Deterministically Deterring Timing Attacks in Deterland
نویسندگان
چکیده
The massive parallelism and resource sharing embodying today’s cloud business model not only exacerbate the security challenge of timing channels, but also undermine the viability of defenses based on resource partitioning. This paper proposes hypervisor-enforced timing mitigation to control timing channels in cloud environments. This approach closes “reference clocks” internal to the cloud by imposing a deterministic view of time on guest code, and uses timing mitigators to pace I/O and rate-limit potential information leakage to external observers. Our prototype hypervisor implementation is the first system that can mitigate timing-channel leakage across full-scale existing operating systems such as Linux and applications written in arbitrary languages. Mitigation incurs a varying performance cost, depending on workload and tunable leakage-limiting parameters, but this cost may be justified for security-critical cloud applications and data.
منابع مشابه
Improving Tor security against timing and traffic analysis attacks with fair randomization
The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...
متن کاملDeterrence of Cyber Attacks and U.S. National Security
This paper draws on deterrence theory to analyze the challenges that the United States faces in deterring cyber attacks. We begin by briefly reviewing the basic logic of deterrence theory and relating it to the challenge posed by cyber attacks. The following section explores what is commonly viewed as the key problem in deterring cyber attacks—the “attribution problem” arises when a state canno...
متن کاملPowerAlert: An Integrity Checker using Power Measurement
We propose POWERALERT, an efficient external integrity checker for untrusted hosts. Current attestation systems suffer from shortcomings in requiring complete checksum of the code segment, being static, use of timing information sourced from the untrusted machine, or use of timing information with high error (network round trip time). We address those shortcomings by (1) using power measurement...
متن کاملThe channel coding theorem and the security of binary randomization
We propose that the randomization protocol for privacy protection be viewed as a communication channel, with lower channel capacity implying greater privacy. Focusing on binary symmetric randomization, and attacks consisting of the querying of deterministically related attributes, we show that a one-to-one correspondence exists between (i) the patterns of all attacks of “rate” r nd (ii) inverti...
متن کاملA Survey on Deep Packet Inspection for Intrusion Detection Systems
Deep packet inspection is widely recognized as a powerful way which is used for intrusion detection systems for inspecting, deterring and deflecting malicious attacks over the network. Fundamentally, almost intrusion detection systems have the ability to search through packets and identify contents that match with known attacks. In this paper, we survey the deep packet inspection implementation...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015