Bolt: Uncovering and Reducing the Security Vulnerabilities of Shared Clouds

نویسندگان

  • Christina DELIMITROU
  • Christos KOZYRAKIS
چکیده

Cloud providers routinely schedule multiple applications per physical host to increase cost efficiency. The resulting interference in shared resources leads to performance degradation and, more importantly, security vulnerabilities. Interference can leak important information ranging from the placement of a service to confidential data, like private keys. We present Bolt, a practical system that accurately detects the type and characteristics of applications sharing a cloud platform, based on the interference an adversary sees on shared resources. Bolt leverages practical data mining techniques for detection that operate online and require 2-5 seconds. In a 40-server shared cluster, Bolt correctly detects 81% out of 108 diverse batch and interactive workloads. Extracting this information enables a wide spectrum of previouslyimpractical cloud attacks, including denial of service (DoS), resource freeing (RFA) and co-residency attacks. For example, Bolt can successfully launch difficult to detect, host-based DoS attacks, with only a fraction of the resources and time needed by a conventional distributed DoS that cause the tail latency of the victim to increase by up to 140x. Finally, we show that, while advanced isolation techniques, such as cache partitioning, lower detection accuracy, they are insufficient to eliminate these vulnerabilities. To do so, one must either disallow core sharing, or only allow it between threads of the same application, leading to significant inefficiencies and performance penalties respectively.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

Identifying and Measuring Security Critical Path for Uncovering Circuit Vulnerabilities

Hardware is an increasingly attractive attack surface since it controls low-level access to critical resources like cryptographic keys, personally identifiable information, and firmware. Unfortunately, it is difficult to assess the security vulnerabilities of a hardware design, which is a consequence of too few hardware security design tools and metrics. In this work, we describe important secu...

متن کامل

Reducing the U.S dependency on oil and gas imports, implications for its policies in the international system

This paper aims to firstly explain the significance of the U.S oil independency and its consequences on the U.S foreign strategy in international politics. Secondly, the implications of this energy policy on the U.S foreign policy in the international system context is examined. The hypothesis to address these inquiries is postulated using neo-realism theory. Accordingly, following oil independ...

متن کامل

Rule-Based Source-Code Analysis For Detecting Security Vulnerabilities

Many security vulnerabilities related to source code have simple syntactic patterns or flow patterns that can be described as rules. In this paper, we propose a rule description language, RDL, in which we can specify simple syntactic patterns and data-flow and control-flow patterns that possibly lead to security vulnerabilities. We then introduce a universal static detector that can find the lo...

متن کامل

Collaborative Monitoring of Moving Target Defense Mechanisms for Cloud

Cloud computing has become a prominent paradigm in recent years. It has gained popularity among the information technology (IT) world due to its ability to transfer the capital expenditure to operational expenditure [1]. The cloud consumer can get access to high-end computing infrastructure of clouds by only paying for the duration of usage. The other advantages of clouds are: On-demand self-se...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016