Cloud computing paradigms have emerged as a major facility to store and process the massive data produced by various business units, public organizations, Internet-of-Things, and cyber-physical systems. To meet users' performance requirements while maximizing resource utilization to achieve cost-efficiency, cloud administrators leverage schedulers to orchestrate tasks to different physical nodes and allow applications from different users to share the same physical node. On the other hand, micro-architectural attacks can exploit the shared resources to compromise the confidentiality/integrity of a co-located victim application. Since co-location is an essential requirement for micro-architectural attacks, in this work, we investigate whether attackers can exploit the cloud schedulers to satisfy the co-location requirement. Our analysis shows that for cloud schedulers that allow users to submit application requirements, an attacker can carefully select the attacker's application requirements to influence the scheduler to co-locate it with a targeted victim application. We call such attack Replication Attack (Repttack). Our experimental results, in both a simulated cluster environment and a real cluster, show similar trends; a single attack instance can reach up to 50% co-location rate and with only 5 instances the co-location rate can reach up to 80%. Furthermore, we propose and evaluate a mitigation strategy that can help defend against Repttack. We believe that our results highlight the fact that schedulers in multi-user clusters need to be more carefully designed with security in mind, and the process of making scheduling decisions should involve as little user-defined information as possible.
翻译:云计算模式已成为储存和处理各商业单位、公共组织、互联网和网络物理系统产生的大量数据的主要工具。为了满足用户的业绩要求,同时最大限度地利用资源以实现成本效率,云管理人利用调度员将任务安排到不同的物理节点,并允许不同用户的应用程序共享相同的物理节点。另一方面,微型建筑攻击可以利用共享资源来损害同一地点受害人应用程序的保密/完整性。由于在这项工作中,同地办公是微结构攻击的一项基本要求,我们调查攻击者是否可以利用云调度器来满足合用同一地点的要求。我们的分析表明,对于允许用户提交应用程序要求的云调度员,攻击者可以仔细选择攻击者的应用要求,以影响调度器与目标受害人应用程序的同地隔开。我们称之为攻击重复攻击(Repttack),我们实验的结果,在模拟的集群环境和真实集群中,显示相似的趋势;单项攻击记录显示,对于允许用户提交应用程序要求的云调度员,可以谨慎选择到50 % 共同定位的频率,我们只能以更精确的方式评估我们设计到5号的组合中的用户排序。