Side-channel Attacks and Countermeasures in Cloud Services and Infrastructures

被引:2
|
作者
Albalawi, Abdullah [1 ]
Vassilakis, Vassilios [1 ]
Calinescu, Radu [1 ]
机构
[1] Univ York, Dept Comp Sci, York, N Yorkshire, England
关键词
Cloud Computing; Cache Side-channel Attacks;
D O I
10.1109/NOMS54207.2022.9789783
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing relies on the sharing of resources between users of the same physical machine, to reduce costs through optimizing and increasing utilization. However, sharing these resources may be with malicious users, which could lead to confidentiality violations through co-residency attacks. These attacks may exploit the sharing of resources such as cache memory to reveal a legitimate user's recent activities. Multiple techniques and factors can be exploited to perform side-channel attacks and other microarchitectural attacks successfully. Therefore, despite all its benefits, multi-tenancy remains a risk factor in cloud computing. Without appropriate mitigation, this security risk could become the primary concern hindering cloud adoption. This doctoral paper proposes the integrated use of three approaches to provide the necessary protection for shared virtualized systems. These approaches provide self-protection for the virtual machine (VM) on which they are used by monitoring activities within shared virtualized systems, determining the threat level of suspicious VMs, and providing periodic scanning of the virtualized system against microarchitectural attacks and viruses.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] Preventing Cache-Based Side-Channel Attacks in a Cloud Environment
    Godfrey, Michael
    Zulkernine, Mohammad
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2014, 2 (04) : 395 - 408
  • [32] Towards Thwarting Template Side-Channel Attacks in Secure Cloud Deduplications
    Zhang, Yuan
    Mao, Yunlong
    Xu, Minze
    Xu, Fengyuan
    Zhong, Sheng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1008 - 1018
  • [33] Introduction to Side-Channel Attacks and Fault Attacks
    Li, Yang
    Chen, Mengting
    Wang, Jian
    2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2016, : 573 - 575
  • [34] A Server-Side Solution to Cache-Based Side-Channel Attacks in the Cloud
    Godfrey, Michael
    Zulkernine, Mohammad
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 163 - 170
  • [35] SCINFER: Refinement-Based Verification of Software Countermeasures Against Side-Channel Attacks
    Zhang, Jun
    Gao, Pengfei
    Song, Fu
    Wang, Chao
    COMPUTER AIDED VERIFICATION, CAV 2018, PT II, 2018, 10982 : 157 - 177
  • [36] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [37] Side-channel attacks and countermeasures for heart rate retrieval from ECG characterization device
    Perez-Tirador, Pablo
    Desai, Madhav
    Rodriguez, Alejandro
    Berral, Elena
    Romero, Teresa
    Caffarena, Gabriel
    Jevtic, Ruzica
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 24 (01)
  • [38] CASCA: A Design Automation Approach for Designing Hardware Countermeasures Against Side-Channel Attacks
    Delledonne, Lorenzo
    Zaccaria, Vittorio
    Susella, Ruggero
    Bertoni, Guido
    Melzani, Filippo
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2018, 23 (06)
  • [39] Automated Instantiation of Side-Channel Attacks Countermeasures for Software Cipher Implementations Position Paper
    Agosta, Giovanni
    Barenghi, Alessandro
    Pelosi, Gerardo
    PROCEEDINGS OF THE ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS (CF'16), 2016, : 455 - 460
  • [40] DRM to Counter Side-Channel Attacks?
    Benadjila, Ryad
    Billet, Olivier
    Francfort, Stanislas
    DRM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON DIGITAL RIGHTS MANAGEMENT, 2007, : 23 - 32