Side-channel Attacks and Countermeasures in Cloud Services and Infrastructures

被引:2
|
作者
Albalawi, Abdullah [1 ]
Vassilakis, Vassilios [1 ]
Calinescu, Radu [1 ]
机构
[1] Univ York, Dept Comp Sci, York, N Yorkshire, England
关键词
Cloud Computing; Cache Side-channel Attacks;
D O I
10.1109/NOMS54207.2022.9789783
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing relies on the sharing of resources between users of the same physical machine, to reduce costs through optimizing and increasing utilization. However, sharing these resources may be with malicious users, which could lead to confidentiality violations through co-residency attacks. These attacks may exploit the sharing of resources such as cache memory to reveal a legitimate user's recent activities. Multiple techniques and factors can be exploited to perform side-channel attacks and other microarchitectural attacks successfully. Therefore, despite all its benefits, multi-tenancy remains a risk factor in cloud computing. Without appropriate mitigation, this security risk could become the primary concern hindering cloud adoption. This doctoral paper proposes the integrated use of three approaches to provide the necessary protection for shared virtualized systems. These approaches provide self-protection for the virtual machine (VM) on which they are used by monitoring activities within shared virtualized systems, determining the threat level of suspicious VMs, and providing periodic scanning of the virtualized system against microarchitectural attacks and viruses.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] Codes for Side-Channel Attacks and Protections
    Guilley, Sylvain
    Heuser, Annelie
    Rioul, Olivier
    CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 35 - 55
  • [42] Side-Channel Attacks in a Real Scenario
    Ming Tang
    Maixing Luo
    Junfeng Zhou
    Zhen Yang
    Zhipeng Guo
    Fei Yan
    Liang Liu
    Tsinghua Science and Technology, 2018, 23 (05) : 586 - 598
  • [43] Synthesis of Adaptive Side-Channel Attacks
    Quoc-Sang Phan
    Bang, Lucas
    Pasareanu, Corina S.
    Malacaria, Pasquale
    Bultan, Tevfik
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 328 - 342
  • [44] Side-Channel Attacks in a Real Scenario
    Tang, Ming
    Luo, Maixing
    Zhou, Junfeng
    Yang, Zhen
    Guo, Zhipeng
    Yan, Fei
    Liu, Liang
    TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 586 - 598
  • [45] Optimal Collision Side-Channel Attacks
    Glowacz, Cezary
    Grosso, Vincent
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2019, 2020, 11833 : 126 - 140
  • [46] Side-Channel Attacks on Cryptographic Software
    Lawson, Nate
    IEEE SECURITY & PRIVACY, 2009, 7 (06) : 65 - 68
  • [47] Advances in Side Channel Attacks and Countermeasures
    Wang Y.-J.
    Fan H.-P.
    Dai Z.-Y.
    Yuan Q.-J.
    Wang X.-B.
    Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (01): : 202 - 228
  • [48] Side-Channel Attacks: A Short Tour
    Piessens, Frank
    van Oorschot, Paul C.
    Piessens, Frank
    van Oorshot, Paul C.
    IEEE SECURITY & PRIVACY, 2024, 22 (02) : 75 - 80
  • [49] Generic Side-Channel Countermeasures for Reconfigurable Devices
    Gueneysu, Tim
    Moradi, Amir
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 33 - 48
  • [50] Cache Side-Channel Attacks and Defenses
    Zhang W.
    Bai L.
    Ling Y.
    Lan X.
    Jia X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 206 - 222