SlideShare a Scribd company logo
Hey, You, Get Off of My Cloud:
Exploring Information Leakage in
Third-Party Compute Clouds
Presented by:
Fahad
Problem Domain
This paper want to solve problem about side channel attack on
cloud computing security. Attacker might penetrate the VM
isolation and “listening” or harm confidentiality of other
customer through multi- tenancy VMs in the same physical
machine.
2
Amazon EC2 as case study
1. Amazon using Xen hypervisor (later called DomO)
2. DomO manage =>guest images, physical resource provisioning, and access
control rights.
3. Two regions, one located in the USA and one in Europe.
4. Each region contains three availability zones
5. Containing 5 Linux instance types.
6. Also each instance have one-to-one correlation of internal and external IP
address.
3
A simplified model of third-party cloud computing
Users run Virtual Machines (VMs) on cloud provider’s
infrastructure
Multitenancy (users share
physical resources):
➔ Virtual Machine Manager
(VMM) manages physical
server resources for VMs
➔ To the VM should look like
dedicated server
4
Trust Models in cloud computing
Users must trust third-party provider
to
➔ Not spy on running VMs / data
➔ Secure infrastructure from
internal/external attackers
5
A new threat Model
Attacker identifies one or more
victims VMs in cloud:
1. Achieve advantageous placement
1. Launch attacks using physical proximity
1. Attacker launches VMs
2. VMs each check for co-
residence on same
server as victim
Exploit VMM vulnerability
I.e. DoS, Side-channel attack
6
Threats
1. Cloud cartography (VM placement)
a. Map internal infrastructure of cloud
b. Map used to locate targets in cloud
2. Checking for co-residence
a. check that VM is on same server as target
i. Network-based co-residence checks
ii. Efficacy confirmed by covert channels
3. Achieving co-residence
a. Brute forcing placement
b. Instance flooding after target launches
4. Side-channel information leakage
a. coarse-grained cache-contention channels might leak
confidential information
7
(Simplified) EC2 instance networking
Our experiments indicate
that internal IPs are
statically assigned to
physical servers
Co-residence checking
via Dom0: only hop on
traceroute to co-resident
target
8
Task 1: Cloud cartography
(VM Placement)
➔ Author act like attacker, place the malicious process along with the
victim’s process on same physical machine with shared resources
(i.e. caches).
➔ Author is using network probing for discovery of cloud
cartography
➔ Collected data is then analyzed to get hints about the cloud map.
9
Cloud cartography ...continued
From “Account A”: launch 20 instances of each type in each availability zone
20 x 15 = 300 instances launched
From “Account B”: launch 20 instances of each type in Zone 3
20 x 5 = 100 instances launched
39 hours apart
55 of 100 Account B instances had IP address assigned to Account A instance
Most/24 associated to single instance type and zone
Seems that user account doesn’t impact placement
Associate each /24 with Zone & Type
10
Task 2: Co-Residence
Two instances are co-residence if:
1. Matching DomO IP address.
2. Small packet round-trip times (RTT).
3. Numerically close internal IP addresses.
4. Covert channel test:
a. If two instances communicate with the covert channel, then they
are co-residence
11
Task 3: Exploiting VM placement
Two Approaches:
1. Brute-forcing placement
2. Abusing placement locality
12
Achieving co-residence
Attacker launches many instances in parallel
near time of target launch
Experiment:
Repeat for 10 trials:
1. Launch 1 target VM (Account A)
2. 5 minutes later, launch 20 “attack” VMs (alternate
using Account B or C)
3. Determine if any co-resident with target
4 / 10 trials succeeded
In paper: parallel placement locality good for >56 hours
success against commercial accounts
13
Attacker has uncomfortably good chance at
achieving co-residence with your VM
What can the attacker then do?
14
Task 4: Exploiting information leakage
After the attacker places their instance in the same physical machine as target,
they might perform side channel attack:
➔ Extracting cryptographic keys via:
a. Cached-based
b. Denial of services (DOS)
➔ Attacker might learn information from:
a. Target cache workload
b. Network traffic
c. Keystroke timing
15
Cache-based load measurement to determine co-residence
➔ 3 pairs of instances, 2 pairs co-resident and 1 not
➔ 100 cache load measurements during HTTP gets (1024 byte page)and
with no HTTP gets
16
Cache-based load measurement ...Continued
Instances co-
resident
Instances co-
resident
Instances NOT co-resident
17
Mitigations
Mitigation 1: Preventing cloud cartography may accomplished by the
provider not using static local IP address again.
Mitigation 2: Preventing the attacker determines co-residence with the
provider should set DomO to not respond in traceroutes, then should randomly
assign internal IP addresses at the time of instance launch, and should use
virtual LANs to isolate accounts.
18
...continued
Mitigation 3: Preventing VM placement exploit with offload choice to users.
So, authorized user only can change VM placement.
Mitigation 4: To preventing information leakage by side attack. The
provider should avoid co-residence in same physical machine.
19
Summarize
Attacks Possible countermeasures:
Cloud cartography (VM Placement) ➔ Not using static IP addresses, Random
Internal IP assignment
➔ Isolate each user’s view of internal address
space
Checking for co-residence ➔ Hide Dom0 from traceroutes
➔ Random Internal IP assignment
➔ Virtual LANs to isolate accounts
Exploiting VM Placement ➔ Allow users to opt out of multitenancy
➔ Authorize users can only change VM
placement
Exploiting Information leakage ➔ Avoid co-residence in same physical
machine for information leakage
20
Amazon’s response in 2009
Amazon downplays report highlighting vulnerabilities in its cloud service:
1. The side channel techniques presented are based on testing results from a
carefully controlled lab environment with configurations that do not match
the actual Amazon EC2 environment.
2. As the researchers point out, there are a number of factors that would make
such an attack significantly more difficult in practice.
Thanks

More Related Content

What's hot

FortiWeb
FortiWebFortiWeb
FortiWeb
Alireza Akrami
 
Threats of Public Wi-Fi
Threats of Public Wi-Fi Threats of Public Wi-Fi
Threats of Public Wi-Fi
The TNS Group
 
Session hijacking by rahul tyagi
Session hijacking by rahul tyagiSession hijacking by rahul tyagi
Session hijacking by rahul tyagi
amansyal
 
Session Hijacking
Session HijackingSession Hijacking
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
Harsh Kevadia
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
Aladdin Dandis
 
Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
krprashant94
 
EDR(End Point Detection And Response).pptx
EDR(End Point Detection And Response).pptxEDR(End Point Detection And Response).pptx
EDR(End Point Detection And Response).pptx
SMIT PAREKH
 
Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )
Jay Nagar
 
Le normative in materia di sicurezza informatica.
Le normative in materia di sicurezza informatica.Le normative in materia di sicurezza informatica.
Le normative in materia di sicurezza informatica.
gmorelli78
 
Wi-FI Hacking
Wi-FI Hacking Wi-FI Hacking
Wi-FI Hacking
Mehul Jariwala
 
Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns
CrowdStrike
 
Wireless Cracking using Kali
Wireless Cracking using KaliWireless Cracking using Kali
Wireless Cracking using Kali
n|u - The Open Security Community
 
Secrets of Google VRP by: Krzysztof Kotowicz, Google Security Team
Secrets of Google VRP by: Krzysztof Kotowicz, Google Security TeamSecrets of Google VRP by: Krzysztof Kotowicz, Google Security Team
Secrets of Google VRP by: Krzysztof Kotowicz, Google Security Team
OWASP Delhi
 
Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)
btpsec
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
stollen_fusion
 
Packet sniffing & ARP Poisoning
 Packet sniffing & ARP Poisoning  Packet sniffing & ARP Poisoning
Packet sniffing & ARP Poisoning
Viren Rao
 
Mobile Security at OWASP - MASVS and MSTG
Mobile Security at OWASP - MASVS and MSTGMobile Security at OWASP - MASVS and MSTG
Mobile Security at OWASP - MASVS and MSTG
Romuald SZKUDLAREK
 
Presentation on Web Attacks
Presentation on Web AttacksPresentation on Web Attacks
Presentation on Web Attacks
Vivek Sinha Anurag
 
Ipsec
IpsecIpsec

What's hot (20)

FortiWeb
FortiWebFortiWeb
FortiWeb
 
Threats of Public Wi-Fi
Threats of Public Wi-Fi Threats of Public Wi-Fi
Threats of Public Wi-Fi
 
Session hijacking by rahul tyagi
Session hijacking by rahul tyagiSession hijacking by rahul tyagi
Session hijacking by rahul tyagi
 
Session Hijacking
Session HijackingSession Hijacking
Session Hijacking
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
 
Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
 
EDR(End Point Detection And Response).pptx
EDR(End Point Detection And Response).pptxEDR(End Point Detection And Response).pptx
EDR(End Point Detection And Response).pptx
 
Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )
 
Le normative in materia di sicurezza informatica.
Le normative in materia di sicurezza informatica.Le normative in materia di sicurezza informatica.
Le normative in materia di sicurezza informatica.
 
Wi-FI Hacking
Wi-FI Hacking Wi-FI Hacking
Wi-FI Hacking
 
Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns
 
Wireless Cracking using Kali
Wireless Cracking using KaliWireless Cracking using Kali
Wireless Cracking using Kali
 
Secrets of Google VRP by: Krzysztof Kotowicz, Google Security Team
Secrets of Google VRP by: Krzysztof Kotowicz, Google Security TeamSecrets of Google VRP by: Krzysztof Kotowicz, Google Security Team
Secrets of Google VRP by: Krzysztof Kotowicz, Google Security Team
 
Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
Packet sniffing & ARP Poisoning
 Packet sniffing & ARP Poisoning  Packet sniffing & ARP Poisoning
Packet sniffing & ARP Poisoning
 
Mobile Security at OWASP - MASVS and MSTG
Mobile Security at OWASP - MASVS and MSTGMobile Security at OWASP - MASVS and MSTG
Mobile Security at OWASP - MASVS and MSTG
 
Presentation on Web Attacks
Presentation on Web AttacksPresentation on Web Attacks
Presentation on Web Attacks
 
Ipsec
IpsecIpsec
Ipsec
 

Similar to Hey, you, get off of my cloud exploring information leakage in third party compute clouds

6620handout4t
6620handout4t6620handout4t
6620handout4t
Shahbaz Sidhu
 
6620handout4o
6620handout4o6620handout4o
6620handout4o
Shahbaz Sidhu
 
Lecture28 cc-security3
Lecture28 cc-security3Lecture28 cc-security3
Lecture28 cc-security3
Ankit Gupta
 
600.412.Lecture03
600.412.Lecture03600.412.Lecture03
600.412.Lecture03
ragibhasan
 
Network and Internet Security.docx
Network and Internet Security.docxNetwork and Internet Security.docx
Network and Internet Security.docx
stirlingvwriters
 
Virtual Machines Security Internals: Detection and Exploitation
 Virtual Machines Security Internals: Detection and Exploitation Virtual Machines Security Internals: Detection and Exploitation
Virtual Machines Security Internals: Detection and Exploitation
Mattia Salvi
 
Cloud Security and their classifications
Cloud Security and their classificationsCloud Security and their classifications
Cloud Security and their classifications
KENNEDYDONATO1
 
Network And Application Layer Attacks
Network And Application Layer AttacksNetwork And Application Layer Attacks
Network And Application Layer Attacks
Arun Modi
 
Ddos- distributed denial of service
Ddos- distributed denial of service Ddos- distributed denial of service
Ddos- distributed denial of service
laxmi chandolia
 
Information security advanced
Information security advancedInformation security advanced
Information security advanced
Jamil S. Alagha
 
MCDB: Multi Cloud Database Model
MCDB: Multi Cloud Database ModelMCDB: Multi Cloud Database Model
MCDB: Multi Cloud Database Model
athulya_raj
 
Lab 2 Networking in the cloud Overv.docx
Lab 2 Networking in the cloud Overv.docxLab 2 Networking in the cloud Overv.docx
Lab 2 Networking in the cloud Overv.docx
DIPESH30
 
Docker Swarm secrets for creating great FIWARE platforms
Docker Swarm secrets for creating great FIWARE platformsDocker Swarm secrets for creating great FIWARE platforms
Docker Swarm secrets for creating great FIWARE platforms
Federico Michele Facca
 
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
ijsrd.com
 
Penetration Testing Project Game of Thrones CTF: 1
Penetration Testing Project Game of Thrones CTF: 1Penetration Testing Project Game of Thrones CTF: 1
Penetration Testing Project Game of Thrones CTF: 1
Florin D. Tanasache
 
A Trusted IaaS Environment with Hardware Security Module
 A Trusted IaaS Environment with Hardware Security Module A Trusted IaaS Environment with Hardware Security Module
A Trusted IaaS Environment with Hardware Security Module
nexgentechnology
 
A Trusted IaaS Environment with Hardware Security Module
 A Trusted IaaS Environment with Hardware Security Module A Trusted IaaS Environment with Hardware Security Module
A Trusted IaaS Environment with Hardware Security Module
nexgentechnology
 
A TRUSTED IAAS ENVIRONMENT WITH HARDWARE SECURITY MODULE
 A TRUSTED IAAS ENVIRONMENT WITH HARDWARE SECURITY MODULE A TRUSTED IAAS ENVIRONMENT WITH HARDWARE SECURITY MODULE
A TRUSTED IAAS ENVIRONMENT WITH HARDWARE SECURITY MODULE
Nexgen Technology
 
A trusted iaa s environment
A trusted iaa s environmentA trusted iaa s environment
A trusted iaa s environment
nexgentech15
 
Analysing Ransomware
Analysing RansomwareAnalysing Ransomware
Analysing Ransomware
Napier University
 

Similar to Hey, you, get off of my cloud exploring information leakage in third party compute clouds (20)

6620handout4t
6620handout4t6620handout4t
6620handout4t
 
6620handout4o
6620handout4o6620handout4o
6620handout4o
 
Lecture28 cc-security3
Lecture28 cc-security3Lecture28 cc-security3
Lecture28 cc-security3
 
600.412.Lecture03
600.412.Lecture03600.412.Lecture03
600.412.Lecture03
 
Network and Internet Security.docx
Network and Internet Security.docxNetwork and Internet Security.docx
Network and Internet Security.docx
 
Virtual Machines Security Internals: Detection and Exploitation
 Virtual Machines Security Internals: Detection and Exploitation Virtual Machines Security Internals: Detection and Exploitation
Virtual Machines Security Internals: Detection and Exploitation
 
Cloud Security and their classifications
Cloud Security and their classificationsCloud Security and their classifications
Cloud Security and their classifications
 
Network And Application Layer Attacks
Network And Application Layer AttacksNetwork And Application Layer Attacks
Network And Application Layer Attacks
 
Ddos- distributed denial of service
Ddos- distributed denial of service Ddos- distributed denial of service
Ddos- distributed denial of service
 
Information security advanced
Information security advancedInformation security advanced
Information security advanced
 
MCDB: Multi Cloud Database Model
MCDB: Multi Cloud Database ModelMCDB: Multi Cloud Database Model
MCDB: Multi Cloud Database Model
 
Lab 2 Networking in the cloud Overv.docx
Lab 2 Networking in the cloud Overv.docxLab 2 Networking in the cloud Overv.docx
Lab 2 Networking in the cloud Overv.docx
 
Docker Swarm secrets for creating great FIWARE platforms
Docker Swarm secrets for creating great FIWARE platformsDocker Swarm secrets for creating great FIWARE platforms
Docker Swarm secrets for creating great FIWARE platforms
 
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
 
Penetration Testing Project Game of Thrones CTF: 1
Penetration Testing Project Game of Thrones CTF: 1Penetration Testing Project Game of Thrones CTF: 1
Penetration Testing Project Game of Thrones CTF: 1
 
A Trusted IaaS Environment with Hardware Security Module
 A Trusted IaaS Environment with Hardware Security Module A Trusted IaaS Environment with Hardware Security Module
A Trusted IaaS Environment with Hardware Security Module
 
A Trusted IaaS Environment with Hardware Security Module
 A Trusted IaaS Environment with Hardware Security Module A Trusted IaaS Environment with Hardware Security Module
A Trusted IaaS Environment with Hardware Security Module
 
A TRUSTED IAAS ENVIRONMENT WITH HARDWARE SECURITY MODULE
 A TRUSTED IAAS ENVIRONMENT WITH HARDWARE SECURITY MODULE A TRUSTED IAAS ENVIRONMENT WITH HARDWARE SECURITY MODULE
A TRUSTED IAAS ENVIRONMENT WITH HARDWARE SECURITY MODULE
 
A trusted iaa s environment
A trusted iaa s environmentA trusted iaa s environment
A trusted iaa s environment
 
Analysing Ransomware
Analysing RansomwareAnalysing Ransomware
Analysing Ransomware
 

More from Fahad Ameen

General data protection regulation
General data protection regulationGeneral data protection regulation
General data protection regulation
Fahad Ameen
 
Organzational politics
Organzational politicsOrganzational politics
Organzational politics
Fahad Ameen
 
Al khwarizmi
Al khwarizmiAl khwarizmi
Al khwarizmi
Fahad Ameen
 
Organzational politics
Organzational politicsOrganzational politics
Organzational politics
Fahad Ameen
 
Scientific disaster
Scientific disasterScientific disaster
Scientific disaster
Fahad Ameen
 
John forbes nash
John forbes nashJohn forbes nash
John forbes nash
Fahad Ameen
 

More from Fahad Ameen (6)

General data protection regulation
General data protection regulationGeneral data protection regulation
General data protection regulation
 
Organzational politics
Organzational politicsOrganzational politics
Organzational politics
 
Al khwarizmi
Al khwarizmiAl khwarizmi
Al khwarizmi
 
Organzational politics
Organzational politicsOrganzational politics
Organzational politics
 
Scientific disaster
Scientific disasterScientific disaster
Scientific disaster
 
John forbes nash
John forbes nashJohn forbes nash
John forbes nash
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 

Hey, you, get off of my cloud exploring information leakage in third party compute clouds

  • 1. Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds Presented by: Fahad
  • 2. Problem Domain This paper want to solve problem about side channel attack on cloud computing security. Attacker might penetrate the VM isolation and “listening” or harm confidentiality of other customer through multi- tenancy VMs in the same physical machine. 2
  • 3. Amazon EC2 as case study 1. Amazon using Xen hypervisor (later called DomO) 2. DomO manage =>guest images, physical resource provisioning, and access control rights. 3. Two regions, one located in the USA and one in Europe. 4. Each region contains three availability zones 5. Containing 5 Linux instance types. 6. Also each instance have one-to-one correlation of internal and external IP address. 3
  • 4. A simplified model of third-party cloud computing Users run Virtual Machines (VMs) on cloud provider’s infrastructure Multitenancy (users share physical resources): ➔ Virtual Machine Manager (VMM) manages physical server resources for VMs ➔ To the VM should look like dedicated server 4
  • 5. Trust Models in cloud computing Users must trust third-party provider to ➔ Not spy on running VMs / data ➔ Secure infrastructure from internal/external attackers 5
  • 6. A new threat Model Attacker identifies one or more victims VMs in cloud: 1. Achieve advantageous placement 1. Launch attacks using physical proximity 1. Attacker launches VMs 2. VMs each check for co- residence on same server as victim Exploit VMM vulnerability I.e. DoS, Side-channel attack 6
  • 7. Threats 1. Cloud cartography (VM placement) a. Map internal infrastructure of cloud b. Map used to locate targets in cloud 2. Checking for co-residence a. check that VM is on same server as target i. Network-based co-residence checks ii. Efficacy confirmed by covert channels 3. Achieving co-residence a. Brute forcing placement b. Instance flooding after target launches 4. Side-channel information leakage a. coarse-grained cache-contention channels might leak confidential information 7
  • 8. (Simplified) EC2 instance networking Our experiments indicate that internal IPs are statically assigned to physical servers Co-residence checking via Dom0: only hop on traceroute to co-resident target 8
  • 9. Task 1: Cloud cartography (VM Placement) ➔ Author act like attacker, place the malicious process along with the victim’s process on same physical machine with shared resources (i.e. caches). ➔ Author is using network probing for discovery of cloud cartography ➔ Collected data is then analyzed to get hints about the cloud map. 9
  • 10. Cloud cartography ...continued From “Account A”: launch 20 instances of each type in each availability zone 20 x 15 = 300 instances launched From “Account B”: launch 20 instances of each type in Zone 3 20 x 5 = 100 instances launched 39 hours apart 55 of 100 Account B instances had IP address assigned to Account A instance Most/24 associated to single instance type and zone Seems that user account doesn’t impact placement Associate each /24 with Zone & Type 10
  • 11. Task 2: Co-Residence Two instances are co-residence if: 1. Matching DomO IP address. 2. Small packet round-trip times (RTT). 3. Numerically close internal IP addresses. 4. Covert channel test: a. If two instances communicate with the covert channel, then they are co-residence 11
  • 12. Task 3: Exploiting VM placement Two Approaches: 1. Brute-forcing placement 2. Abusing placement locality 12
  • 13. Achieving co-residence Attacker launches many instances in parallel near time of target launch Experiment: Repeat for 10 trials: 1. Launch 1 target VM (Account A) 2. 5 minutes later, launch 20 “attack” VMs (alternate using Account B or C) 3. Determine if any co-resident with target 4 / 10 trials succeeded In paper: parallel placement locality good for >56 hours success against commercial accounts 13
  • 14. Attacker has uncomfortably good chance at achieving co-residence with your VM What can the attacker then do? 14
  • 15. Task 4: Exploiting information leakage After the attacker places their instance in the same physical machine as target, they might perform side channel attack: ➔ Extracting cryptographic keys via: a. Cached-based b. Denial of services (DOS) ➔ Attacker might learn information from: a. Target cache workload b. Network traffic c. Keystroke timing 15
  • 16. Cache-based load measurement to determine co-residence ➔ 3 pairs of instances, 2 pairs co-resident and 1 not ➔ 100 cache load measurements during HTTP gets (1024 byte page)and with no HTTP gets 16
  • 17. Cache-based load measurement ...Continued Instances co- resident Instances co- resident Instances NOT co-resident 17
  • 18. Mitigations Mitigation 1: Preventing cloud cartography may accomplished by the provider not using static local IP address again. Mitigation 2: Preventing the attacker determines co-residence with the provider should set DomO to not respond in traceroutes, then should randomly assign internal IP addresses at the time of instance launch, and should use virtual LANs to isolate accounts. 18
  • 19. ...continued Mitigation 3: Preventing VM placement exploit with offload choice to users. So, authorized user only can change VM placement. Mitigation 4: To preventing information leakage by side attack. The provider should avoid co-residence in same physical machine. 19
  • 20. Summarize Attacks Possible countermeasures: Cloud cartography (VM Placement) ➔ Not using static IP addresses, Random Internal IP assignment ➔ Isolate each user’s view of internal address space Checking for co-residence ➔ Hide Dom0 from traceroutes ➔ Random Internal IP assignment ➔ Virtual LANs to isolate accounts Exploiting VM Placement ➔ Allow users to opt out of multitenancy ➔ Authorize users can only change VM placement Exploiting Information leakage ➔ Avoid co-residence in same physical machine for information leakage 20
  • 21. Amazon’s response in 2009 Amazon downplays report highlighting vulnerabilities in its cloud service: 1. The side channel techniques presented are based on testing results from a carefully controlled lab environment with configurations that do not match the actual Amazon EC2 environment. 2. As the researchers point out, there are a number of factors that would make such an attack significantly more difficult in practice.