作者
Aastha Mehta, Mohamed Alzayat, Roberta De Viti, Björn B Brandenburg, Peter Druschel, Deepak Garg
发表日期
2022
研讨会论文
31st USENIX Security Symposium (USENIX Security 22), 2819-2838
简介
Network side channels (NSCs) leak secrets through packet timing and packet sizes. They are of particular concern in public IaaS Clouds, where any tenant may be able to colocate and indirectly observe a victim's traffic shape. We present Pacer, the first system that eliminates NSC leaks in public IaaS Clouds end-to-end. It builds on the principled technique of shaping guest traffic outside the guest to make the traffic shape independent of secrets by design. However, Pacer also addresses important concerns that have not been considered in prior work—it prevents internal side-channel leaks from affecting reshaped traffic, and it respects network flow control, congestion control and loss recovery signals. Pacer is implemented as a paravirtualizing extension to the host hypervisor, requiring modest changes to the hypervisor and the guest kernel and optional, minimal changes to applications. We present Pacer's key abstraction of a cloaked tunnel, describe its design and implementation, and show through an experimental evaluation that Pacer imposes moderate overheads on bandwidth, client latency, and server throughput, while thwarting attacks using state-of-the-art CNN classifiers.
引用总数
201920202021202220231127
学术搜索中的文章
A Mehta, M Alzayat, R De Viti, BB Brandenburg… - 31st USENIX Security Symposium (USENIX Security …, 2022
A Mehta, M Alzayat, R De Viti, BB Brandenburg… - arXiv preprint arXiv:1908.11568, 2019