Skip to main content

CPU Elasticity to Mitigate Cross-VM Runtime Monitoring

Publication ,  Journal Article
Mi, Z; Chen, H; Zhang, Y; Peng, S; Wang, X; Reiter, M
Published in: IEEE Transactions on Dependable and Secure Computing
September 1, 2020

In this paper, We present a new technique that offers lightweight, general, and elastic protection against Crum (Cross-VM runtime monitoring) attacks. Our protection, called Crease (CPU Resource Elasticity as a Service), enables a VM (called principal) to purchase a higher clock rate from the cloud, through lowering the frequency of a malicious VM (called peer), to support its security-critical operations within a short period. During that period, the weakened peer becomes unable to catch up with the pace of the strengthened principal, therefore losing the capability to effectively collect its sensitive information. In the meantime, our approach can also make up for the performance impact on the peer through refunding schedule credits or service credits, in line with the service level agreement of today's cloud. At the center of our design is the novel application of on-demand frequency scaling and schedule quantum randomization, together with a situation-awareness mechanism that dynamically assesses the security risk posed by the peer. We analyzed the security guarantee of our design, implemented a prototype and evaluated it on a well-known Crum attack (an LLC side-channel attack) and various workloads. Our study shows that Crease is effective at protecting the principal, with only a small impact on the peer's operations.

Duke Scholars

Published In

IEEE Transactions on Dependable and Secure Computing

DOI

EISSN

1941-0018

ISSN

1545-5971

Publication Date

September 1, 2020

Volume

17

Issue

5

Start / End Page

1094 / 1108

Related Subject Headings

  • Strategic, Defence & Security Studies
  • 4606 Distributed computing and systems software
  • 4604 Cybersecurity and privacy
  • 0805 Distributed Computing
  • 0804 Data Format
  • 0803 Computer Software
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Mi, Z., Chen, H., Zhang, Y., Peng, S., Wang, X., & Reiter, M. (2020). CPU Elasticity to Mitigate Cross-VM Runtime Monitoring. IEEE Transactions on Dependable and Secure Computing, 17(5), 1094–1108. https://doi.org/10.1109/TDSC.2018.2846742
Mi, Z., H. Chen, Y. Zhang, S. Peng, X. Wang, and M. Reiter. “CPU Elasticity to Mitigate Cross-VM Runtime Monitoring.” IEEE Transactions on Dependable and Secure Computing 17, no. 5 (September 1, 2020): 1094–1108. https://doi.org/10.1109/TDSC.2018.2846742.
Mi Z, Chen H, Zhang Y, Peng S, Wang X, Reiter M. CPU Elasticity to Mitigate Cross-VM Runtime Monitoring. IEEE Transactions on Dependable and Secure Computing. 2020 Sep 1;17(5):1094–108.
Mi, Z., et al. “CPU Elasticity to Mitigate Cross-VM Runtime Monitoring.” IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 5, Sept. 2020, pp. 1094–108. Scopus, doi:10.1109/TDSC.2018.2846742.
Mi Z, Chen H, Zhang Y, Peng S, Wang X, Reiter M. CPU Elasticity to Mitigate Cross-VM Runtime Monitoring. IEEE Transactions on Dependable and Secure Computing. 2020 Sep 1;17(5):1094–1108.

Published In

IEEE Transactions on Dependable and Secure Computing

DOI

EISSN

1941-0018

ISSN

1545-5971

Publication Date

September 1, 2020

Volume

17

Issue

5

Start / End Page

1094 / 1108

Related Subject Headings

  • Strategic, Defence & Security Studies
  • 4606 Distributed computing and systems software
  • 4604 Cybersecurity and privacy
  • 0805 Distributed Computing
  • 0804 Data Format
  • 0803 Computer Software