CoResident Evil: Covert Communication In The Cloud With Lambdas

被引:5
|
作者
Yelam, Anil [1 ]
Subbareddy, Shibani [1 ]
Ganesan, Keerthana [1 ]
Savage, Stefan [1 ]
Mirian, Ariana [1 ]
机构
[1] Univ Calif San Diego, La Jolla, CA 92093 USA
关键词
cloud; cartography; serverless; coresidency; covert channels;
D O I
10.1145/3442381.3450100
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
"Serverless" cloud services, such as AWS lambdas, are one of the fastest growing segments of the cloud services market. These services are popular in part due to their light-weight nature and flexibility in scheduling and cost, however the security issues associated with serverless computing are not well understood. In this work, we explore the feasibility of constructing a practical covert channel from lambdas. We establish that a fast co-residence detection for lambdas is key to enabling such a covert channel, and proceed to develop a reliable and scalable co-residence detector based on the memory bus hardware. Our technique enables dynamic discovery for co-resident lambdas and is incredibly fast, executing in a matter of seconds. We evaluate our approach for correctness and scalability, and use it to establish covert channels and perform data transfer on AWS lambdas. We show that we can establish hundreds of individual covert channels for every 1000 lambdas deployed, and each of those channels can send data at a rate of similar to(2) over tilde 200 bits per second, thus demonstrating that covert communication via lambdas is entirely feasible.
引用
收藏
页码:1005 / 1016
页数:12
相关论文
共 50 条
  • [21] On Covert Communication With Interference Uncertainty
    Liu, Zhihong
    Liu, Jiajia
    Zeng, Yong
    Ma, Jianfeng
    Huang, Qiping
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [22] Covert Communication in Mobile Applications
    Rubin, Julia
    Gordon, Michael I.
    Nguyen Nguyen
    Rinard, Martin
    2015 30TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2015, : 647 - 657
  • [23] Deep Learning for Covert Communication
    Shen Weiguo
    Chen Jiepeng
    Zheng Shilian
    Zhang Luxin
    Pei Zhangbin
    Lu Weidang
    Yang Xiaoniu
    China Communications, 2024, 21 (09) : 40 - 59
  • [24] Jamming strategies in covert communication
    Shmuel, Ori
    Cohen, Asaf
    Gurewitz, Omer
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, 11527 LNCS : 1 - 15
  • [26] Covert Wireless Communication on Beidou Short Message Communication
    Wang, Maochun
    Yang, Weiwei
    Xu, Lu
    Lv, Xin
    Chen, Ye
    Wu, Qingchen
    Liu, Bing
    CHINA SATELLITE NAVIGATION CONFERENCE PROCEEDINGS, CSNC 2022, VOL II, 2022, 909 : 310 - 320
  • [27] Covert Wireless Communication on Beidou Short Message Communication
    Wang, Maochun
    Yang, Weiwei
    Xu, Lu
    Lv, Xin
    Chen, Ye
    Wu, Qingchen
    Liu, Bing
    Lecture Notes in Electrical Engineering, 2022, 909 LNEE : 310 - 320
  • [28] Covert Multi-Access Communication with a Non-Covert User
    Bounhar, Abdelaziz
    Sarkiss, Mireille
    Wigger, Michele
    ICC 2024 - IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2024, : 1473 - 1478
  • [29] Enhancing covert communication in NOMA systems with joint security and covert design
    Doan, Thanh Binh
    Nguyen, Tien-Hoa
    PLOS ONE, 2025, 20 (01):
  • [30] See No Evil: Discovering Covert Surveillance Devices Using Thermal Imaging
    Zuniga, Agustin
    Motlagh, Naser Hossein
    Hoque, Mohammad A.
    Tarkoma, Sasu
    Flores, Huber
    Nurmi, Petteri
    IEEE PERVASIVE COMPUTING, 2022, 21 (04) : 33 - 42