SlideShare a Scribd company logo
1 of 3
Download to read offline
Swiper: Exploiting Virtual Machine Vulnerability in Third-Party Clouds
with Competition for I/O Resources
Abstract:
The emerging paradigm of cloud computing, e.g., Amazon Elastic
Compute Cloud (EC2), promises a highly flexible yet robust environment
for large-scale applications. Ideally, while multiple virtual machines (VM)
share the same physical resources (e.g., CPUs, caches, DRAM, and I/O
devices), each application should be allocated to an independently
managed VM and isolated from one another. Unfortunately, the absence of
physical isolation inevitably opens doors to a number of security threats. In
this paper, we demonstrate in EC2 a new type of security vulnerability
caused by competition between virtual I/O workloads-i.e., by leveraging
the competition for shared resources, an adversary could intentionally slow
down the execution of a targeted application in a VM that shares the same
hardware. In particular, we focus on I/O resources such as hard-drive
throughput and/or network bandwidth-which are critical for data-intensive
applications. We design and implement Swiper, a framework which uses a
carefully designed workload to incur significant delays on the targeted
application and VM with minimum cost (i.e., resource consumption). We
conduct a comprehensive set of experiments in EC2, which clearly
demonstrates that Swiper is capable of significantly slowing down various
server applications while consuming a small amount of resources.
Hardware Requirements:
• System : Pentium IV 2.4 GHz.
• Hard Disk ` : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• RAM : 256 Mb.
Software Requirements:
• Operating system : - Windows XP.
• Front End : - JSP
• Back End : - SQL Server
Software Requirements:
• Operating system : - Windows XP.
• Front End : - .Net
• Back End : - SQL Server

More Related Content

What's hot

A tutorial on CloudSim
A tutorial on CloudSimA tutorial on CloudSim
A tutorial on CloudSimHabibur Rahman
 
Cloudsim & Green Cloud
Cloudsim & Green CloudCloudsim & Green Cloud
Cloudsim & Green CloudNeda Maleki
 
Clearing The Air On Cloud
Clearing The Air On CloudClearing The Air On Cloud
Clearing The Air On CloudChris Yeo
 
Amazon Virtual Private Cloud
Amazon Virtual Private CloudAmazon Virtual Private Cloud
Amazon Virtual Private CloudElastra
 
Cloud computing
Cloud computingCloud computing
Cloud computingSabaSam3
 
What is Virtualization. Talk from Pycon 2013 India.
What is Virtualization. Talk from Pycon 2013 India.What is Virtualization. Talk from Pycon 2013 India.
What is Virtualization. Talk from Pycon 2013 India.Rahul Krishna Upadhyaya
 
Windows Azure presentation By Kamlesh Asati
Windows Azure presentation By Kamlesh AsatiWindows Azure presentation By Kamlesh Asati
Windows Azure presentation By Kamlesh AsatiKartik Asati
 
Presenting Cloud Computing
Presenting Cloud ComputingPresenting Cloud Computing
Presenting Cloud ComputingNaveen Karn
 
Study and implementation a cloud solution based on
Study and implementation a cloud solution based onStudy and implementation a cloud solution based on
Study and implementation a cloud solution based onDendani Bilal
 
A tutorial on GreenCloud
A tutorial on GreenCloudA tutorial on GreenCloud
A tutorial on GreenCloudHabibur Rahman
 
An adaptive distributed simulator for cloud andmap reduce algorithms and arch...
An adaptive distributed simulator for cloud andmap reduce algorithms and arch...An adaptive distributed simulator for cloud andmap reduce algorithms and arch...
An adaptive distributed simulator for cloud andmap reduce algorithms and arch...Pradeeban Kathiravelu, Ph.D.
 
SECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTING
SECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTINGSECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTING
SECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTINGTannishtha Sengupta
 
Cloudsim & greencloud
Cloudsim & greencloud Cloudsim & greencloud
Cloudsim & greencloud nedamaleki87
 

What's hot (20)

Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
A tutorial on CloudSim
A tutorial on CloudSimA tutorial on CloudSim
A tutorial on CloudSim
 
Cloudsim & Green Cloud
Cloudsim & Green CloudCloudsim & Green Cloud
Cloudsim & Green Cloud
 
Clearing The Air On Cloud
Clearing The Air On CloudClearing The Air On Cloud
Clearing The Air On Cloud
 
Amazon Virtual Private Cloud
Amazon Virtual Private CloudAmazon Virtual Private Cloud
Amazon Virtual Private Cloud
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Microsoft azure kt
Microsoft azure ktMicrosoft azure kt
Microsoft azure kt
 
Harshit.ppt
Harshit.pptHarshit.ppt
Harshit.ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
What is Virtualization. Talk from Pycon 2013 India.
What is Virtualization. Talk from Pycon 2013 India.What is Virtualization. Talk from Pycon 2013 India.
What is Virtualization. Talk from Pycon 2013 India.
 
Cloud sim
Cloud simCloud sim
Cloud sim
 
Ankit ppt
Ankit pptAnkit ppt
Ankit ppt
 
Windows Azure presentation By Kamlesh Asati
Windows Azure presentation By Kamlesh AsatiWindows Azure presentation By Kamlesh Asati
Windows Azure presentation By Kamlesh Asati
 
Presenting Cloud Computing
Presenting Cloud ComputingPresenting Cloud Computing
Presenting Cloud Computing
 
Study and implementation a cloud solution based on
Study and implementation a cloud solution based onStudy and implementation a cloud solution based on
Study and implementation a cloud solution based on
 
A tutorial on GreenCloud
A tutorial on GreenCloudA tutorial on GreenCloud
A tutorial on GreenCloud
 
An adaptive distributed simulator for cloud andmap reduce algorithms and arch...
An adaptive distributed simulator for cloud andmap reduce algorithms and arch...An adaptive distributed simulator for cloud andmap reduce algorithms and arch...
An adaptive distributed simulator for cloud andmap reduce algorithms and arch...
 
SECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTING
SECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTINGSECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTING
SECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTING
 
Cloudsim & greencloud
Cloudsim & greencloud Cloudsim & greencloud
Cloudsim & greencloud
 

Similar to Swiper exploiting virtual machine vulnerability in third party clouds with competition for io resources

Cloud computing
Cloud computingCloud computing
Cloud computingprasanth82
 
The IoT Academy_awstraining_part2_aws_ec2_iaas
The IoT Academy_awstraining_part2_aws_ec2_iaasThe IoT Academy_awstraining_part2_aws_ec2_iaas
The IoT Academy_awstraining_part2_aws_ec2_iaasThe IOT Academy
 
Ericsson Cloud Computing
Ericsson Cloud Computing Ericsson Cloud Computing
Ericsson Cloud Computing scotgardner
 
Whitepaper nebucom intelligent application broking and provisioning in a hybr...
Whitepaper nebucom intelligent application broking and provisioning in a hybr...Whitepaper nebucom intelligent application broking and provisioning in a hybr...
Whitepaper nebucom intelligent application broking and provisioning in a hybr...Nebucom
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyKingsley Mensah
 
Cloud computing
Cloud computingCloud computing
Cloud computingkarthiklreddy
 
Cloud computing
Cloud computingCloud computing
Cloud computingMayank Saxena
 
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky ModelSecurity Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky ModelIOSR Journals
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingKelvin Lam
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 reportsuthi
 
Isolation of vm
Isolation of vmIsolation of vm
Isolation of vmHome
 
Chapter3 ec2 and usage.ppt
Chapter3 ec2 and usage.pptChapter3 ec2 and usage.ppt
Chapter3 ec2 and usage.pptvokoco
 
OIT552 Cloud Computing - Question Bank
OIT552 Cloud Computing - Question BankOIT552 Cloud Computing - Question Bank
OIT552 Cloud Computing - Question Bankpkaviya
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)ahmed elmeghiny
 
Cloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projectsCloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projectsVijay Karan
 
Cloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 ProjectsCloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 ProjectsVijay Karan
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 

Similar to Swiper exploiting virtual machine vulnerability in third party clouds with competition for io resources (20)

Z26167171
Z26167171Z26167171
Z26167171
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
The IoT Academy_awstraining_part2_aws_ec2_iaas
The IoT Academy_awstraining_part2_aws_ec2_iaasThe IoT Academy_awstraining_part2_aws_ec2_iaas
The IoT Academy_awstraining_part2_aws_ec2_iaas
 
Ericsson Cloud Computing
Ericsson Cloud Computing Ericsson Cloud Computing
Ericsson Cloud Computing
 
Whitepaper nebucom intelligent application broking and provisioning in a hybr...
Whitepaper nebucom intelligent application broking and provisioning in a hybr...Whitepaper nebucom intelligent application broking and provisioning in a hybr...
Whitepaper nebucom intelligent application broking and provisioning in a hybr...
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
50120130405007
5012013040500750120130405007
50120130405007
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky ModelSecurity Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 report
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Isolation of vm
Isolation of vmIsolation of vm
Isolation of vm
 
Chapter3 ec2 and usage.ppt
Chapter3 ec2 and usage.pptChapter3 ec2 and usage.ppt
Chapter3 ec2 and usage.ppt
 
OIT552 Cloud Computing - Question Bank
OIT552 Cloud Computing - Question BankOIT552 Cloud Computing - Question Bank
OIT552 Cloud Computing - Question Bank
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)
 
Cloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projectsCloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projects
 
Cloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 ProjectsCloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 Projects
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 

More from ieeeprojectschennai

Parallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionParallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionieeeprojectschennai
 
Dynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityDynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityieeeprojectschennai
 
Parallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionParallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionieeeprojectschennai
 
Dynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityDynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityieeeprojectschennai
 
Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...ieeeprojectschennai
 
Practical conflict graphs in the wild
Practical conflict graphs in the wildPractical conflict graphs in the wild
Practical conflict graphs in the wildieeeprojectschennai
 
Design and analysis of medium access protocol throughput and short term fairn...
Design and analysis of medium access protocol throughput and short term fairn...Design and analysis of medium access protocol throughput and short term fairn...
Design and analysis of medium access protocol throughput and short term fairn...ieeeprojectschennai
 
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...ieeeprojectschennai
 
Ensuring predictable contact opportunity for scalable vehicular internet acce...
Ensuring predictable contact opportunity for scalable vehicular internet acce...Ensuring predictable contact opportunity for scalable vehicular internet acce...
Ensuring predictable contact opportunity for scalable vehicular internet acce...ieeeprojectschennai
 
Utilize signal traces from others a crowdsourcing perspective of energy savin...
Utilize signal traces from others a crowdsourcing perspective of energy savin...Utilize signal traces from others a crowdsourcing perspective of energy savin...
Utilize signal traces from others a crowdsourcing perspective of energy savin...ieeeprojectschennai
 
Swimming seamless and efficient wi fi based internet access from moving vehicles
Swimming seamless and efficient wi fi based internet access from moving vehiclesSwimming seamless and efficient wi fi based internet access from moving vehicles
Swimming seamless and efficient wi fi based internet access from moving vehiclesieeeprojectschennai
 
Spatial spectrum access game
Spatial spectrum access gameSpatial spectrum access game
Spatial spectrum access gameieeeprojectschennai
 
On availability performability tradeoff in wireless mesh networks
On availability performability tradeoff in wireless mesh networksOn availability performability tradeoff in wireless mesh networks
On availability performability tradeoff in wireless mesh networksieeeprojectschennai
 
Managing contention with medley
Managing contention with medleyManaging contention with medley
Managing contention with medleyieeeprojectschennai
 
Impact of location popularity on throughput and delay in mobile ad hoc networks
Impact of location popularity on throughput and delay in mobile ad hoc networksImpact of location popularity on throughput and delay in mobile ad hoc networks
Impact of location popularity on throughput and delay in mobile ad hoc networksieeeprojectschennai
 
Frequency diversity aware wi-fi using ofdm-based bloom filters
Frequency diversity aware wi-fi using ofdm-based bloom filtersFrequency diversity aware wi-fi using ofdm-based bloom filters
Frequency diversity aware wi-fi using ofdm-based bloom filtersieeeprojectschennai
 
attack resilinet mxi zones over road networks architecture and algorithms
attack resilinet mxi zones over road networks architecture and algorithmsattack resilinet mxi zones over road networks architecture and algorithms
attack resilinet mxi zones over road networks architecture and algorithmsieeeprojectschennai
 
Economic analysis of 4 g upgrade timing
Economic analysis of 4 g upgrade timingEconomic analysis of 4 g upgrade timing
Economic analysis of 4 g upgrade timingieeeprojectschennai
 
Cooperative pseudo bayesian backoff
Cooperative pseudo bayesian backoffCooperative pseudo bayesian backoff
Cooperative pseudo bayesian backoffieeeprojectschennai
 
Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...ieeeprojectschennai
 

More from ieeeprojectschennai (20)

Parallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionParallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and prediction
 
Dynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityDynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalability
 
Parallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionParallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and prediction
 
Dynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityDynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalability
 
Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...
 
Practical conflict graphs in the wild
Practical conflict graphs in the wildPractical conflict graphs in the wild
Practical conflict graphs in the wild
 
Design and analysis of medium access protocol throughput and short term fairn...
Design and analysis of medium access protocol throughput and short term fairn...Design and analysis of medium access protocol throughput and short term fairn...
Design and analysis of medium access protocol throughput and short term fairn...
 
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
 
Ensuring predictable contact opportunity for scalable vehicular internet acce...
Ensuring predictable contact opportunity for scalable vehicular internet acce...Ensuring predictable contact opportunity for scalable vehicular internet acce...
Ensuring predictable contact opportunity for scalable vehicular internet acce...
 
Utilize signal traces from others a crowdsourcing perspective of energy savin...
Utilize signal traces from others a crowdsourcing perspective of energy savin...Utilize signal traces from others a crowdsourcing perspective of energy savin...
Utilize signal traces from others a crowdsourcing perspective of energy savin...
 
Swimming seamless and efficient wi fi based internet access from moving vehicles
Swimming seamless and efficient wi fi based internet access from moving vehiclesSwimming seamless and efficient wi fi based internet access from moving vehicles
Swimming seamless and efficient wi fi based internet access from moving vehicles
 
Spatial spectrum access game
Spatial spectrum access gameSpatial spectrum access game
Spatial spectrum access game
 
On availability performability tradeoff in wireless mesh networks
On availability performability tradeoff in wireless mesh networksOn availability performability tradeoff in wireless mesh networks
On availability performability tradeoff in wireless mesh networks
 
Managing contention with medley
Managing contention with medleyManaging contention with medley
Managing contention with medley
 
Impact of location popularity on throughput and delay in mobile ad hoc networks
Impact of location popularity on throughput and delay in mobile ad hoc networksImpact of location popularity on throughput and delay in mobile ad hoc networks
Impact of location popularity on throughput and delay in mobile ad hoc networks
 
Frequency diversity aware wi-fi using ofdm-based bloom filters
Frequency diversity aware wi-fi using ofdm-based bloom filtersFrequency diversity aware wi-fi using ofdm-based bloom filters
Frequency diversity aware wi-fi using ofdm-based bloom filters
 
attack resilinet mxi zones over road networks architecture and algorithms
attack resilinet mxi zones over road networks architecture and algorithmsattack resilinet mxi zones over road networks architecture and algorithms
attack resilinet mxi zones over road networks architecture and algorithms
 
Economic analysis of 4 g upgrade timing
Economic analysis of 4 g upgrade timingEconomic analysis of 4 g upgrade timing
Economic analysis of 4 g upgrade timing
 
Cooperative pseudo bayesian backoff
Cooperative pseudo bayesian backoffCooperative pseudo bayesian backoff
Cooperative pseudo bayesian backoff
 
Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...
 

Recently uploaded

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 

Recently uploaded (20)

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 

Swiper exploiting virtual machine vulnerability in third party clouds with competition for io resources

  • 1. Swiper: Exploiting Virtual Machine Vulnerability in Third-Party Clouds with Competition for I/O Resources Abstract: The emerging paradigm of cloud computing, e.g., Amazon Elastic Compute Cloud (EC2), promises a highly flexible yet robust environment for large-scale applications. Ideally, while multiple virtual machines (VM) share the same physical resources (e.g., CPUs, caches, DRAM, and I/O devices), each application should be allocated to an independently managed VM and isolated from one another. Unfortunately, the absence of physical isolation inevitably opens doors to a number of security threats. In this paper, we demonstrate in EC2 a new type of security vulnerability caused by competition between virtual I/O workloads-i.e., by leveraging the competition for shared resources, an adversary could intentionally slow down the execution of a targeted application in a VM that shares the same hardware. In particular, we focus on I/O resources such as hard-drive throughput and/or network bandwidth-which are critical for data-intensive applications. We design and implement Swiper, a framework which uses a carefully designed workload to incur significant delays on the targeted application and VM with minimum cost (i.e., resource consumption). We
  • 2. conduct a comprehensive set of experiments in EC2, which clearly demonstrates that Swiper is capable of significantly slowing down various server applications while consuming a small amount of resources. Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk ` : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • RAM : 256 Mb. Software Requirements: • Operating system : - Windows XP. • Front End : - JSP • Back End : - SQL Server Software Requirements: • Operating system : - Windows XP.
  • 3. • Front End : - .Net • Back End : - SQL Server