Vulnerability Evaluation for Securely Offloading Mobile Apps in the Cloud He Zhu, Changcheng Huang and James Yan Department of Systems and Computer Engineering,

Slides:



Advertisements
Similar presentations
TWO STEP EQUATIONS 1. SOLVE FOR X 2. DO THE ADDITION STEP FIRST
Advertisements

1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senns Information Technology, 3 rd Edition Chapter 7 Enterprise Databases.
Using Matrices in Real Life
Advanced Piloting Cruise Plot.
Chapter 1 The Study of Body Function Image PowerPoint
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 12 Cross-Layer.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 3 CPUs.
STATISTICS HYPOTHESES TEST (II) One-sample tests on the mean and variance Professor Ke-Sheng Cheng Department of Bioenvironmental Systems Engineering National.
1 IEEE Media Independent Handoff Overview of services and scenarios for 3GPP2 Stefano M. Faccin Liaison officer to 3GPP2.
Fundamental Relationship between Node Density and Delay in Wireless Ad Hoc Networks with Unreliable Links Shizhen Zhao, Luoyi Fu, Xinbing Wang Department.
An analysis of Social Network-based Sybil defenses Bimal Viswanath § Ansley Post § Krishna Gummadi § Alan Mislove ¶ § MPI-SWS ¶ Northeastern University.
© 2010 Pearson Addison-Wesley. All rights reserved. Addison Wesley is an imprint of Chapter 11: Structure and Union Types Problem Solving & Program Design.
Chapter 3: Top-Down Design with Functions Problem Solving & Program Design in C Sixth Edition By Jeri R. Hanly & Elliot B. Koffman.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
My Alphabet Book abcdefghijklm nopqrstuvwxyz.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
1 Term 2, 2004, Lecture 9, Distributed DatabasesMarian Ursu, Department of Computing, Goldsmiths College Distributed databases 3.
1 Processes and Threads Creation and Termination States Usage Implementations.
Chapter 1 Introduction Copyright © Operating Systems, by Dhananjay Dhamdhere Copyright © Introduction Abstract Views of an Operating System.
Secure Virtual Machine Execution Under an Untrusted Management OS Chunxiao Li Anand Raghunathan Niraj K. Jha.
MICRO-BUMP ASSIGNMENT FOR 3D ICS USING ORDER RELATION TA-YU KUAN, YI-CHUN CHANG, TAI-CHEN CHEN DEPARTMENT OF ELECTRICAL ENGINEERING, NATIONAL CENTRAL UNIVERSITY,
Intel VTune Yukai Hong Department of Mathematics National Taiwan University July 24, 2008.
Two-Market Inter-domain Bandwidth Contracting
Mehdi Naghavi Spring 1386 Operating Systems Mehdi Naghavi Spring 1386.
Managing Web server performance with AutoTune agents by Y. Diao, J. L. Hellerstein, S. Parekh, J. P. Bigu Jangwon Han Seongwon Park
On Comparing Classifiers : Pitfalls to Avoid and Recommended Approach
Randomized Algorithms Randomized Algorithms CS648 1.
1 The phone in the cloud Utilizing resources hosted anywhere Claes Nilsson.
ABC Technology Project
Chapter 10: Virtual Memory
A Survey of Web Cache Replacement Strategies Stefan Podlipnig, Laszlo Boszormenyl University Klagenfurt ACM Computing Surveys, December 2003 Presenter:
Taming User-Generated Content in Mobile Networks via Drop Zones Ionut Trestian Supranamaya Ranjan Aleksandar Kuzmanovic Antonio Nucci Northwestern University.
Source: IEEE Pervasive Computing, Vol. 8, Issue.4, Oct.2009, pp. 14 – 23 Author: Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N. Adviser: Chia-Nian.
LOGO Mobile Cloud Computing Hossein Abdolghafar Advisor :Dr. H.Salimi Februray /25.
Extending the Capacity of Mobile Devices Through Cloud Offloading Francisco Airton – PhD Student 04 of may, 2014 Workshop MoDCS
Asaf Cidon. , Tomer M. London
25 July, 2014 Hailiang Mei, TU/e Computer Science, System Architecture and Networking 1 Hailiang Mei Remote Terminal Management.
VOORBLAD.
Making Time-stepped Applications Tick in the Cloud Tao Zou, Guozhang Wang, Marcos Vaz Salles*, David Bindel, Alan Demers, Johannes Gehrke, Walker White.
Virtual Switching Without a Hypervisor for a More Secure Cloud Xin Jin Princeton University Joint work with Eric Keller(UPenn) and Jennifer Rexford(Princeton)
1 Breadth First Search s s Undiscovered Discovered Finished Queue: s Top of queue 2 1 Shortest path from s.
Protecting Location Privacy: Optimal Strategy against Localization Attacks Reza Shokri, George Theodorakopoulos, Carmela Troncoso, Jean-Pierre Hubaux,
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
© 2012 National Heart Foundation of Australia. Slide 2.
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS Fall 2011 Prof. Jennifer Welch CSCE 668 Set 14: Simulations 1.
1 On c-Vertex Ranking of Graphs Yung-Ling Lai & Yi-Ming Chen National Chiayi University Taiwan.
Addition 1’s to 20.
25 seconds left…...
Detecting Spam Zombies by Monitoring Outgoing Messages Zhenhai Duan Department of Computer Science Florida State University.
Week 1.
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Connecting LANs, Backbone Networks, and Virtual LANs
PSSA Preparation.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
Introduction to Ad-hoc & Sensor Networks Security In The Name of God ISC Student Branch in KNTU 4 th Workshop Ad-hoc & Sensor Networks.
Xiao Zhang and Wenliang Du Dept. of Electrical Engineering & Computer Science Syracuse University.
University of Minnesota Optimizing MapReduce Provisioning in the Cloud Michael Cardosa, Aameek Singh†, Himabindu Pucha†, Abhishek Chandra
Instructor: Shengyu Zhang 1. Content Two problems  Minimum Spanning Tree  Huffman encoding One approach: greedy algorithms 2.
Delay Analysis and Optimality of Scheduling Policies for Multihop Wireless Networks Gagan Raj Gupta Post-Doctoral Research Associate with the Parallel.
Secret Sharing, Matroids, and Non-Shannon Information Inequalities.
Scalable Rule Management for Data Centers Masoud Moshref, Minlan Yu, Abhishek Sharma, Ramesh Govindan 4/3/2013.
Exploring Energy-Latency Tradeoffs for Broadcasts in Energy-Saving Sensor Networks AUTHOR: MATTHEW J. MILLER CIGDEM SENGUL INDRANIL GUPTA PRESENTER: WENYU.
ThinkAir: Dynamic Resource Allocation and Parallel Execution in Cloud for Mobile Code Offloading Sokol Kosta, Pan Hui Deutsche Telekom Labs, Berlin, Germany.
Clone-Cloud. Motivation With the increasing use of mobile devices, mobile applications with richer functionalities are becoming ubiquitous But mobile.
Nguyen Thi Thanh Nha HMCL by Roelof Kemp, Nicholas Palmer, Thilo Kielmann, and Henri Bal MOBICASE 2010, LNICST 2012 Cuckoo: A Computation Offloading Framework.
Application-Aware Traffic Scheduling for Workload Offloading in Mobile Clouds Liang Tong, Wei Gao University of Tennessee – Knoxville IEEE INFOCOM
Presentation transcript:

Vulnerability Evaluation for Securely Offloading Mobile Apps in the Cloud He Zhu, Changcheng Huang and James Yan Department of Systems and Computer Engineering, Carleton University 1

Outline Motivation Challenges Our contribution Object Dependency Graph (ODG) Vulnerability Experimental results Conclusion 2

Motivation Mobile devices are limited in computing resources and power Datacenter has virtually unlimited resources Cheaper Higher availability Elastic resources Divide mobile applications into components Offloading some components into cloud Keep remaining components in mobile devices Issues Which components to offload 3

Current offloading schemes Only consider the constrained resources on mobile platforms Target higher computing power and lower energy cost CloneCloud[1]: A mobile app partitioning system Optimizing execution time and energy use ThinkAir [2]: A framework to migrate smartphone apps to the cloud. Parallelizing method execution using multiple VM images Less phone-side energy consumption and shorter execution time Lack of consideration for security when offloading apps [1] B. G. Chun, S. Ihm, P. Maniatis, M. Naik and A. Patti, "Clonecloud: elastic execution between mobile device and cloud," In Proceedings of the sixth conference on computer systems, ACM, [2] S. Kosta, A. Aucinas, P. Hui, R. Mortier and X. Zhang, "Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading," In Proceedings of IEEE INFOCOM,

Security risks for offloading apps Datacenter is a shared environment Isolation not strong enough Data breach and data loss Malicious insiders Hackers Applications can be attacked Service traffic hijacking DoS Alice Hacker Malicious insider 5

Approach based encryption Computation overhead Only applicable to data Running code vulnerable in shared environment Lack of analytical model for evaluating vulnerabilities of app parts for distributed applications. Lack of algorithm to offload securely Lack of practical systems for securely offloading app parts into the cloud 6 Outstanding issues

Challenges for secure offloading Complex call relationships of classes and functions within an app make it difficult to highlight vulnerable parts Hard to determine the level of protection for the parts to choose between security and performance No mature systems have been built to break down and offload apps. 7

Our approach Divide an app into multiple parts, aka objects Connect objects by their dependencies Build an Object Dependency Graph (ODG) Identify the sources causing vulnerability Calculate how vulnerability can propagate from one object to another object Evaluate the impact of each object Optimize offloading based on vulnerability threshold and resource usage 8

The definition of Objects Objects in a running app as the basic units for analysis Instantiated from encapsulated class definitions Consistent with the definition in Object-Oriented Programming (OOP) Local object An object running on the local smartphone Remote object An object running in the cloud Two objects may have dependencies on each other 9 Object Dependency

Forms of object dependencies There are two forms of object dependencies Call relationship Message Passing Call relationship is established by local method invocation between local objects. Message passing is done by remote service invocation if at least one side is a remote object. 10 Local Object Call relationship Message passing Local ObjectRemote Object Message passing

Vulnerability Definition The probability an object will be compromised Many sources Unsafe environment such as datacenter Dependency between objects Cloud-originated vulnerability Incurred through indirect interactions with cloud Caused by shared environment such side channel or DoS Propagated vulnerability Incurred through direct interactions Dependency between objects Focus of this paper 11

The cloud-originated vulnerability Many possible sources Treated as the self-originated vulnerability Can be obtained through statistics or reputation system Out of the scope of this paper 12 Obj Memory/CPU Cache leaks Side/Covert channels Cloud Environment Designated backdoors … Vulnerability due to interaction with cloud

The propagated vulnerability Object dependencies lead to the propagation of vulnerabilities Defined as the probability that an attack originates from one compromised object to another object through call relationships or message passing. 13 Cloud Environment Object Dependency Object Dependency Object Dependency Attack

Modeling with Object Dependency Graph (ODG) 14 v1 v2 v3 v4 e 12 e 13 e 23 e 34

Minimal path set 15 o y d x r od 1 r 2 r 3 r 4 LEGENDS Compromised object

Minimal cut set 16 o y d x c od 1 c 2 c 3 c 4 Compromised object

Lower bound of vulnerability 17

18 Upper bound of vulnerability

The bounds of the propagated vulnerability and the algorithm 19 Algorithm 1 Propagated Vulnerability Algorithm 1function pva(o, d): 2 upperBound = for each edge e1 in p1 do 6 7 end for for each edge e2 in p2 do end for end for return result 21end function Algorithm implementation shown in Algorithm 1. Input: the ODG topology Output: bounds of the propagated vulnerability

The impact of a compromised object 20

Evaluation and numerical results Three open-source sample applications: TrendCraw fetches news feeds from the Internet periodically, and then displays the contents to users. MyExpense manages the daily expense of the user. It does not have network-related actions. iMetro provides subway maps and station schedules of cities all over the world. It downloads subway information from the Internet according to users' selection. 21 App Name From Original Packages Imported Packages PackagesClassesActivities TrendCraw MyExpense iMetro packages written specifically for the apps imported from other libraries

ODG simplification Assume that impacts of imported packages are merged into cloud- originated vulnerabilities Focus on a relatively smaller number of objects Does not lose generality with the assumption that imported packages have been analyzed and account for cloud-originated vulnerabilities. Significantly reduced the time for analysis 22

Experiment process 23 With the ODG support library, the apks can be converted to support ODG-related logging. After uploading the logs to the cloud, the analysis will return the offloading decision to the smartphone. *APK: The file format of android installation package

Impact of system-wide vulnerability change 24 From the figures, the vulnerability of RenderProgram increased much faster than the other two objects The one- and two-hop neighbors of RenderProgram are much more than the other two objects. The objects with larger number of neighbors, including one- and two-hop neighbors, tend to have higher vulnerabilities RenderProgramRenderStationRenderStationName RenderProgram RenderStationName RenderStation

Phone-side energy cost Models compared with existing offloading mechanisms which only consider energy consumption and performance: CloneCloud (CCD) ThinkAir (TAR) ODG Compare normalized phone-side energy cost with the three offloading schemes under different percentages of objects offloaded. 25

Vulnerable objects accessible by the cloud The numbers of objects with more vulnerability impact accessible by the cloud are less exposed to the cloud for ODG. 26

Conclusion Introduced ODG based vulnerability model An algorithm to offload based on vulnerability level and resource usage. Experimental results show meeting security requirements while minimize mobile resource usage Vulnerability depends on the topology of ODG 27

Thank you! Questions? 28