On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment
As Cloud services become more commonplace, recent works have uncovered vulnerabilities unique to such systems. Specifi cally, the paradigm promotes a risk of information leakage across virtual machine isolation via side-channels. Unlike conventional computing, the infrastructure supporting a Cloud e...
Main Author: | |
---|---|
Other Authors: | |
Language: | en en |
Published: |
2013
|
Subjects: | |
Online Access: | http://hdl.handle.net/1974/8320 |
id |
ndltd-LACETR-oai-collectionscanada.gc.ca-OKQ.1974-8320 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-LACETR-oai-collectionscanada.gc.ca-OKQ.1974-83202013-12-20T03:41:07ZOn the Prevention of Cache-Based Side-Channel Attacks in a Cloud EnvironmentGodfrey, MichaelCPU CacheServer Side DefenseCloud ComputingSecuritySide ChannelAs Cloud services become more commonplace, recent works have uncovered vulnerabilities unique to such systems. Specifi cally, the paradigm promotes a risk of information leakage across virtual machine isolation via side-channels. Unlike conventional computing, the infrastructure supporting a Cloud environment allows mutually dis- trusting clients simultaneous access to the underlying hardware, a seldom met requirement for a side-channel attack. This thesis investigates the current state of side-channel vulnerabilities involving the CPU cache, and identifi es the shortcomings of traditional defenses in a Cloud environment. It explores why solutions to non-Cloud cache-based side-channels cease to work in Cloud environments, and describes new mitigation techniques applicable for Cloud security. Speci cally, it separates canonical cache-based side-channel attacks into two categories, Sequential and Parallel attacks, based on their implementation and devises a unique mitigation technique for each. Applying these solutions to a canonical Cloud environment, this thesis demonstrates the validity of these Cloud-specifi c, cache-based side-channel mitigation techniques. Furthermore, it shows that they can be implemented, together, as a server-side approach to improve security without inconveniencing the client. Finally, it conducts a comparison of our solutions to the current state-of-the-art.Thesis (Master, Computing) -- Queen's University, 2013-09-25 18:03:47.737Queen's University (Kingston, Ont.). Theses (Queen's University (Kingston, Ont.))2013-09-25 18:03:47.7372013-09-26T22:09:37Z2013-09-26T22:09:37Z2013-09-26Thesishttp://hdl.handle.net/1974/8320enenCanadian thesesThis publication is made available by the authority of the copyright owner solely for the purpose of private study and research and may not be copied or reproduced except as permitted by the copyright laws without written authority from the copyright owner. |
collection |
NDLTD |
language |
en en |
sources |
NDLTD |
topic |
CPU Cache Server Side Defense Cloud Computing Security Side Channel |
spellingShingle |
CPU Cache Server Side Defense Cloud Computing Security Side Channel Godfrey, Michael On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment |
description |
As Cloud services become more commonplace, recent works have uncovered vulnerabilities unique to such systems. Specifi cally, the paradigm promotes a risk of information leakage across virtual machine isolation via side-channels. Unlike conventional
computing, the infrastructure supporting a Cloud environment allows mutually dis-
trusting clients simultaneous access to the underlying hardware, a seldom met requirement for a side-channel attack. This thesis investigates the current state of
side-channel vulnerabilities involving the CPU cache, and identifi es the shortcomings
of traditional defenses in a Cloud environment. It explores why solutions to non-Cloud cache-based side-channels cease to work in Cloud environments, and describes
new mitigation techniques applicable for Cloud security. Speci cally, it separates
canonical cache-based side-channel attacks into two categories, Sequential and Parallel attacks, based on their implementation and devises a unique mitigation technique
for each. Applying these solutions to a canonical Cloud environment, this thesis
demonstrates the validity of these Cloud-specifi c, cache-based side-channel mitigation techniques. Furthermore, it shows that they can be implemented, together, as a
server-side approach to improve security without inconveniencing the client. Finally,
it conducts a comparison of our solutions to the current state-of-the-art. === Thesis (Master, Computing) -- Queen's University, 2013-09-25 18:03:47.737 |
author2 |
Queen's University (Kingston, Ont.). Theses (Queen's University (Kingston, Ont.)) |
author_facet |
Queen's University (Kingston, Ont.). Theses (Queen's University (Kingston, Ont.)) Godfrey, Michael |
author |
Godfrey, Michael |
author_sort |
Godfrey, Michael |
title |
On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment |
title_short |
On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment |
title_full |
On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment |
title_fullStr |
On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment |
title_full_unstemmed |
On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment |
title_sort |
on the prevention of cache-based side-channel attacks in a cloud environment |
publishDate |
2013 |
url |
http://hdl.handle.net/1974/8320 |
work_keys_str_mv |
AT godfreymichael onthepreventionofcachebasedsidechannelattacksinacloudenvironment |
_version_ |
1716621733984731136 |