nomad mitigating arbitrary
play

Nomad : Mitigating Arbitrary Cloud Side Channels via - PowerPoint PPT Presentation

Nomad : Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration Soo-Jin Moon, Vyas Sekar Michael K. Reiter Co-residency side-channel attacks in clouds Stealing secrets (e.g., keys) VM VM VM Machine Machine Many


  1. Nomad : Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration Soo-Jin Moon, Vyas Sekar Michael K. Reiter

  2. Co-residency side-channel attacks in clouds Stealing secrets (e.g., keys) VM VM VM Machine Machine • Many different vectors (e.g., L2/L3 cache, storage, main memory) Demonstrated side-channel attacks are not limited to: Y. Zhang et al., CCS2012; T. Ristenpart et al., CCS2009; F. Liu et al., Oakland 2015

  3. Limitations of Current Defenses 1. Requires significant/detailed upgrades OS OS e.g., Noise injection Hypervisor e.g., Deterministic execution Hardware e.g., New cache design 2. Attack-specific Proposed defense includes but not limited to: Y. Zhang et al., CCS2013; T. Kim et al., USENIXSec 2012; F. Liu and R. Lee, Micro 2014

  4. Limitations of Current Defenses 1. Requires significant/detailed upgrades OS OS e.g., Noise injection Hypervisor e.g., Deterministic execution Hardware e.g., New cache design 2. Attack-specific What about future side-channel attacks? Proposed defense includes but not limited to: Y. Zhang et al., CCS2013; T. Kim et al., USENIXSec 2012; F. Liu and R. Lee, Micro 2014

  5. Ideal Properties 1) General 2) Immediately deployable

  6. Ideal Properties 1) General 2) Immediately deployable Single-tenancy?

  7. Ideal Properties 1) General 2) Immediately deployable Single-tenancy?

  8. Nomad Ideas 1) General 2) Immediately deployable

  9. Nomad Ideas 1) General Tackle root-cause → Minimize co -residency 2) Immediately deployable

  10. Nomad Ideas 1) General Tackle root-cause → Minimize co -residency 2) Immediately deployable Migration

  11. Nomad Vision: Migration-as-a-Service • Provider-assisted Cloud Controller VM VM VM VM Machine Machine Machine

  12. Nomad Vision: Migration-as-a-Service • Provider-assisted Cloud Controller Move VMs {…} VM VM VM VM Machine Machine Machine

  13. Nomad Vision: Migration-as-a-Service • Opt-in Service Service offering Cloud Clients Provider Opt-in? • Provider-assisted Cloud Controller Move VMs {…} VM VM VM VM Machine Machine Machine

  14. Nomad Practical Challenges Logic Characterize information leakage due to co-residency Cloud Controller VM VM VM VM Machine Machine Machine

  15. Nomad Practical Challenges Scalable Design Logic e.g., can Amazon EC2 run this? Characterize information leakage due to co-residency Cloud Controller VM VM VM VM Machine Machine Machine

  16. Nomad Practical Challenges Scalable Design Logic e.g., can Amazon EC2 run this? Characterize information leakage due to co-residency Practical Impact (cloud) Minimal modifications? Cloud Controller VM VM VM VM Machine Machine Machine

  17. Nomad Practical Challenges Scalable Design Logic e.g., can Amazon EC2 run this? Characterize information leakage due to co-residency Practical Impact (cloud) Minimal modifications? Cloud Controller VM VM VM VM Machine Machine Machine Practical Impact (applications) 1) Advancement of VM migration techniques 2) Many cloud workloads with in-built resilience to migration

  18. Our Work 1. Idea General side-channel defense via migration

  19. Our Work 1. Idea 2. Logic Characterize information General side-channel leakage due to co-residency defense via migration

  20. Our Work 1. Idea 2. Logic Characterize information General side-channel leakage due to co-residency defense via migration 3. Scalable Design Scalable VM migration strategy that can handle large cloud deployments

  21. Our Work 1. Idea 2. Logic Characterize information General side-channel leakage due to co-residency defense via migration 3. Scalable Design Scalable VM migration strategy that can handle large cloud deployments 4. Practical Impact Practical OpenStack implementation with minimal modifications

  22. Our Work 1. Idea 2. Logic Characterize information General side-channel leakage due to co-residency defense via migration 3. Scalable Design Scalable VM migration strategy that can handle large cloud deployments 4. Practical Impact Practical OpenStack implementation with minimal modifications

  23. Threat Model Objective: Extract secrets via co-residency • Can use any kind of resource • Can launch/terminate VMs at will • VMs of a given client can collaborate

  24. Threat Model Objective: Extract secrets via co-residency • Can use any kind of resource • Can launch/terminate VMs at will • VMs of a given client can collaborate • Cannot control VM placement • No info. sharing across distinct clients

  25. Threat Model Objective: Extract secrets via co-residency • Can use any kind of resource • Can launch/terminate VMs at will • VMs of a given client can collaborate • Cannot control VM placement • No info. sharing across distinct clients ? • Don’t know which other clients are malicious Provider

  26. Information Leakage (InfoLeak) Model InfoLeak ? Clients

  27. Information Leakage (InfoLeak) Model InfoLeak ? Clients Replicated? (R or NR) R B2 B1 VM-level view

  28. Information Leakage (InfoLeak) Model InfoLeak ? Clients Replicated? (R or NR) R B2 B1 VM-level view NR B1 B2

  29. Information Leakage (InfoLeak) Model InfoLeak ? Clients Replicated? (R or NR) Collaborating? (C or NC) C R R1 R2 B2 B1 VM-level view NR B1 B2

  30. Information Leakage (InfoLeak) Model InfoLeak ? Clients Replicated? (R or NR) Collaborating? (C or NC) C R R1 R2 B2 B1 VM-level view NR NC R2 R1 B1 B2

  31. Information Leakage ( InfoLeak ) Model Replicated? NR R <NR,NC> <R,NC> NC Least InfoLeak Collaborating? Most InfoLeak C <NR,C> <R,C>

  32. Our Work 1. Idea 2. Logic Characterize information General side-channel leakage due to co-residency defense via migration 3. Scalable Design Scalable VM migration strategy that can handle large cloud deployments 4. Practical Impact Practical OpenStack implementation with minimal modifications

  33. System Overview Cloud Controller Move VMs {…} VM VM VM VM Machine Machine Machine

  34. System Overview Deployment model (e.g., <NR,NC>) Cloud Clients Provider Opt-in? Cloud Controller Move VMs {…} VM VM VM VM Machine Machine Machine

  35. Operational Timeline 1 epoch = D time units Time (epoch) Sliding Window of ∆ epochs Run placement algorithm every epoch

  36. Operational Timeline 1 epoch = D time units Time (epoch) Sliding Window of ∆ epochs Run placement algorithm every epoch Side-channel Parameters: • K: Information leakage rate (i.e., bits per time unit) • P: secret length (i.e., bits)

  37. Operational Timeline 1 epoch = D time units Time (epoch) Sliding Window of ∆ epochs Run placement algorithm every epoch Extracted secret (bits) if two VMs are co-resident for ∆ epochs Provider chooses D and ∆ to AT LEAST satisfy: D * ∆ * K < P

  38. Placement Algorithm Deployment Client Model Recent VM Workloads & (e.g.,<NR,NC>) Placements Constraints Placement Algorithm VM Placement

  39. Placement Algorithm Deployment Client Model Recent VM Workloads & (e.g.,<NR,NC>) Placements Constraints Goal (per epoch): Minimize a global sum of a client- pair InfoLeak across past ∆ epochs Placement i.e., 𝐽𝑜𝑔𝑝𝑀𝑓𝑏𝑙 𝑑 →𝑑 ′ ([𝑢 − ∆, 𝑢]) Algorithm 𝑑,𝑑′ subject to a fixed migration budget VM Placement

  40. Placement Algorithm Deployment Client F (Deployment Model) Model Recent VM Workloads & (e.g.,<NR,NC>) Placements Constraints Goal (per epoch): Minimize a global sum of a client- pair InfoLeak across past ∆ epochs Placement i.e., 𝐽𝑜𝑔𝑝𝑀𝑓𝑏𝑙 𝑑 →𝑑 ′ ([𝑢 − ∆, 𝑢]) Algorithm 𝑑,𝑑′ subject to a fixed migration budget VM Placement

  41. Placement Algorithm Deployment Client F (Deployment Model) Model Recent VM Workloads & (e.g.,<NR,NC>) Placements Constraints Goal (per epoch): Minimize a global sum of a client- pair InfoLeak across past ∆ epochs Placement i.e., 𝐽𝑜𝑔𝑝𝑀𝑓𝑏𝑙 𝑑 →𝑑 ′ ([𝑢 − ∆, 𝑢]) Algorithm 𝑑,𝑑′ subject to a fixed migration budget VM Placement F (Network Capacity)

  42. Challenge: Scalability Inputs Should handle tens of thousands of servers Placement Algorithm VM Placement

  43. Challenge: Scalability Inputs Should handle tens of thousands of servers • ILP (Integer Linear Programming) Placement Algorithm For 40 machines, D > 1 day VM Placement

  44. Challenge: Scalability Inputs Should handle tens of thousands of servers • ILP (Integer Linear Programming) Placement Algorithm For 40 machines, D > 1 day VM Placement

  45. Challenge: Scalability Inputs Should handle tens of thousands of servers • ILP (Integer Linear Programming) Placement Algorithm For 40 machines, D > 1 day • Basic Greedy For 400 machines, D > 1 day VM Placement

  46. Challenge: Scalability Inputs Should handle tens of thousands of servers • ILP (Integer Linear Programming) Placement Algorithm For 40 machines, D > 1 day • Basic Greedy For 400 machines, D > 1 day VM Placement

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend