Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds Written by Thomas Ristenpart Eran Tromer Hovav Shacham Stehan.

Slides:



Advertisements
Similar presentations
Distributed System Lab.1 Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds Thomas Ristenpart ¤, Eran Tromer, Hovav.
Advertisements

Rohit Kugaonkar CMSC 601 Spring 2011 May 9 th 2011
Lecture 5: Cloud Security: what’s new? Xiaowei Yang (Duke University)
Lecture 4: Cloud Computing Security: a first look Xiaowei Yang (Duke University)
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 3 02/15/2010 Security and Privacy in Cloud Computing.
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds Yan Qiang,
Virtualization and Cloud Computing. Definition Virtualization is the ability to run multiple operating systems on a single physical system and share the.
Locality-Aware Dynamic VM Reconfiguration on MapReduce Clouds Jongse Park, Daewoo Lee, Bokyeong Kim, Jaehyuk Huh, Seungryoul Maeng.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 11 04/25/2011 Security and Privacy in Cloud Computing.
Resource-Freeing Attacks: Improve Your Cloud Performance (at Your Neighbor's Expense) (Venkat)anathan Varadarajan, Thawan Kooburat, Benjamin Farley, Thomas.
Public Clouds (EC2, Azure, Rackspace, …) VM Multi-tenancy Different customers’ virtual machines (VMs) share same server Provider: Why multi-tenancy? Improved.
Hey You, Get Off My Cloud: Exploring information Leakage in third party compute clouds T.Ristenpart, Eran Tromer, Hovav Shacham and Steven Savage ACM CCS.
Hey, You, Get Off of My Cloud
ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
By Christopher Moran, Nicoara Talpes 1.  Solution is addressed to VMs that are web servers  Web servers should not have confidential information anyway.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds by Thomas Ristenpart et al. defended by Ning Xia & Najim Yaqubie.
Fawaz Alsaadi Fahad Alsolmai.  Secure information sharing across different organizations is an emerging issue for collaborative software development,
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds By Thomas Ristenpart Eran Tromer Hovav Shacham Stefan Savage.
Authors: Thomas Ristenpart, et at.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2013 Lecture 3 09/03/2013 Security and Privacy in Cloud Computing.
Secure Cloud Computing with Virtualized Network Infrastructure HotCloud 10 By Xuanran Zong.
Virtual Network Servers. What is a Server? 1. A software application that provides a specific one or more services to other computers  Example: Apache.
Threat Modeling for Cloud Computing (some slides are borrowed from Dr. Ragib Hasan) Keke Chen 1.
1 Integrating a Network IDS into an Open Source Cloud Computing Environment 1st International Workshop on Security and Performance in Emerging Distributed.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 2 02/01/2010 Security and Privacy in Cloud Computing.
A User Experience-based Cloud Service Redeployment Mechanism KANG Yu.
Eliminating Fine Grained Timers in Xen Bhanu Vattikonda with Sambit Das and Hovav Shacham.
Lecture 15 – Amazon Network as a Service. Recall IaaS Server as a Service Storage as a Service Network as a Service.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 4 09/10/2013 Security and Privacy in Cloud Computing.
Processes and OS basics. RHS – SOC 2 OS Basics An Operating System (OS) is essentially an abstraction of a computer As a user or programmer, I do not.
Presented by: Mostafa Magdi. Contents Introduction. Cloud Computing Definition. Cloud Computing Characteristics. Cloud Computing Key features. Cost Virtualization.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud F2F Security Issues in the cloud Introduction Linda Cornwall,
Thomas Ristenpart,Eran Tromer, Horav Shahcham and Stefan Savage
Cloud security Tom Ristenpart CS Software-as-a-service Infrastructure-as-a- service Cloud providers Cloud computing NIST: Cloud computing is a model.
The New Zealand Institute for Plant & Food Research Limited Use of Cloud computing in impact assessment of climate change Kwang Soo Kim and Doug MacKenzie.
HEY, YOU, GET OFF OF MY CLOUD: EXPLORING INFORMATION LEAKAGE IN THIRD-PARTY COMPUTE CLOUDS Eran Tromer MIT Hovav Shacham UCSD Stefan Savage UCSD ACM CCS.
A paper by Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security,
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Workpackage 3 New security algorithm design ICS-FORTH Ipswich 19 th December 2007.
Operating Systems Security
Security Vulnerabilities in A Virtual Environment
Multilevel Caches Microprocessors are getting faster and including a small high speed cache on the same chip.
SubVirt: Implementing malware with virtual machines Authors: Samuel T. King, Peter M. Chen University of Michigan Yi-Min Wang, Chad Verbowski, Helen J.
Cloud Computing is a Nebulous Subject Or how I learned to love VDF on Amazon.
HoneyStat: Local Worm Detection Using Honeypots David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, et al from Georgia Institute of Technology Authors: The.
References: “Hey, You, Get Off My Cloud: Exploring Information Leakage in Third-Party Compute Clouds” by Thomas Ristenpart, Eran Tromer – UC San Diego;
Hey, You, Get Off of My Cloud Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage Presented by Daniel De Graaf.
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
Launch Amazon Instance. Amazon EC2 Amazon Elastic Compute Cloud (Amazon EC2) provides resizable computing capacity in the Amazon Web Services (AWS) cloud.
1 IP Routing table compaction and sampling schemes to enhance TCAM cache performance Author: Ruirui Guo, Jose G. Delgado-Frias Publisher: Journal of Systems.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Unit 2 VIRTUALISATION. Unit 2 - Syllabus Basics of Virtualization Types of Virtualization Implementation Levels of Virtualization Virtualization Structures.
By Collin Donaldson Man in the Middle Attack: Password Sniffing and Cracking.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Thomas Ristenpart , Eran Tromer, Hovav Shacham ,Stefan Savage CCS’09
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Mapping/Topology attacks on Virtual Machines
Threat Modeling for Cloud Computing
Hey, You, Get Off of My Cloud
Efficient Multi-User Indexing for Secure Keyword Search
Written by : Thomas Ristenpart, Eran Tromer, Hovav Shacham,
Bruhadeshwar Meltdown Bruhadeshwar
Digital Pacman: Firewall Edition
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Identifying Slow HTTP DoS/DDoS Attacks against Web Servers DEPARTMENT ANDDepartment of Computer Science & Information SPECIALIZATIONTechnology, University.
Virtual Memory: Working Sets
Exploring Information Leakage in Third-Party Compute Clouds
Presentation transcript:

Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds Written by Thomas Ristenpart Eran Tromer Hovav Shacham Stehan Savage Presented by Jeremy Weinstein

Outline IntroductionMotivation System specifications Experiments Explore cloud infrastructure. Explore cloud infrastructure. Determine co-residency. Determine co-residency. Achieve co-residency. Achieve co-residency. Exploit information. Exploit information. Legal, Ethical, and Contractual implications ConclusionContributionsWeaknessesReferencesQuestions?

Introduction Cloud computing is an networked computing system in which hardware with extra resources can be used by other users. Resource examples: Clock cycles Clock cycles Disk space Disk space

Introduction Sample Architecture

Introduction Who is this useful for? Consumers Need more computing resources than they have available. Need more computing resources than they have available. Temporary need which does not justify purchasing hardware. Temporary need which does not justify purchasing hardware.Seller Has more resources than they need. Has more resources than they need. Can make revenue selling or renting to clients. Can make revenue selling or renting to clients.

Motivation Computing systems such as this have many well documented security flaws. New infrastructure “expands the attack surface of the victim.” One client can access information from another if they are on the same physical machine.

System specifications Experiments were preformed on Amazon’s EC2 (Elastic Compute Cloud). Client space was purchased. This took the form of one or more Virtual Machines (VM). This took the form of one or more Virtual Machines (VM). Most experiments were done on m1.small instance type. The following specifications were split across all active clients on this particular cloud. 32-bit architecture 32-bit architecture Single virtual core equivalent to GHz 2007 Opteron processor. Single virtual core equivalent to GHz 2007 Opteron processor. 1.7 GB memory 1.7 GB memory 160 GB disk space. 160 GB disk space. $0.10 per hour fee. $0.10 per hour fee.

Experiments The goal is to determine the viability of attaining restricted data from another client. Targeted ports 80 and 443 only (http and https). The experiments use network probing to attain relevant information.

Probes External Probe: Probe originates outside the EC2 server and targets a user in the EC2 server. Probe originates outside the EC2 server and targets a user in the EC2 server. Internal Probe: Probe originates inside the EC2 server and targets a user in the EC2 server. Probe originates inside the EC2 server and targets a user in the EC2 server. External probing is contractually illegal by Amazon’s Terms of Use Policy.

Exploring the cloud infrastructure Clients on the EC2 server were assigned an IP address with prefix bits shared with other clients’ IPs, depending on instance type. Probing other addresses with WHOIS determined which areas of the network were being utilized by users.

Cloud Cartography

Determining co-residency To be co-resident you need: Matching dom0 addresses (same hardware) Matching dom0 addresses (same hardware) Small round-trip packet time or Small round-trip packet time or Similar IP addresses Similar IP addresses Using multiple accounts in arbitrary locations, they checked these factors to determine co- residency. Having the actual values of one’s own account determined a nil false positive rate.

Achieving co-residency Two techniques are presented to become co- resident with another user Brute Force Arbitrarily probe a target zone over a long period of time. Arbitrarily probe a target zone over a long period of time. Experiments achieved an 8.4% coverage of targets. Experiments achieved an 8.4% coverage of targets. Placement Locality Attack recently launched instances (temporal locality). Attack recently launched instances (temporal locality). Reports achieving co-residence 40% of the time. Reports achieving co-residence 40% of the time.

Achieving co-residency

Exploiting information Knowing about the cloud your account is on gives you key information about other users E.G. computational load. E.G. computational load. The slower your memory access, the more resources a co-resident user is using. One proposed method of using this information is as a pseudo key logger, determining the time between keystrokes.

Extracting information 1) Allocate memory 2) Sleep briefly to rank high on the scheduler 3) Prime: Read the memory to be sure its fully cached 4) Trigger: Loop until CPU’s cycle increases by a large amount (indicates other user access) 5) Probe: Analyze differences between reads.

Legal, Ethical, and Contractual implications Project was government funded. Computer Fraud and Abuse Act Probes checked public ports only Skirted around definitions such as “access” and “authorization” A malicious hacker would not be constrained by these issues

Prevention A hacker can be slowed or stopped by trying to prevent internal probing, or reducing the information a client has. Doing so would limit vulnerability of clients. Hackers would be prevented from seeing private information about the provider such as server infrastructure.

Conclusion Using these techniques a hacker can gain access a cloud client. As a client Probe the network Probe the network Learn its mapping Learn its mapping Attempt to gain co-residence with another client Attempt to gain co-residence with another client Gain private information from the co-resident Gain private information from the co-resident

Contributions Thorough analysis of every step required to exploit this technique. Techniques yielded good results. Indicated the importance of this work. Indicated the importance of this work. Made recommendations for further work.

Weaknesses Omitted outlier results from their conclusions. Walked a fine line of unethical research. Many graphs seemed busy and unhelpful. One experiment implied a very low number of test cases.

References [1]Ristenpart T, Trhomer E, Scacham H, Savage S. “Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds.” [2]Cloud Computing. ng. March ng ng

Questions?