• DocumentCode
    628204
  • Title

    Mitigating access-driven timing channels in clouds using StopWatch

  • Author

    Peng Li ; Debin Gao ; Reiter, Michael K.

  • Author_Institution
    Dept. of Comput. Sci., Univ. of North Carolina, Greensboro, NC, USA
  • fYear
    2013
  • fDate
    24-27 June 2013
  • Firstpage
    1
  • Lastpage
    12
  • Abstract
    This paper presents StopWatch , a system that defends against timing-based side-channel attacks that arise from coresidency of victims and attackers in infrastructure-as-a-service clouds. StopWatch triplicates each cloud-resident guest virtual machine (VM) and places replicas so that the three replicas of a guest VM are coresident with nonoverlapping sets of (replicas of) other VMs. StopWatch uses the timing of I/O events at a VM´s replicas collectively to determine the timings observed by each one or by an external observer, so that observable timing behaviors are similarly likely in the absence of any other individual, coresident VM. We detail the design and implementation of StopWatch in Xen, evaluate the factors that influence its performance, and address the problem of placing VM replicas in a cloud under the constraints of StopWatch so as to still enable adequate cloud utilization.
  • Keywords
    cloud computing; operating systems (computers); security of data; virtual machines; StopWatch clouds; VM; external observer; infrastructure-as-a-service clouds; mitigating access driven timing channels; timing based side channel attacks; virtual machine; Clocks; Hardware; Radiation detectors; Real-time systems; Synchronization; Virtual machine monitors;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Dependable Systems and Networks (DSN), 2013 43rd Annual IEEE/IFIP International Conference on
  • Conference_Location
    Budapest
  • ISSN
    1530-0889
  • Print_ISBN
    978-1-4673-6471-3
  • Type

    conf

  • DOI
    10.1109/DSN.2013.6575299
  • Filename
    6575299