Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop 2010
DOI: 10.1145/1866835.1866854
|View full text |Cite
|
Sign up to set email alerts
|

Determinating timing channels in compute clouds

Abstract: Timing side-channels represent an insidious security challenge for cloud computing, because: (a) massive parallelism in the cloud makes timing channels pervasive and hard to control; (b) timing channels enable one customer to steal information from another without leaving a trail or raising alarms; (c) only the cloud provider can feasibly detect and report such attacks, but the provider's incentives are not to; and (d) resource partitioning schemes for timing channel control undermine statistical sharing effic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
49
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 93 publications
(49 citation statements)
references
References 37 publications
0
49
0
Order By: Relevance
“…Various countermeasures to cache-based side channels (not necessarily Flush-Reload channels) have been proposed in IaaS cloud contexts [31,4,36,18,41,19,35]. However, none of these is applicable to our attacks.…”
Section: Countermeasuresmentioning
confidence: 99%
“…Various countermeasures to cache-based side channels (not necessarily Flush-Reload channels) have been proposed in IaaS cloud contexts [31,4,36,18,41,19,35]. However, none of these is applicable to our attacks.…”
Section: Countermeasuresmentioning
confidence: 99%
“…In [27], there is an example of VM side-channel attack and how the attacker can infer some information about a victim. The timing side channel attack is one kind of VM side channel attacks [28]. This attack is based on determining the time needed by various computations.…”
Section: A Cross Virtual Machine(vm) Side-channel Attacksmentioning
confidence: 99%
“…This attack is based on determining the time needed by various computations. Determining this time can lead to leaking sensitive information such as described in [28]. This attack can help in leaking some sensitive information such as to the one who performs this computation or sometimes leaking information out of cloud provider itself.…”
Section: A Cross Virtual Machine(vm) Side-channel Attacksmentioning
confidence: 99%
“…Research on timing channels and their determination in cloud computing was conducted in [36]. This research proposed using provider-enforced deterministic execution as a replacement of resource partitioning to eliminate timing channels within a shared cloud domain.…”
Section: Side-channel Attacksmentioning
confidence: 99%