Anda di halaman 1dari 8

2013 International Conference on Availability, Reliability and Security

Reconsidering Intrusion Monitoring Requirements


in Shared Cloud Platforms
Kahina Lazri , Sylvie Laniepce , Jalel Ben-Othman
Orange
Labs, Security Department.
42 rue des Coutures. Caen, France.
L2TI Laboratory, University of Paris Nord.

99 avenue Jean Baptiste Clement. 93430 Villetaneuse, France.


Email:{kahina.lazri, s.laniepce}@orange.com
jalel.ben-othman@univ-paris13.fr

AbstractMulti-tenancy is the core feature that enables ef- between VMs possibly belonging to different tenants called
ficiency and cost effectiveness of cloud computing. However, it multitenancy is the key feature that enables providers to
brings several new security concerns. Ensuring strong isolation cope with unforeseeable workload demand, either by providing
between co-localized tenants remains the most critical issue. This
work aims at highlighting new attack strategies brought by the more (less) resources to existing VMs or by instantiating new
resource sharing paradigm in multi-tenant elastic IaaS Clouds (removing) VMs.
in order to understand impacts of these attacks on the design of Security is certainly the main obstacle for a massive adop-
Intrusion Detection Systems in Cloud. The first part of this paper tion of Cloud model. Cloud security has been the subject
surveys the literature related to accepted vulnerabilities. Several of a great deal of research in both academic and industrial
Proofs of Concept are described and classified according to the
results of the exploitation of these vulnerabilities. In the second research communities. While some works focus on evaluating
part, we argue the existence of new attack strategies able to take whether or not to adopt the Cloud, we believe that Cloud
advantage of the mechanisms which enable autonomic elasticity. is becoming the fifth generation of IT architecture after the
These mechanisms are by nature sensitive to VMs resource Services Oriented Architecture (SOA) model, and the real
consumption which can be easily manipulated by attacks. Finally, issue is now how to make this model reliable.
we give a representation of the presented vulnerabilities to engage
a discussion on the limitations of pure user-centric security A major security challenge faced by the Cloud comes from
monitoring approaches for guaranteeing VM security. running different VMs in the same pool of resources. From the
security point of view, this resource sharing requires what we
I. I NTRODUCTION call Strong Isolation of the resources that are allocated by the
The definition of cloud computing paradigm has for a long Cloud infrastructure to the co-localized VMs (VMs running in
time remained an ambiguous concept. This may be justified the same physical machine). Strong isolation means that the
by the fact that cloud computing does not only represent co-localized VMs should have the same isolation as if they
a technology evolution but brings several new concepts in were running in separate physical machines. Therefore, we
the economical, architectural and indisputably technological consider that ensuring isolation is more than simply preventing
areas. The emergence of all these concepts has led to a deep one VM from accessing or modifying data and code of co-
revisiting of IT ecosystems in a global manner. Even if several localized VMs. The isolation should guarantee that one VM
definitions have been established in the last decade [1], [2], [3], behavior cannot disturb another co-localized VM running.
they all agree that Cloud is a new technology which enables In this paper, we discuss the vulnerabilities induced by the
delivering Software, Platform and Infrastructure as a Service resource sharing in the IaaS model. Beyond highlighting some
to end users over the Internet. A key feature that differentiates isolation-related vulnerabilities specific to Cloud platforms, the
the Cloud from legacy outsourcing solutions is elasticity [4]. goal of this work is to consider the existence of new attack
Thus, the Cloud is usually associated for cloud customers to strategies able to take advantage of the mechanisms enabling
the resource on demand and pay-as-you-use model. However, the multi-tenancy associated with autonomic elasticity, to dis-
we deem that even if the Cloud enables tailoring resource turb the running of VMs. These new attacks let us reconsider
consumption to computation footprint, current deployed mod- the requirements of intrusion detection monitoring systems to
els are still far from the dream of the Computer as a Utility take into consideration Cloud platform attributes.
model [5]. The rest of this paper is organized as follows. Section
Hardware virtualization constitutes the heart technology II provides some background on virtualization architectures
of Cloud, it enables running multiple instances of software and resource management mechanisms. Section III presents a
stack (application, middleware and OS) in the form of Virtual survey of exploited Cloud vulnerabilities focusing on breaking
Machines (VMs), within a single hardware machine in the isolation. Section IV identifies new malicious profiles that we
aim of improving efficiency and cost effectiveness both for suspect to be able to exploit the elasticity mechanisms to
cloud customers and providers. The sharing of resources disturb co-localized VMs. A last section provides a global

978-0-7695-5008-4/13 $26.00 2013 IEEE 630


DOI 10.1109/ARES.2013.83
view of the previously presented vulnerabilities to engage B. Elastic resource provisioning
a discussion on the limitations of pure user-centric security
approaches for guarantying VM security.
II. BACKGROUND ON RESOURCE MANAGEMENT IN The subscription-based pay-as-you-use model associated
VIRTUALIZATION PLATFORMS
with rapid elasticity is arguably the most attractive service of
the Cloud. Autonomic elasticity consists in dynamically resiz-
We first provide an overall view of the technologies involved ing allocated resources according to VM workload fluctuation,
in resource management in Cloud virtualization platforms, as allowing customers to pay only for the used resources. In order
an introduction to the study of the vulnerabilities induced by to ensure the fair sharing of resource between the co-localized
multi-tenancy and autonomic elasticity. VMs, the hypervisor sets a resource cap for each VM. The
A. Hardware Virtualization main challenge faced by the autonomic resource provisioning
Hardware virtualization is the core technology of the Cloud. systems is the proper tuning of the resource caps. Over-
It enables running multiple VMs concurrently in the same estimation is wasteful since the Cloud provider provisions
hardware machine with the help of the hypervisor also unused resources, while under-estimation is ineffective since it
referred to as Virtual Machine Monitor which is the entity tends to violate the Service Level Objectives (SLO). Thus, it is
responsible for running, scheduling and containing the VMs. crucial for Cloud providers to find the right trade-off between
Virtualization has appeared for the first time during the maximizing cost effectiveness and meeting SLO requirements.
beginning of 70s [6], its success was short because of the drop Current virtualization platform implementations maximize
of hardware costs and the emergence of multitasking operat- cost effectiveness and hardware resources utilization through
ing systems. However, in the 90s, virtualization came back overcommitment. Resource overcommitment consists in con-
since computing resources appeared to be often underused. figuring to VMs more resources than the total available
Thus, virtualization has been seen as the solution which may capacity of the host, expecting that the VMs do not use all
maximize hardware utilization. the resources that have been configured to each of them. If
The hypervisor is a thin layer of software intermediating resource contention occurs, the hypervisor migrates one VM
between the VMs and the hardware resources (CPU, Memory to another host having enough available resources [16].
and I/O devices). Its primary role is to manage resources
and to ensure isolation between the various running tenants. Some emerging approaches aim at automatically readjusting
To guarantee the control of the VMs execution, the hyper- the resource cap. The re-calculation of this cap may be
visor provides a virtual form of hardware resources to the achieved by two ways. The first one consists in configuring
VMs (virtual CPU, Shadow Page Tables, virtual NIC) [7]. some pre-established rules, which when verified, trigger the
According to the way in which they handle guest operating cap readjustment. Such a system is implemented in [17],
systems, virtualization software may be broken down into two [18]. The second one is based on adaptive resource prediction
categories. models in order to estimate the coming VM behavior [19].
The first is Paravirtualization. This technique relies on modi- This latter way still suffers from over and under-estimation
fying guest operating systems to cooperate with the hypervisor errors.
via hypercalls. Even if this means presents good performance,
Resizing the amount of VMs assigned resources is still
portability remains its main drawback. The popular Xen hy-
challenging. Two main methods have been proposed to deal
pervisor relies in this technique [8].
with workload fluctuation. The scaling-up method vertical
The second, which is called Full virtualization, enables
scalability consists of using the underlying infrastructure to
running VMs without any OS modification. This method
provide (or release) resources to the VM within the hosting
relies on the Binary Translation technique which enables the
physical machine the VM is running on, while the operating
hypervisor to intercept sensitive instructions during guest OSs
system is running. Unfortunately, this method is not yet usable
executions, and converts them into hypervisor instructions [9].
since current operating systems do not support on-the-fly
The most well-known hypervisor using Binary Translation
modification (without rebooting) of the amount of resource
technique is VMware ESX Server [10].
allocated to them. The method referred to as scaling-out
Interposition at the virtualization layer level enables many
horizontal scalability consists in aggregating resources
interesting functions [11] such as network traffic inspection,
of several hosts in a same virtual pool by duplicating (or
out-of-VM security management, and flexibility by enabling
removing) instances of VM while load balancers distribute the
VM migration. Unfortunately, interposition leads to significant
load among the different VM instances hosted on the different
performance deterioration. It impacts throughput, latency and
servers [20].
CPU load [12], [13]. To reduce the hypervisor complexity and
improve overhead, hardware builders have introduced many We now first survey the literature related to some vulner-
functions at the hardware level to assist software virtualization abilities of virtualization platforms aiming at hurting strong
[14], [15]. Despite the many benefits of hardware assisted isolation between VMs, while some elasticity vulnerabilities
virtualization, these new features bring several security chal- are considered for their impacts on strong isolation in Section
lenges highlighted in the underlying section. IV.

631
III. S URVEY OF ACCEPTED ISOLATION - RELATED However, it is prominent to note that most of these attacks
VULNERABILITIES require to gain Dom0 privilege. This may be obtained by
In this section, we classify accepted attacks among four exploiting misconfiguration or flaws in the device drivers.
categories according to the results of some hypervisor-related
B. Theft of Resource
code and design vulnerabilities.
The goal of theft of resource attacks often referred to
A. Hypervisor subversion as theft of service is to unduly obtain resources at the
As stated above, the hypervisor is the entity responsible expense of the provider or at the one of co-localized VMs
for running and containing the VMs. Therefore, the security possibly preventing them from properly benefiting from their
level of the VMs is strongly bound to the robustness of the own service subscription. This type of isolation breakout may
hypervisor. It has been said that the hypervisor may be trusted result in billing issue, cross-VM performance degradation,
since it contains few lines of code and is consequently easy resource starvation and denial of service.
to audit [21], [22]. However, current hypervisor implementa- In [36], the authors exploit the Xen scheduler design vulner-
tions are always aiming at incorporating more features such abilities to demonstrate the effectiveness of this type of attack.
as network monitoring or virtual appliance integration [23], The key idea of the implemented attack consists in exploiting
which increases the attack surface of the hypervisor [24]. the periodicity and the predictability of the Xen scheduling
After all, even if hypervisors are smaller than legacy operating mechanism. To ensure fair sharing, the Xen scheduler assigns
systems, hypervisors remain software and they certainly suffer and debits the vCPU credits allocated to each VM at a
from bugs and flaws, as regularly reported in the Common fixed frequency [37]. Hence, a malicious VM can bypass the
Vulnerabilities and Exposures Database [25]. foreseeable debiting stage by deliberately interrupting itself
The main sources of hypervisor vulnerability are the soft- entering in the sleep mode just before the fixed frequency
ware flaws. In [26], Ormandy has audited the most popular checking occurs. This allows the VM to keep its allocated
virtualization platforms, including VMware Workstation [27], credit undebited and consequently to gain greater priority
VMware ESX, XEN and Qemu [28], using fuzzing tools. These for future vCPU use. Moreover, such a malicious VM can
tools generate random byte sequences and I/O port activity preempt the currently running VMs since the Xen scheduler
within the VMs until an error or a crash occurs. Results show enables interrupted VMs to have higher execution priority on
that none of the audited hypervisor versions does resist to the currently running VMs sharing the same CPU core (known
the test. Multiple flaws have been exploited, notably buffer as the Boost priority mode [38]).
overflows or flaws at the VM driver level which enable a The authors have demonstrated in labs that a malicious
malicious VM to escape from the VM state and to take the full VM can, this way, consume up to 98% of the CPU core
control of the hypervisor. VM Escape is very critical because shared with co-localized VMs (configured with the same fair
it enables the worst cases of isolation breakout once acquired share and priority levels). They have also performed the attack
the control of the hypervisor such as, i)VM hopping in which on Amazons Elastic Compute Cloud (EC2) platform which
the attacker accesses and controls co-localized VMs or, ii) runs on the Xen virtualization platform. In this latter case, a
resource starvation in which the attacker prevents VMs from malicious VM can consume up to 85% of the idle CPU core
using their allocated resources. (which was 40% exceeding the amount of vCPU allocated
Another vector of vulnerability comes from the hardware to the VM), although VMs run in a non conservative-work
platform. The growing complexity of the hardware increases mode which in principle does not allow any use of unallocated
significantly the hypervisor attack surface. One of the first idle vCPU. On EC2 platform, the attack was unable to steal
attacks exploiting Hardware Assisted Virtualization is the the VM-allocated vCPU; this lets the authors believe that
Blue Pill Rootkit [29]. In 2006, Blue Pill have exploited the the EC2 Xen has been patched against cross-VM theft of
AMD Pacifica hardware extensions by manipulating control service attacks. In [39], authors demonstrate a theft of resource
structures in order to install a malicious hypervisor in a attack by flooding a victim VM to maximise its resource
running OS, which turns the OS to a guest state and lets the consumption, resulting in freeing resources for the benefit of
attacker taking the full control of the system. In 2008, Blue the attacking VM.
Pill has been performed against the Xen hypervisor running
on nested based hardware virtualization allowing an attacker C. Information leakage through covert channel attacks
to get the full control of the hypervisor. Once the attacking The sharing of resources between different VMs makes the
VM has such privilege, it enables it to switch the running Cloud a vulnerable target to covert channel attacks. With these
hypervisor from host state to VM state. attacks, a malicious VM can totally bypass the hypervisor
In [30], L. Duflot et al. survey and discuss about the security policy to steal information without subverting the
feasibility of many relevant hardware exploited flaws such hypervisor.
as RAM-based backdoor, human interaction device corruption According to [40], covert channels involve two or more
and several other flaws at the CPU and Chipset level. processes collaborating to communicate via a shared resource
Hypervisor subversion exploits have been demonstrated in that they can both affect and measure. There are several types
most of the virtualization softwares [31], [32], [33], [34], [35]. of covert channel attacks. The most prevalent ones are the

632
side channel attacks and the timing covert channel attacks. small data.
In side channel attacks, a process probes the use of a shared
physical resource made by processes that are not aware of this D. Performance Degradation
probing, in order to deduce some information. With timing Performance isolation is the property ensuring that one VM
covert channel attacks, two or more cooperative processes will not suffer from intensive resource consumption made by
intentionally communicate information by manipulating and a co-localized VM. While the use of the allocated CPU and
probing the timing and the sequencing of the use of a shared memory seems to be perfectly partitioned on a per VM basis,
resource, in such a way that the involved processes have an current hypervisor implementations potentially fail in ensur-
agreed understanding of the performed manipulation. ing this performance isolation property when applied to the
Regarding the side channels, an attack is demonstrated in processing of the I/O traffic. From a security perspective, this
[41]. The authors use the energy consumption footprint to lack of I/O peformance isolation raises two main problems.
determine the exact combination of VMs running in the same Firstly, a bystander VM may suffer from an external attack
host. This attack may be useful for verifying the presence of targeting a co-localized VM. Secondly, a malicious tenant can
a given target service on a host, in the aim of subverting it. exploit this flaw by running intensive I/O tasks at its own VM
For timing covert channels, the most easily exploitable level (e.g. auto network flooding), in order to lead co-localized
shared resource is the CPU. This is because modifying the VMs to experience SLO violation.
load does not require any administrator privilege and CPU For security reasons, some virtualization platforms such as
cores are often shared between multiple tenants. In [42], the Xen, contain device drivers in a privileged VM, called the
authors achieve data leak using CPU load variation on the Driver Domain. With this type of model, all virtual machines
Xen hypervisor. The attack requires to take the control of two share the same physical device driver for I/O traffic sorting
VMs running in the same host. The first VM belongs to the [46]. Therefore, this model increases the risk of interference
victim tenant, in which the attacker has to install a spyware between tenants, since the hypervisor is unable to ensure fair
responsible for reading confidential data such as credit card sharing of the driver domain CPU consumption required to
numbers. The second VM, called the attacking VM, remains process I/O traffic, among the hosted VMs.
under the control of the attacker and collaborates with the
In order to quantify the performance degradation observed
remote spyware which is in charge of performing meaningful
by one VM when exposed to co-localized intensive VMs,
manipulation of the shared physical CPU to let the attacking
Jeanna et al. [47] have performed a suite of intensive stress
VM deduce the stolen data. This attack is not viewable from
tests on various hypervisors, with several profiles of intensive
firewalls or Intrusion Detection Systems on the virtual network
VM. They have considered memory, CPU, disks and network
because the spyware does not send the stolen data on the
resources. Even if the results reported in this work are not
network (but through the covert channel). Results show that
alarming in terms of response time, the tests reveal that,
the two processes can communicate at 0.49 bps with 91%
in the Xen hypervisor, innocent VMs experiment deficient
to 100% accuracy in advantageous environments where co-
isolation of network transmission and receiving. This might be
localized VMs consume little CPU time. More recently, Adam
more critical for latency-sensitive processes. In [48], authors
et al. [43] exploit a network covert channel to detect VM co-
reported a high memory interference sensitivity for vSphere
residency.
VMware hypervisor.
The most noteworthy attack exploiting covert channels is
In [49], Barker et al. evaluate impacts of intensive VM loads
presented in [44]. In this work, T. Ristenpart et al. demonstrate
on the response time of latency-sensitive applications running
the effectiveness of a covert channel attack on the Amazon
in co-localized VMs. They demonstrate that the performance
EC2 platform, to discover VMs co-residency. The attack
of latency-sensitive tasks is impacted by the activity spikes
includes two steps. The first step consists in the placement
of colocalized tenants. Results show that network and disk
of the malicious VM in the same host as the target VM.
resources are the ones suffering the most from the lack of
This is achieved by combining external and internal network
isolation (degradation of 75% for disk-bound latency-sensitive
probing to detect evidences of VMs co-residence. The second
tasks[49]).
step consists in verifying the co-residency via hard-disk-based
Following this presentation of accepted attacks, the next
timing covert channel. The authors have also demonstrated
section considers the existence of a new generation of vulnera-
CPU caches-based covert channels for information leak pur-
bilities exploiting elasticity mechanisms presented in Section
pose, between VMs sharing the same CPU core on the Xen
II when implemented in multi-tenant environments.
platform.
In [45], the authors quantify the limits of CPU cache-based
IV. S ECURITY CONSIDERATIONS FOR ELASTICITY
cross-VM covert channel attacks similar to the one conducted
in [41], both in the laboratory and on EC2 platform, varying With the growing maturity of the Cloud, conventional
the hardware characteristics, the running VM workload load attacks such as hypervisor subversion will be more and more
and the hypervisor configuration. They observed that even if challenging. The attackers in the near future may try to look
they succeed in achieving a better bit rate than the one reported for new attack strategies which could enable them to disturb
in [44], the information that may be stolen remains limited to Cloud platforms more easily.

633
Dynamically tailoring the assigned resources to the needs propagation to the VM replica, of the attack already running
of the hosted VMs is the major attractive feature of Cloud. in the origin VM.
However, we consider that elasticity may be a source of vul- As presented for some of the above vulnerabilities, one
nerabilities threatening strong isolation if this new paradigm malicious VM behavior can affect the performances of co-
is not well controlled. Mechanisms in charge of automatically localized VMs, threatening the Cloud platforms stability. If
adjusting resource provisioning to elastic resource demands the VM to be replicated presents such a malicious behavior,
are by nature sensitive to VMs resource consumption which the consequence of this attack may be the propagation of
can be easily manipulated by attacks. the performance degradation across several servers. Thus,
we believe that this type of scaling systems may enable
A. Unintended VM migration attackers to increase the effects of their attack since an attacker
Live migration enables virtualization platforms to ensure deliberately claiming more resources will gain the control of
high flexibility and availability by migrating VMs from an several VMs across the Cloud Infrastructure.
over-loaded host to another host having enough resources. In [53], authors have demonstrated an effective propagation
Migration may also be triggered for other reasons such as cross of an anomaly (bug, attack, SLO violation) across physical
server load balancing, energy management and maintenance. machines running distributed applications in the Cloud. To
The migration mechanism is however not costless. Migrat- the best of our knowledge, there is no work demonstrating
ing a VM consists in transferring its memory pages and CPU propagation of attack effects to the VMs co-localized with the
state from a source to a destination host. This operation is VM replica, in case of attack-driven VM replication.
intensive and leads the migrated VM to observe a down time
and some performance deterioration. According to [50], the C. Economic Denial of Service
migrated VM may experience a down time ranging from 60 ms Predictable systems are one of the most promising ap-
to 3 seconds depending on the hosted applications behavior, proaches enabling autonomic resource cap readjustment. These
and a slow down by up to 20% during the whole migration methods rely on the learning of VMs behavior in order to
time for an ordinary web server. Several parameters may build their corresponding workload pattern. To be congruent
worsen these results. Migration cost depends on network link to the Cloud model, these systems must take into account the
bandwidth, page dirty rate, pre- and post-migration overheads dynamic variations in workload requests, by regularly updating
[51] and available amount of resources on the source and predicted values.
destination hosts [52]. These systems may be particularly vulnerable to resource
Two observations worth attention. Firstly, when resource starvation attacks, such as flooding attacks or malicious pro-
contention occurs, the migrated VM is not necessarily the one cesses deliberately claiming more resources. This is because
that requested additional resources. Hence, a bystander VM the Cloud resource manager will readjust the cap and provide
may be migrated and consequently unfairly observe a down more resources in order to cope with the workload need, while
time. Secondly, the consumption of the migration process may being unaware that the source of resource demand is under the
impact the performances of the other colocalized VMs (not control of an attacker.
migrating) during the whole migration period, in case of severe The first issue raised by this attack relates to the billing.
resource contention. A customer may object to pay for resources consumed by an
Thus, an attacker deliberately fluctuating the resource con- attack. Other possible side effects are migration of innocent
sumption of its own VM may trigger abusively unintended VMs or performance deterioration and SLO violation of co-
migrations in the aim of, i) threatening the availability of the localized VMs.
migrated VM, ii) causing performance deterioration for the co- The following section engages a discussion in order to high-
localized VMs, iii) wasting resources because of the intensive light our understanding of the Cloud security distinctiveness
activity performed by the source and destination hypervisors regarding the vulnerabilities presented so far.
during the whole migration time.
Depending on the number of migrations triggered by the at- V. D ISCUSSION
tacker, this vulnerability may have more or less consequences In this paper, we have described some hypervisor vulner-
on the Cloud infrastructure stability. abilities implementation or design vulnerabilities of the
resource sharing mechanisms, that might be exploited in the
B. Attack Propagation context of multi-tenancy.
Scaling-out mechanisms tend to increase the number of In table 1, we propose a representation in two dimensions
distributed applications running within the Cloud. With these of the previously presented attacks which exploit these vulner-
systems, when a running VM claims additional resources, the abilities. The rows represent the results of the attacks, such as
Cloud resource manager will replicate this VM and instantiate categorized in the paper among the various sub-sections. The
the VM replica in another host. These two VMs belong to the columns represent the entity which the attacker manipulates
same tenant and continue to run the same kind of applications. to perform the attack. That may be the attackers own VM
From a security perspective, if the origin VM is under (My VM), an attacked VM or the hypervisor. Labels indicate
the control of an attacker, this replication may result in the the bibliography references of the attacks. No label indicates

634
TABLE I
G ROUPING OF THE MAIN ATTACKS ACCORDING TO THE MANIPULATED ENTITY

that no proof of concepts has as yet been reported; such plots resource sharing and multi-tenancy vulnerabilities. We also
refer to attacks that could exploit the vulnerabilities regarding introduced some new attack strategies brought by elastic
elasticity that we discussed in Section 4. resource management mecanisms.
The attacks are plotted using different symbols to show the The analysis provided in this paper makes us consider
kind of disturb observed by the victim VM. That may be that conventional security approaches may not be sufficient
information theft, resource theft, availability degradation or to ensure an efficient protection of Cloud-hosted VMs, since
attack-driven billing. these approaches do not fully take into account the shared
This table highlights two main observations specific to nature of virtualized Cloud platforms. We believe that Cloud
Cloud on virtualized platforms: infrastructures require security mechanisms which take into
The third column of this table confirms that the hypervisor consideration an enlarged set of security attributes covering
is the cornerstone of the security of entire cloud stack, i) VMs local execution context, for example with location
since attacks running against the hypervisor exploiting attributes, and ii) Cloud-level global execution context, for ex-
implementation hypervisor vulnerabilities let the victim ample with numbers of observed migrations within the Cloud.
VM suffer from the four previously defined types of Such means could improve VMs security and Cloud platforms
disturb, stability in the aim of increasing Cloud dependability.
The first column shows attacks which manipulate only Security Information and Event Management (SIEM) solu-
the attackers VM resources to disturb co-localized VMs tions could be adapted to fulfill the need for cross-layer and
these latter ones being the victim VMs by exploiting cross-VMs correlation.
hypervisor design vulnerabilities. This kind of attacks To argue the relevance of the questions that we raise in
runs within the attackers VM space, where the attacker this paper regarding resource management security in Cloud,
has obviously no VM-attached security means to bypass, we are currently developing practical proofs of concepts on
and out of the victim VM space, where the VM-attached possible hypervisor design vulnerabilities derived from the
security means is unable to protect the victim VM be- elasticity feature.
cause its resources are not directly manipulated.
R EFERENCES
These observations let us consider that VMs may be not
properly protected with pure user-centric security monitoring [1] Timothy Grance Peter Mell. The nist definition of cloud computing.
recommendations of the national institute of standards and technology,
models, due to the fact that such models fail to take into September 2011.
account the out-of-VM execution context. Moreover, we as- [2] CSA. Security guidance for critical areas of focus in cloud computing
sume that there is a need for the hypervisor to ensure some of arrow to content, 2009.
[3] Luis M. Vaquero, Luis Rodero-Merino, Juan Caceres, and Maik Lindner.
the required VM security, enlarging hypervisor self-protection A break in the clouds: towards a cloud definition. volume 39, pages 50
to hypervisor-delivered protection of the VMs (against the 55, New York, NY, USA, December 2008. ACM.
exploitation of the hypervisor design vulnerabilities). [4] Dustin Owens. Securing elasticity in the cloud. Queue, 8(5):10:10
10:16, May 2010.
VI. C ONCLUSION [5] Vyas Sekar and Petros Maniatis. Verifiable resource accounting for
cloud computing services. In Proceedings of the 3rd ACM workshop
In this paper we have presented an analysis of the state of on Cloud computing security workshop, CCSW 11, pages 2126, New
the art related to security of IaaS Cloud platforms, regarding York, NY, USA, 2011. ACM.

635
[6] R. P. Goldberg. Architecture of virtual machines. In Proceedings of the pages 349366. Springer Berlin Heidelber, pages 10.1007/9783642
workshop on virtual computer systems, pages 74112, New York, NY, 14452316., 2010.
USA, 1973. ACM. [31] Nelson Elhage. Virtunoid: A kvm guest ! host privilege escalation
[7] M. Rosenblum and T. Garfinkel. Virtual machine monitors: current exploit. In Black Hat USA, 2011.
technology and future trends. Computer, 38(5):3947, 2005. [32] Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski,
[8] Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Helen J. Wang, and Jacob R. Lorch. Subvirt: Implementing malware
Alex Ho, Rolf Neugebauer, Ian Pratt, and Andrew Warfield. Xen and the with virtual machines. In Proceedings of the 2006 IEEE Symposium on
art of virtualization. In Proceedings of the nineteenth ACM symposium Security and Privacy, SP 06, pages 314327, Washington, DC, USA,
on Operating systems principles, SOSP 03, pages 164177, New York, 2006. IEEE Computer Society.
NY, USA, 2003. ACM. [33] Kostya Kortchinsky. Cloudburst: A vmware guest to host escape story.
[9] Ole Agesen, Alex Garthwaite, Jeffrey Sheldon, and Pratap Subrah- In Black Hat USA, 2009.
manyam. The evolution of an x86 virtual machine monitor. SIGOPS [34] Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus
Oper. Syst. Rev., 44(4):318, December 2010. Huber, and Edgar Weippl. Dark clouds on the horizon: using cloud
[10] Carl A. Waldspurger. Memory resource management in vmware esx storage as attack vector and online slack space. In Proceedings of the
server. volume 36, pages 181194, New York, NY, USA, December 20th USENIX conference on Security, SEC11, pages 55, Berkeley, CA,
2002. ACM. USA, 2011. USENIX Association.
[11] Tal Garfinkel and Mendel Rosenblum. When virtual is harder than real: [35] Aad Moorsel Francisco Rocha, Thomas Gross. Defense-in-depth against
security challenges in virtual machine based computing environments. malicious insiders in the cloud. SOSE13, San Francisco, 2013.
In Proceedings of the 10th conference on Hot Topics in Operating [36] Fangfei Zhou, M. Goel, P. Desnoyers, and R. Sundaram. Scheduler
Systems - Volume 10, HOTOS05, pages 2020, Berkeley, CA, USA, vulnerabilities and coordinated attacks in cloud computing. In Network
2005. USENIX Association. Computing and Applications (NCA), 2011 10th IEEE International
[12] Mendel Rosenblum and Carl Waldspurger. I/o virtualization. Queue, Symposium on, pages 123 130, aug. 2011.
9(11):30:3030:39, November 2011. [37] Ludmila Cherkasova, Diwaker Gupta, and Amin Vahdat. Comparison
[13] J.E. Smith and R. Nair. The architecture of virtual machines. Computer, of the three cpu schedulers in xen. SIGMETRICS Perform. Eval. Rev.,
38(5):3238, 2005. 35(2):4251, September 2007.
[14] Intel. Pci-sig single root i/o virtualization (sr-iov) support in intel [38] Seehwan Yoo, Kuen-Hwan Kwak, Jae-Hyun Jo, and Chuck Yoo. Toward
virtualization technology for connectivity. Technical report. under-millisecond i/o latency in xen-arm. In Proceedings of the Second
[15] Intel. Virtual machine device queues. an integral part of intel vir- Asia-Pacific Workshop on Systems, APSys 11, pages 14:114:5, New
tualizationtechnology for connectivity that delivers enhanced network York, NY, USA, 2011. ACM.
performance. Technical report. [39] Venkatanathan Varadarajan, Thawan Kooburat, Benjamin Farley,
[16] Timothy Wood, Prashant Shenoy, Arun Venkataramani, and Mazin Thomas Ristenpart, and Michael M. Swift. Resource-freeing attacks:
Yousif. Black-box and gray-box strategies for virtual machine migration. improve your cloud performance (at your neighbors expense). In Pro-
In Proceedings of the 4th USENIX conference on Networked systems ceedings of the 2012 ACM conference on Computer and communications
design & implementation, NSDI07, pages 1717, Berkeley, CA, security, CCS 12, pages 281292, New York, NY, USA, 2012. ACM.
USA, 2007. USENIX Association. [40] Nate Lawson. Side-channel attacks on cryptographic software. IEEE
[17] B. Rochwerger, D. Breitgand, A. Epstein, D. Hadas, I. Loy, K. Nagin, Security & Privacy, 7(6):6568, 2009.
J. Tordsson, C. Ragusa, M. Villari, S. Clayman, E. Levy, A. Maraschini, [41] Helmut Hlavacs, Thomas Treutner, Jean-Patrick Gelas, Laurent Lefevre,
P. Massonet, H. Muoz, and G. Tofetti. Reservoir - when one cloud is and Anne-Cecile Orgerie. Energy consumption side-channel attack
not enough. Computer, 44(3):4451, 2011. at virtual machines in a cloud. In Proceedings of the 2011 IEEE
Ninth International Conference on Dependable, Autonomic and Secure
[18] http://aws.amazon.com/fr/autoscaling/.
Computing, DASC 11, pages 605612, Washington, DC, USA, 2011.
[19] Zhiming Shen, Sethuraman Subbiah, Xiaohui Gu, and John Wilkes.
IEEE Computer Society.
Cloudscale: elastic resource scaling for multi-tenant cloud systems. In
[42] Keisuke Okamura and Yoshihiro Oyama. Load-based covert channels
Proceedings of the 2nd ACM Symposium on Cloud Computing, SOCC
between xen virtual machines. In Proceedings of the 2010 ACM
11, pages 5:15:14, New York, NY, USA, 2011. ACM.
Symposium on Applied Computing, SAC 10, pages 173180, New York,
[20] Luis M. Vaquero, Luis Rodero-Merino, and Rajkumar Buyya. Dynam- NY, USA, 2010. ACM.
ically scaling applications in the cloud. SIGCOMM Comput. Commun.
[43] Adam Bates, Benjamin Mood, Joe Pletcher, Hannah Pruse, Masoud
Rev., 41(1):4552, January 2011.
Valafar, and Kevin Butler. Detecting co-residency with active traffic
[21] Peter M. Chen and Brian D. Noble. When virtual is better than real. analysis techniques. In Proceedings of the 2012 ACM Workshop on
In Proceedings of the Eighth Workshop on Hot Topics in Operating Cloud computing security workshop, CCSW 12, pages 112, New York,
Systems, HOTOS 01, pages 133, Washington, DC, USA, 2001. IEEE NY, USA, 2012. ACM.
Computer Society. [44] Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage.
[22] Mendel Rosenblum. The reincarnation of virtual machines. Queue, Hey, you, get off of my cloud: exploring information leakage in third-
2(5):3440, July 2004. party compute clouds. In Proceedings of the 16th ACM conference on
[23] Shudong Zhou. Virtual networking. SIGOPS Oper. Syst. Rev., 44(4):80 Computer and communications security, CCS 09, pages 199212, New
85, December 2010. York, NY, USA, 2009. ACM.
[24] Yanpei Chen, Vern Paxson, and Randy H. Katz. Whats new about [45] Yunjing Xu, Michael Bailey, Farnam Jahanian, Kaustubh Joshi, Matti
cloud computing security? Technical Report UCB/EECS-2010-5, EECS Hiltunen, and Richard Schlichting. An exploration of l2 cache covert
Department, University of California, Berkeley, Jan 2010. channels in virtualized environments. In Proceedings of the 3rd ACM
[25] http://web.nvd.nist.gov/view/vuln/search. workshop on Cloud computing security workshop, CCSW 11, pages
[26] Travis Ormandy. An Empirical Study into the Security Exposure to 2940, New York, NY, USA, 2011. ACM.
Hosts of Hostile Virtualized Environments. [46] Diwaker Gupta, Ludmila Cherkasova, Rob Gardner, and Amin Vahdat.
[27] Jeremy Sugerman, Ganesh Venkitachalam, and Beng-Hong Lim. Vir- Enforcing performance isolation across virtual machines in xen. In
tualizing i/o devices on vmware workstations hosted virtual machine Proceedings of the ACM/IFIP/USENIX 2006 International Conference
monitor. In Proceedings of the General Track: 2002 USENIX Annual on Middleware, Middleware 06, pages 342362, New York, NY, USA,
Technical Conference, pages 114, Berkeley, CA, USA, 2001. USENIX 2006. Springer-Verlag New York, Inc.
Association. [47] Jeanna Neefe Matthews, Wenjin Hu, Madhujith Hapuarachchi, Todd
[28] http://wiki.qemu.org. Deshane, Demetrios Dimatos, Gary Hamilton, Michael McCabe, and
[29] Joanna Rutkowska and Alexander Tereshkin. Bluepilling the xen James Owens. Quantifying the performance isolation properties of
hypervisor. Black Hat. USA, 2008. virtualization systems. In Proceedings of the 2007 workshop on
[30] Olivier Levillain Loic Duflot, Olivier Grumelard and Benjamin Morin. Experimental computer science, ExpCS 07, New York, NY, USA, 2007.
On the limits of hypervisor- and virtual machine monitor-based isola- ACM.
tion. In Ahmad-Reza Sadeghi and David Naccache, editors, Towards [48] Jinho Hwang, Sai Zeng, Frederick Wu, and Timothy Wood. A Compo-
Hardware-Intrinsic Security, Information Security and Cryptography, nent Based Performance Comparison of Four Hypervisors. In to appear

636
in IFIP/IEEE Integrated Network Management Symposium (IM 2013), the performance of virtual machine migration. In Modeling, Analysis
May 2013. Simulation of Computer and Telecommunication Systems (MASCOTS),
[49] Sean Kenneth Barker and Prashant Shenoy. Empirical evaluation of 2010 IEEE International Symposium on, pages 37 46, aug. 2010.
latency-sensitive application performance in the cloud. In Proceedings [52] Yangyang Wu and Ming Zhao. Performance modeling of virtual machine
of the first annual ACM SIGMM conference on Multimedia systems, live migration. In IEEE CLOUD11, pages 492499, 2011.
MMSys 10, pages 3546, New York, NY, USA, 2010. ACM. [53] Hiep Nguyen, Yongmin Tan, and Xiaohui Gu. Pal: Propagation-aware
[50] William Voorsluys, James Broberg, Srikumar Venugopal, and Rajkumar anomaly localization for cloud hosted distributed applications. In
Buyya. Cost of virtual machine live migration in clouds: A performance Managing Large-scale Systems via the Analysis of System Logs and
evaluation. In Proceedings of the 1st International Conference on Cloud the Application of Machine Learning Techniques, SLAML 11, pages
Computing, CloudCom 09, pages 254265, Berlin, Heidelberg, 2009. 1:11:8, New York, NY, USA, 2011. ACM.
Springer-Verlag.
[51] S. Akoush, R. Sohan, A. Rice, A.W. Moore, and A. Hopper. Predicting

637

Anda mungkin juga menyukai