2 research outputs found

    Moving in next door: Network flooding as a side channel in cloud environments

    Full text link
    The final publication is available at http://link.springer.com/chapter/10.1007/978-3-319-48965-0_56Co-locating multiple tenants' virtual machines (VMs) on the same host underpins public clouds' affordability, but sharing physical hardware also exposes consumer VMs to side channel attacks from adversarial co-residents. We demonstrate passive bandwidth measurement to perform traffic analysis attacks on co-located VMs. Our attacks do not assume a privileged position in the network or require any communication between adversarial and victim VMs. Using a single feature in the observed bandwidth data, our algorithm can identify which of 3 potential YouTube videos a co-resident VM streamed with 66% accuracy. We discuss defense from both a cloud provider's and a consumer's perspective, showing that effective defense is difficult to achieve without costly under-utilization on the part of the cloud provider or over-utilization on the part of the consumer.We would like to acknowledge the MIT PRIMES program and thank in particular Dr. Slava Gerovitch and Dr. Srini Devadas for their support. We are also grateful to Boston University, the Hariri Institute, and the Massachusetts Open Cloud. This paper is based upon work supported by the National Science Foundation under Grants No. 1414119 and 1413920

    Analysis of Evolutionary Debunking Arguments by Greene and Singer

    No full text
    Both Greene and Singer essentially are advocates of the same idea, the idea that discards deontology using evolutionary debunking arguments. Their argumentation, however, differs. Greene decides to use scientific data and data from psychological experiments and interprets it using explanations that reinforce his hypothesis. Singer, on the other hand, choses to talk more in principle as to why his hypothesis is a more reasonable one, and only uses scientific evidence at a handful of occasions. I have reconstructed both approaches one by one and then presented an evaluative comparison in the end
    corecore