Eran Tromer: "Side Channels and Vulnerabilities in Cloud Computing"

Date: 

Monday, October 5, 2009, 11:45am to 1:15pm

Location: 

Maxwell Dworkin 2nd Floor Lounge Area

CRCS Lunch Seminar

Date:  Monday,  October 5, 2009
Time:  11:45am – 1:15pm
Place:  Maxwell Dworkin 2nd Floor Lounge Area

Speaker:  Eran Tromer, MIT

Title:  Side Channels and Vulnerabilities in Cloud Computing

Abstract:  Today’s computers typically run numerous processes of varying sensitivity and trustworthiness. The platform purports to protect these from each other, but side channels arise from lower architectural layers (such as contention for shared hardware resources), and create inadvertent cross-talk between processes. These leakages can be exploited for stealing cryptographic keys and other sensitive information.

Such cross-talk is especially grievous in the context of third-party cloud computing, a prominent technological trend. Services, such as Microsoft’s Azure and Amazon’s EC2, allow users to acquire computational capacity on demand in the form of virtual machines (VMs). Virtualization allows the service provider to maximize resource utilization by multiplexing many customer VMs across a shared physical infrastructure. However, the presence of multiple mutually-untrusting virtual machines on the same hardware makes them potentially vulnerable to the aforementioned side channels.

Using a commercial cloud service as a case study, we show that it is possible to map the internal cloud infrastructure, identify where a particular target VM is likely to reside and instantiate new VMs that are co-resident with the target on the same physical machine. We then show that co-residence allows attackers to exfiltrate information across VM boundaries by use of side channels and covert channels such as cache contention and timing variability.

We discuss potential solutions, including work-in-progress on mitigating side channels using just-in-time program transformation.

Joint works with Saman Amarasinghe, Austin Chu, Dag Arne Osvik, Thomas Ristenpart, Ron Rivest, Stephan Savage, Hovav Shacham and Adi Shamir.

Bio:  Eran Tromer is a postdoctoral associate at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL). His research focus is cryptography, information security, and the challenges raised by imperfect real-world computer systems. His research on side-channel attacks demonstrated vulnerabilities in cloud computing, cache-based attacks on AES encryption, and acoustic attacks on RSA encryption. His Ph.D. dissertation, advised by Prof. Adi Shamir, reduced the projected cost of breaking RSA keys by 6 orders of magnitude using the TWIRL hardware device, leading to revision of government standards. He presently pursues means of improving security at the levels of networks, protocols, operating systems and circuits.