Researchers find a new way to attack the cloud
'Side-channel' attack techniques could lead to more serious problems
IDG News Service - Amazon and Microsoft have been pushing cloud-computing services as a low-cost way to outsource raw computing power, but the products may introduce new security problems that have yet to be fully explored, according to researchers at the University of California, San Diego, and the Massachusetts Institute of Technology.
Cloud services can save companies money by allowing them to run new applications without having to buy new hardware. Services like Amazon's Elastic Computer Cloud (EC2) host several different operating environments in virtual machines that run on a single computer. This lets Amazon squeeze more computing power out of each server on its network, but it may come at a cost, the researchers say.
In experiments with Amazon's EC2 they showed that they could pull off some very basic versions of what are known as side-channel attacks. A side-channel attacker looks at indirect information related to the computer -- the electromagnetic emanations from screens or keyboards, for example -- to determine what is going on in the machine.
The researchers were able to pinpoint the physical server used by programs running on the EC2 cloud and then extract small amounts of data from these programs, by placing their own software there and launching a side-channel attack. Security experts say the attacks developed by the researchers are minor, but they believe side-channel techniques could lead to more serious problems for cloud computing.
Many users are already reluctant to use cloud services because of regulatory concerns -- they need to have a better handle on the physical location of their data -- but the side-channel research brings a whole new set of problems, according to Tadayoshi Kohno, an assistant professor with the University of Washington's computer science department. "It's exactly these types of concerns -- the threat of the unknown -- that is going to make a lot of people hesitant to use cloud services such as EC2."
In the past, some side-channel attacks have been very successful. In 2001, researchers at the University of California, Berkeley, showed how they were able to extract password information from an encrypted SSH (Secure Shell) data stream by performing a statistical analysis of the way keyboard strokes generated traffic on the network.
The UC and MIT researchers weren't able to achieve anything that sophisticated, but they think their work may open the door to future research in this area. "A virtual machine is not proof against all of the kinds of side-channel attacks that we've been hearing about for years," said Stefan Savage, associate professor with UC San Diego, and one of the authors of the paper.
- REST easy: API Design, Evolution and Connection RESTful design increases API performance, reduces development effort, and minimizes operational support burden. By following a few best practices and selecting RESTful tooling,...
- DevOps meets ALM in the Cloud - Cloud DevOps PaaS To improve software delivery performance and effectiveness, teams need automation, governance, architecture best practices, and increased team collaboration. Find out more.
- The Path to Responsive IT A responsive IT team enables on-demand self-service, ticketless IT, a low cost structure & wider participation. When extending the IT team to analysts,...
- WSO2 Reduces Infrastructure Cost and Improves Agility By adopting WSO2's cloud-native multi-tenant deployment topology and offering middleware as a service, your team can reduce costs and deliver a complete solution...
- ElectricAccelerator: Dramatically Faster Builds and Test ElectricAccelerator dramatically speeds up builds and test by parallelizing jobs across clusters of physical or cloud CPUs.
- Electric Cloud: Your AnthillPro Alternative Many organizations have become leery about AnthillPro since its acquisition by IBM. In this webinar, learn why ElectricCommander is an excellent alternative to... All Cloud Computing White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!