Swiper: Exploiting Virtual Machine Vulnerability in Third-Party Clouds with Competition for I/O Resources
Title | Swiper: Exploiting Virtual Machine Vulnerability in Third-Party Clouds with Competition for I/O Resources |
Publication Type | Journal Article |
Year of Publication | 2014 |
Authors | Chiang, R., Rajasekaran, S., Zhang, N., Huang, H. |
Journal | Parallel and Distributed Systems, IEEE Transactions on |
Volume | PP |
Pagination | 1-1 |
ISSN | 1045-9219 |
Keywords | cloud computing, delays, IP networks, security, Synchronization, Throughput, virtualization |
Abstract | The emerging paradigm of cloud computing, e.g., Amazon Elastic Compute Cloud (EC2), promises a highly flexible yet robust environment for large-scale applications. Ideally, while multiple virtual machines (VM) share the same physical resources (e.g., CPUs, caches, DRAM, and I/O devices), each application should be allocated to an independently managed VM and isolated from one another. Unfortunately, the absence of physical isolation inevitably opens doors to a number of security threats. In this paper, we demonstrate in EC2 a new type of security vulnerability caused by competition between virtual I/O workloads-i.e., by leveraging the competition for shared resources, an adversary could intentionally slow down the execution of a targeted application in a VM that shares the same hardware. In particular, we focus on I/O resources such as hard-drive throughput and/or network bandwidth-which are critical for data-intensive applications. We design and implement Swiper, a framework which uses a carefully designed workload to incur significant delays on the targeted application and VM with minimum cost (i.e., resource consumption). We conduct a comprehensive set of experiments in EC2, which clearly demonstrates that Swiper is capable of significantly slowing down various server applications while consuming a small amount of resources. |
DOI | 10.1109/TPDS.2014.2325564 |
Citation Key | 6824231 |