Timing Channel in IaaS: How to Identify and Investigate

被引:15
作者
Fu, Xiao [1 ]
Yang, Rui [1 ]
Du, Xiaojiang [2 ]
Luo, Bin [1 ]
Guizani, Mohsen [3 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 2110, Jiangsu, Peoples R China
[2] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[3] Univ Idaho, Dept Elect & Comp Engn, Moscow, ID 83844 USA
基金
中国国家自然科学基金;
关键词
Digital investigation; IaaS security; timing channel; KEY MANAGEMENT SCHEME; SENSOR; SECURE;
D O I
10.1109/ACCESS.2018.2876146
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the Infrastructure as a Service Cloud (IaaS) (e.g., Amazon EC2) has been widely used by many organizations. However, some IaaS security issues create serious threats to its users. A typical issue is the timing channel. This kind of channel can be a cross-VM information channel, as proven by many researchers. Owing to the fact that it is covert and traceless, the traditional identification methods cannot build an accurate analysis model and obtain a compromised result. We investigated the underlying behavior of the timing channel from the perspective of the memory activity records and summarized the signature of the timing channel in the underlying memory activities. An identification method based on the long-term behavior signatures was proposed. We proposed a complete set of forensics steps including evidence extraction, identification, record reserve, and evidence reports. We studied four typical timing channels, and the experiments showed that these channels can be detected and investigated, even with the disturbances from normal processes.
引用
收藏
页码:1 / 11
页数:11
相关论文
共 21 条
[1]  
[Anonymous], 2014, INTEL HARDWARE ASSIS
[2]  
[Anonymous], 2014, VOLATILITY FRAMEWORK
[3]  
Cabuk S., 2004, P 11 ACM C COMP COMM, P178, DOI DOI 10.1145/1030083.1030108
[4]   Secure and efficient time synchronization in heterogeneous sensor networks [J].
Du, Xiaojiang ;
Guizani, Mohsen ;
Xiao, Yang ;
Chen, Hsiao-Hwa .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2008, 57 (04) :2387-2394
[5]   An effective key management scheme for heterogeneous sensor networks [J].
Du, Xiaojiang ;
Xiao, Yang ;
Guizani, Mohsen ;
Chen, Hslao-Hwa .
AD HOC NETWORKS, 2007, 5 (01) :24-34
[6]   Secure cell relay routing protocol for sensor networks [J].
Du, Xiaojiang ;
Xiao, Yang ;
Chen, Hsiao-Hwa ;
Wu, Qishi .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2006, 6 (03) :375-391
[7]   A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks [J].
Du, Xiaojiang ;
Guizani, Mohsen ;
Xiao, Yang ;
Chen, Hsiao-Hwa .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1223-1229
[8]  
Jingzheng Wu, 2012, 2012 IEEE 5th International Conference on Cloud Computing (CLOUD), P678, DOI 10.1109/CLOUD.2012.28
[9]  
JingZheng Wu, 2011, Proceedings of the 2011 IEEE 4th International Conference on Cloud Computing (CLOUD 2011), P283, DOI 10.1109/CLOUD.2011.10
[10]  
JingZheng Wu, 2011, Proceedings of the 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement (SSIRI 2011), P98, DOI 10.1109/SSIRI.2011.17