability
 
Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...
 
Parallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionParallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and prediction
 
Dynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityDynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalability
 
Practical conflict graphs in the wild
Practical conflict graphs in the wildPractical conflict graphs in the wild
Practical conflict graphs in the wild
 
Design and analysis of medium access protocol throughput and short term fairn...
Design and analysis of medium access protocol throughput and short term fairn...Design and analysis of medium access protocol throughput and short term fairn...
Design and analysis of medium access protocol throughput and short term fairn...
 
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
 
Ensuring predictable contact opportunity for scalable vehicular internet acce...
Ensuring predictable contact opportunity for scalable vehicular internet acce...Ensuring predictable contact opportunity for scalable vehicular internet acce...
Ensuring predictable contact opportunity for scalable vehicular internet acce...
 
Utilize signal traces from others a crowdsourcing perspective of energy savin...
Utilize signal traces from others a crowdsourcing perspective of energy savin...Utilize signal traces from others a crowdsourcing perspective of energy savin...
Utilize signal traces from others a crowdsourcing perspective of energy savin...
 
Swimming seamless and efficient wi fi based internet access from moving vehicles
Swimming seamless and efficient wi fi based internet access from moving vehiclesSwimming seamless and efficient wi fi based internet access from moving vehicles
Swimming seamless and efficient wi fi based internet access from moving vehicles
 
Spatial spectrum access game
Spatial spectrum access gameSpatial spectrum access game
Spatial spectrum access game
 
On availability performability tradeoff in wireless mesh networks
On availability performability tradeoff in wireless mesh networksOn availability performability tradeoff in wireless mesh networks
On availability performability tradeoff in wireless mesh networks
 
Managing contention with medley
Managing contention with medleyManaging contention with medley
Managing contention with medley
 
Impact of location popularity on throughput and delay in mobile ad hoc networks
Impact of location popularity on throughput and delay in mobile ad hoc networksImpact of location popularity on throughput and delay in mobile ad hoc networks
Impact of location popularity on throughput and delay in mobile ad hoc networks
 
Frequency diversity aware wi-fi using ofdm-based bloom filters
Frequency diversity aware wi-fi using ofdm-based bloom filtersFrequency diversity aware wi-fi using ofdm-based bloom filters
Frequency diversity aware wi-fi using ofdm-based bloom filters
 
attack resilinet mxi zones over road networks architecture and algorithms
attack resilinet mxi zones over road networks architecture and algorithmsattack resilinet mxi zones over road networks architecture and algorithms
attack resilinet mxi zones over road networks architecture and algorithms
 
Economic analysis of 4 g upgrade timing
Economic analysis of 4 g upgrade timingEconomic analysis of 4 g upgrade timing
Economic analysis of 4 g upgrade timing
 
Cooperative pseudo bayesian backoff
Cooperative pseudo bayesian backoffCooperative pseudo bayesian backoff
Cooperative pseudo bayesian backoff
 
Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...
 

Recently uploaded

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 

Recently uploaded (20)

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 

Swiper exploiting virtual machine vulnerability in third party clouds with competition for io resources

  • 1. Swiper: Exploiting Virtual Machine Vulnerability in Third-Party Clouds with Competition for I/O Resources Abstract: The emerging paradigm of cloud computing, e.g., Amazon Elastic Compute Cloud (EC2), promises a highly flexible yet robust environment for large-scale applications. Ideally, while multiple virtual machines (VM) share the same physical resources (e.g., CPUs, caches, DRAM, and I/O devices), each application should be allocated to an independently managed VM and isolated from one another. Unfortunately, the absence of physical isolation inevitably opens doors to a number of security threats. In this paper, we demonstrate in EC2 a new type of security vulnerability caused by competition between virtual I/O workloads-i.e., by leveraging the competition for shared resources, an adversary could intentionally slow down the execution of a targeted application in a VM that shares the same hardware. In particular, we focus on I/O resources such as hard-drive throughput and/or network bandwidth-which are critical for data-intensive applications. We design and implement Swiper, a framework which uses a carefully designed workload to incur significant delays on the targeted application and VM with minimum cost (i.e., resource consumption). We
  • 2. conduct a comprehensive set of experiments in EC2, which clearly demonstrates that Swiper is capable of significantly slowing down various server applications while consuming a small amount of resources. Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk ` : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • RAM : 256 Mb. Software Requirements: • Operating system : - Windows XP. • Front End : - JSP • Back End : - SQL Server Software Requirements: • Operating system : - Windows XP.
  • 3. • Front End : - .Net • Back End : - SQL Server