Bolt: Uncovering and Reducing the Security Vulnerabilities of Shared Clouds
نویسندگان
چکیده
Cloud providers routinely schedule multiple applications per physical host to increase cost efficiency. The resulting interference in shared resources leads to performance degradation and, more importantly, security vulnerabilities. Interference can leak important information ranging from the placement of a service to confidential data, like private keys. We present Bolt, a practical system that accurately detects the type and characteristics of applications sharing a cloud platform, based on the interference an adversary sees on shared resources. Bolt leverages practical data mining techniques for detection that operate online and require 2-5 seconds. In a 40-server shared cluster, Bolt correctly detects 81% out of 108 diverse batch and interactive workloads. Extracting this information enables a wide spectrum of previouslyimpractical cloud attacks, including denial of service (DoS), resource freeing (RFA) and co-residency attacks. For example, Bolt can successfully launch difficult to detect, host-based DoS attacks, with only a fraction of the resources and time needed by a conventional distributed DoS that cause the tail latency of the victim to increase by up to 140x. Finally, we show that, while advanced isolation techniques, such as cache partitioning, lower detection accuracy, they are insufficient to eliminate these vulnerabilities. To do so, one must either disallow core sharing, or only allow it between threads of the same application, leading to significant inefficiencies and performance penalties respectively.
منابع مشابه
An Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملIdentifying and Measuring Security Critical Path for Uncovering Circuit Vulnerabilities
Hardware is an increasingly attractive attack surface since it controls low-level access to critical resources like cryptographic keys, personally identifiable information, and firmware. Unfortunately, it is difficult to assess the security vulnerabilities of a hardware design, which is a consequence of too few hardware security design tools and metrics. In this work, we describe important secu...
متن کاملReducing the U.S dependency on oil and gas imports, implications for its policies in the international system
This paper aims to firstly explain the significance of the U.S oil independency and its consequences on the U.S foreign strategy in international politics. Secondly, the implications of this energy policy on the U.S foreign policy in the international system context is examined. The hypothesis to address these inquiries is postulated using neo-realism theory. Accordingly, following oil independ...
متن کاملRule-Based Source-Code Analysis For Detecting Security Vulnerabilities
Many security vulnerabilities related to source code have simple syntactic patterns or flow patterns that can be described as rules. In this paper, we propose a rule description language, RDL, in which we can specify simple syntactic patterns and data-flow and control-flow patterns that possibly lead to security vulnerabilities. We then introduce a universal static detector that can find the lo...
متن کاملCollaborative Monitoring of Moving Target Defense Mechanisms for Cloud
Cloud computing has become a prominent paradigm in recent years. It has gained popularity among the information technology (IT) world due to its ability to transfer the capital expenditure to operational expenditure [1]. The cloud consumer can get access to high-end computing infrastructure of clouds by only paying for the duration of usage. The other advantages of clouds are: On-demand self-se...
متن کامل