Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage
Kevin Leach1, Fengwei Zhang2, and Westley Weimer1
1University of Michigan, 2Wayne State University Leach, Zhang, & Weimer 1 / 19
Scotch: Combining Software Guard Extensions and System Management - - PowerPoint PPT Presentation
Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage Kevin Leach 1 , Fengwei Zhang 2 , and Westley Weimer 1 1 University of Michigan, 2 Wayne State University Leach, Zhang, & Weimer 1 / 19
1University of Michigan, 2Wayne State University Leach, Zhang, & Weimer 1 / 19
Leach, Zhang, & Weimer 2 / 19
◮ e.g., $1 per hour of CPU time Leach, Zhang, & Weimer 3 / 19
◮ e.g., $1 per hour of CPU time
◮ Xen, QEMU, etc.
Leach, Zhang, & Weimer 3 / 19
◮ e.g., $1 per hour of CPU time
◮ Xen, QEMU, etc.
Leach, Zhang, & Weimer 3 / 19
Leach, Zhang, & Weimer 4 / 19
Leach, Zhang, & Weimer 4 / 19
◮ Manipulate resource consumption to bill customers more Leach, Zhang, & Weimer 4 / 19
◮ Manipulate resource consumption to bill customers more
◮ Malicious VM manipulates resource consumption to steal resources
Leach, Zhang, & Weimer 4 / 19
Leach, Zhang, & Weimer 5 / 19
Leach, Zhang, & Weimer 6 / 19
Leach, Zhang, & Weimer 7 / 19
Leach, Zhang, & Weimer 8 / 19
◮ The underlying VMM and VMs are not aware accounting occurs
◮ A malicious VMM or VM guest cannot reliably alter accounting data Leach, Zhang, & Weimer 9 / 19
Leach, Zhang, & Weimer 10 / 19
Leach, Zhang, & Weimer 10 / 19
Leach, Zhang, & Weimer 10 / 19
Leach, Zhang, & Weimer 11 / 19
Leach, Zhang, & Weimer 11 / 19
Leach, Zhang, & Weimer 11 / 19
SGX Enclave
1 2 3 4 5
Leach, Zhang, & Weimer 12 / 19
SGX Enclave
1 2 3 4 5
Leach, Zhang, & Weimer 12 / 19
SGX Enclave
1 2 3 4 5
Leach, Zhang, & Weimer 12 / 19
SGX Enclave
1 2 3 4 5
Leach, Zhang, & Weimer 12 / 19
SGX Enclave
1 2 3 4 5
Leach, Zhang, & Weimer 12 / 19
Leach, Zhang, & Weimer 13 / 19
◮ Simulate attacker by altering the CPU time allocation by a varying
Leach, Zhang, & Weimer 14 / 19
◮ Simulate attacker by altering the CPU time allocation by a varying
◮ Both are computing indicative workloads: pi, gzip, and the PARSEC
Leach, Zhang, & Weimer 14 / 19
◮ Simulate attacker by altering the CPU time allocation by a varying
◮ Both are computing indicative workloads: pi, gzip, and the PARSEC
Leach, Zhang, & Weimer 14 / 19
◮ Simulate attacker by altering the CPU time allocation by a varying
◮ Both are computing indicative workloads: pi, gzip, and the PARSEC
Leach, Zhang, & Weimer 14 / 19
Leach, Zhang, & Weimer 15 / 19
Leach, Zhang, & Weimer 15 / 19
Leach, Zhang, & Weimer 16 / 19
◮ Roughly 1µs incurred every context switch Leach, Zhang, & Weimer 16 / 19
◮ Roughly 1µs incurred every context switch
Leach, Zhang, & Weimer 16 / 19
◮ Roughly 1µs incurred every context switch
Leach, Zhang, & Weimer 16 / 19
◮ Roughly 1µs incurred every context switch
Leach, Zhang, & Weimer 16 / 19
Leach, Zhang, & Weimer 17 / 19
Leach, Zhang, & Weimer 17 / 19
◮ Client can monitor their resource usage and perform their own analysis
Leach, Zhang, & Weimer 17 / 19
Leach, Zhang, & Weimer 18 / 19
Leach, Zhang, & Weimer 18 / 19
Leach, Zhang, & Weimer 18 / 19
Leach, Zhang, & Weimer 19 / 19
Leach, Zhang, & Weimer 19 / 19
◮ Porting drivers to SMM would readily admit incorporating accounting
Leach, Zhang, & Weimer 19 / 19
◮ Porting drivers to SMM would readily admit incorporating accounting
Leach, Zhang, & Weimer 19 / 19