Hey, You, Get Off of My Cloud Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage Presented by Daniel De Graaf
Cloud Computing Virtual Machines with Dynamic Allocation – Amazon EC2 – Microsoft Azure – Rackspace Mosso Trusted provider, untrusted clients
Attacks on the Cloud Targeted attacks – Hypervisor compromise – Denial of Service – Information leakage Most need attacker’s and victim’s VM to be on the same physical host
Cloud Cartography Mapping current and future allocations Dynamic allocation Current systems have high placement locality Overall success of 40% for a given target
Attacks on Co-Resident VMs Information leakage – Disk I/O (access time) – CPU usage (cache timings) – Network traffic rate (latency and/or bandwidth) Critical information leak – SSH keystroke timings