SlideShare a Scribd company logo
Swiper: Exploiting Virtual Machine Vulnerability in Third-Party Clouds
with Competition for I/O Resources
Abstract:
The emerging paradigm of cloud computing, e.g., Amazon Elastic
Compute Cloud (EC2), promises a highly flexible yet robust environment
for large-scale applications. Ideally, while multiple virtual machines (VM)
share the same physical resources (e.g., CPUs, caches, DRAM, and I/O
devices), each application should be allocated to an independently
managed VM and isolated from one another. Unfortunately, the absence of
physical isolation inevitably opens doors to a number of security threats. In
this paper, we demonstrate in EC2 a new type of security vulnerability
caused by competition between virtual I/O workloads-i.e., by leveraging
the competition for shared resources, an adversary could intentionally slow
down the execution of a targeted application in a VM that shares the same
hardware. In particular, we focus on I/O resources such as hard-drive
throughput and/or network bandwidth-which are critical for data-intensive
applications. We design and implement Swiper, a framework which uses a
carefully designed workload to incur significant delays on the targeted
application and VM with minimum cost (i.e., resource consumption). We
conduct a comprehensive set of experiments in EC2, which clearly
demonstrates that Swiper is capable of significantly slowing down various
server applications while consuming a small amount of resources.
Hardware Requirements:
• System : Pentium IV 2.4 GHz.
• Hard Disk ` : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• RAM : 256 Mb.
Software Requirements:
• Operating system : - Windows XP.
• Front End : - JSP
• Back End : - SQL Server
Software Requirements:
• Operating system : - Windows XP.
• Front End : - .Net
• Back End : - SQL Server

More Related Content

PDF
h13345-top-reasons-service-providers-choose-ecs-appliance
PPTX
Cloud computing
PPTX
CloudSim : Introduction and Basic Programming Syntax
PPTX
Cloud sim pptx
PPT
Survey on cloud simulator
PPTX
Cloud computing and Cloudsim
PPTX
introduction to cloudsim
PDF
Concurrent and Distributed CloudSim Simulations
h13345-top-reasons-service-providers-choose-ecs-appliance
Cloud computing
CloudSim : Introduction and Basic Programming Syntax
Cloud sim pptx
Survey on cloud simulator
Cloud computing and Cloudsim
introduction to cloudsim
Concurrent and Distributed CloudSim Simulations

What's hot (20)

PPTX
Cloud Computing
PPT
Cloud computing
PDF
A tutorial on CloudSim
PPTX
Cloudsim & Green Cloud
PPT
Clearing The Air On Cloud
PPTX
Amazon Virtual Private Cloud
PPTX
Cloud Computing
PPTX
Microsoft azure kt
PPTX
Harshit.ppt
PPTX
Cloud computing
PPTX
What is Virtualization. Talk from Pycon 2013 India.
PPTX
Cloud sim
PPTX
Ankit ppt
PPTX
Windows Azure presentation By Kamlesh Asati
PPTX
Presenting Cloud Computing
PPTX
Study and implementation a cloud solution based on
PDF
A tutorial on GreenCloud
PDF
An adaptive distributed simulator for cloud andmap reduce algorithms and arch...
PPTX
SECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTING
PPT
Cloudsim & greencloud
Cloud Computing
Cloud computing
A tutorial on CloudSim
Cloudsim & Green Cloud
Clearing The Air On Cloud
Amazon Virtual Private Cloud
Cloud Computing
Microsoft azure kt
Harshit.ppt
Cloud computing
What is Virtualization. Talk from Pycon 2013 India.
Cloud sim
Ankit ppt
Windows Azure presentation By Kamlesh Asati
Presenting Cloud Computing
Study and implementation a cloud solution based on
A tutorial on GreenCloud
An adaptive distributed simulator for cloud andmap reduce algorithms and arch...
SECURITY, VIRTUALISATION AND INTEGRITY IN CLOUD COMPUTING
Cloudsim & greencloud
Ad

Similar to Swiper exploiting virtual machine vulnerability in third party clouds with competition for io resources (20)

PDF
Z26167171
PPTX
Cloud computing
PDF
The IoT Academy_awstraining_part2_aws_ec2_iaas
DOCX
Ericsson Cloud Computing
PPTX
EHEv1 Module 11 Cloud Computing Threats and Countermeasures.pptx
DOCX
Whitepaper nebucom intelligent application broking and provisioning in a hybr...
PDF
A proposal for implementing cloud computing in newspaper company
PPT
Cloud computing
PDF
50120130405007
PPTX
Cloud computing
PDF
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
PPT
Cloud Computing
PDF
Oruta phase1 report
PPT
Cloud computing
PPTX
Isolation of vm
PPT
Chapter3 ec2 and usage.ppt
PDF
OIT552 Cloud Computing - Question Bank
PDF
Cloud computing final format(1)
PDF
Cloud Computing IEEE 2014 Projects
PDF
Cloud computing-ieee-2014-projects
Z26167171
Cloud computing
The IoT Academy_awstraining_part2_aws_ec2_iaas
Ericsson Cloud Computing
EHEv1 Module 11 Cloud Computing Threats and Countermeasures.pptx
Whitepaper nebucom intelligent application broking and provisioning in a hybr...
A proposal for implementing cloud computing in newspaper company
Cloud computing
50120130405007
Cloud computing
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
Cloud Computing
Oruta phase1 report
Cloud computing
Isolation of vm
Chapter3 ec2 and usage.ppt
OIT552 Cloud Computing - Question Bank
Cloud computing final format(1)
Cloud Computing IEEE 2014 Projects
Cloud computing-ieee-2014-projects
Ad

More from ieeeprojectschennai (20)

PDF
Parallel application signature for performance analysis and prediction
PDF
Dynamic scheduling of irregular stream programs toward many core scalability
PDF
Parallel application signature for performance analysis and prediction
PDF
Dynamic scheduling of irregular stream programs toward many core scalability
PDF
Swiper exploiting virtual machine vulnerability in third party clouds with co...
PDF
Practical conflict graphs in the wild
PDF
Design and analysis of medium access protocol throughput and short term fairn...
PDF
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
PDF
Ensuring predictable contact opportunity for scalable vehicular internet acce...
PDF
Utilize signal traces from others a crowdsourcing perspective of energy savin...
PDF
Swimming seamless and efficient wi fi based internet access from moving vehicles
PDF
Spatial spectrum access game
PDF
On availability performability tradeoff in wireless mesh networks
PDF
Managing contention with medley
PDF
Impact of location popularity on throughput and delay in mobile ad hoc networks
PDF
Frequency diversity aware wi-fi using ofdm-based bloom filters
PDF
attack resilinet mxi zones over road networks architecture and algorithms
PDF
Economic analysis of 4 g upgrade timing
PDF
Cooperative pseudo bayesian backoff
PDF
Cooperative load balancing and dynamic channel allocation for cluster based m...
Parallel application signature for performance analysis and prediction
Dynamic scheduling of irregular stream programs toward many core scalability
Parallel application signature for performance analysis and prediction
Dynamic scheduling of irregular stream programs toward many core scalability
Swiper exploiting virtual machine vulnerability in third party clouds with co...
Practical conflict graphs in the wild
Design and analysis of medium access protocol throughput and short term fairn...
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
Ensuring predictable contact opportunity for scalable vehicular internet acce...
Utilize signal traces from others a crowdsourcing perspective of energy savin...
Swimming seamless and efficient wi fi based internet access from moving vehicles
Spatial spectrum access game
On availability performability tradeoff in wireless mesh networks
Managing contention with medley
Impact of location popularity on throughput and delay in mobile ad hoc networks
Frequency diversity aware wi-fi using ofdm-based bloom filters
attack resilinet mxi zones over road networks architecture and algorithms
Economic analysis of 4 g upgrade timing
Cooperative pseudo bayesian backoff
Cooperative load balancing and dynamic channel allocation for cluster based m...

Recently uploaded (20)

PDF
Complications of Minimal Access Surgery at WLH
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Pharma ospi slides which help in ospi learning
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Presentation on HIE in infants and its manifestations
PDF
01-Introduction-to-Information-Management.pdf
PPTX
master seminar digital applications in india
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Classroom Observation Tools for Teachers
Complications of Minimal Access Surgery at WLH
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
human mycosis Human fungal infections are called human mycosis..pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
O7-L3 Supply Chain Operations - ICLT Program
Pharma ospi slides which help in ospi learning
Anesthesia in Laparoscopic Surgery in India
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Abdominal Access Techniques with Prof. Dr. R K Mishra
Presentation on HIE in infants and its manifestations
01-Introduction-to-Information-Management.pdf
master seminar digital applications in india
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Final Presentation General Medicine 03-08-2024.pptx
Classroom Observation Tools for Teachers

Swiper exploiting virtual machine vulnerability in third party clouds with competition for io resources

  • 1. Swiper: Exploiting Virtual Machine Vulnerability in Third-Party Clouds with Competition for I/O Resources Abstract: The emerging paradigm of cloud computing, e.g., Amazon Elastic Compute Cloud (EC2), promises a highly flexible yet robust environment for large-scale applications. Ideally, while multiple virtual machines (VM) share the same physical resources (e.g., CPUs, caches, DRAM, and I/O devices), each application should be allocated to an independently managed VM and isolated from one another. Unfortunately, the absence of physical isolation inevitably opens doors to a number of security threats. In this paper, we demonstrate in EC2 a new type of security vulnerability caused by competition between virtual I/O workloads-i.e., by leveraging the competition for shared resources, an adversary could intentionally slow down the execution of a targeted application in a VM that shares the same hardware. In particular, we focus on I/O resources such as hard-drive throughput and/or network bandwidth-which are critical for data-intensive applications. We design and implement Swiper, a framework which uses a carefully designed workload to incur significant delays on the targeted application and VM with minimum cost (i.e., resource consumption). We
  • 2. conduct a comprehensive set of experiments in EC2, which clearly demonstrates that Swiper is capable of significantly slowing down various server applications while consuming a small amount of resources. Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk ` : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • RAM : 256 Mb. Software Requirements: • Operating system : - Windows XP. • Front End : - JSP • Back End : - SQL Server Software Requirements: • Operating system : - Windows XP.
  • 3. • Front End : - .Net • Back End : - SQL Server