Paper 2016/284

Co-location detection on the Cloud

Mehmet Sinan Inci, Berk Gulmezoglu, Thomas Eisenbarth, and Berk Sunar

Abstract

In this work we focus on the problem of co-location as a first step of conducting Cross-VM attacks such as Prime and Probe or Flush+Reload in commercial clouds. We demonstrate and compare three co-location detection methods namely, cooperative Last-Level Cache (LLC) covert channel, software profiling on the LLC and memory bus locking. We conduct our experiments on three commercial clouds, Amazon EC2, Google Compute Engine and Microsoft Azure. Finally, we show that both cooperative and non-cooperative co-location to specific targets on cloud is still possible on major cloud services.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Minor revision. COSADE 2016 pre-procedings version
Keywords
Co-location in CloudSoftware ProfilingCache Covert ChannelPerformance Degradation AttacksMemory Bus Locking
Contact author(s)
teisenbarth @ wpi edu
History
2016-03-15: received
Short URL
https://ia.cr/2016/284
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/284,
      author = {Mehmet Sinan Inci and Berk Gulmezoglu and Thomas Eisenbarth and Berk Sunar},
      title = {Co-location detection on the Cloud},
      howpublished = {Cryptology ePrint Archive, Paper 2016/284},
      year = {2016},
      note = {\url{https://eprint.iacr.org/2016/284}},
      url = {https://eprint.iacr.org/2016/284}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.