I Heard It through the Firewall: Exploiting Cloud Management Services as an Information Leakage Channel
Hyunwook Baek, Eric Eide, Robert Ricci, Jacobus Van der Merwe
University of Utah
1
I Heard It through the Firewall: Exploiting Cloud Management - - PowerPoint PPT Presentation
I Heard It through the Firewall: Exploiting Cloud Management Services as an Information Leakage Channel Hyunwook Baek , Eric Eide, Robert Ricci, Jacobus Van der Merwe University of Utah 1 Motivation Information leakage in cloud has
1
2
3
4
5
6
def rpc_loop(self): while True: start = now() # update OVS changes # update Iptables changes # update conntrack changes elapsed = now() – start # job_done if elapsed < polling_interval: sleep(polling_interval – elapsed)
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
rpc_loop() rpc_loop() rpc_loop() iptables_restore iptables_restore iptables_restore Epoch elapsed elapsed Epoch Total Total Sleep Before After After Before
25
26
27
28
29
30
srcMAC: Router-MAC dstMAC: VM-MAC srcIP: VM-IP dstIP: VM-IP srcMAC: VM-MAC dstMAC: Router-MAC srcIP: VM-IP dstIP: VM-IP
31
32
0 1 1 0 1 0 0 0
0 1 1 0 0 1 0 1
0 1 1 0 1 1 0 0
0 1 1 0 1 1 0 0
0 1 1 0 1 1 1 1
33
34
0 1 1 0 1 0 0 0
0 1 1 0 0 1 0 1
0 1 1 0 1 1 0 0
0 1 1 0 1 1 0 0
0 1 1 0 1 1 1 1
35
36
C T C T
C T C T
C T C T
C T C T
37
38
39
40
41
42
43
44
45
46
47
48
49