negligible.
7 CONCLUSIONS
In this paper, we proposed Sift, an efficient and
reliable approach for co-residency detection. A
detailed introduction of this detection scheme was
presented, and the threat model for Sift was
explained as well. Through an extensive series of
tests, we have implemented Sift on Amazon EC2.
Through the analysis of experimental data and the
computation of complexity, we have proved its
practicality and efficiency. Finally, we made a
discussion about how to select a proper value for x
and several problems of Sift.
Our future work will focus on improving Sift.
We will solve the leftover problems first and then
implement it on other cloud platforms to assure
whether Sift is still feasible.
ACKNOWLEDGEMENTS
This work is supported by the National High
Technology Research and Development Program
(“863” Program) of China under Grant No.
2015AA016009, the National Natural Science
Foundation of China under Grant No. 61232005, and
the Science and Technology Program of Shen Zhen,
China under Grant No. JSGG20140516162852628.
REFERENCES
Bijon, K., Krishnan, R., & Sandhu, R. (2015, June).
Mitigating Multi-Tenancy Risks in IaaS Cloud
Through Constraints-Driven Virtual Resource
Scheduling. In Proceedings of the 20th ACM
Symposium on Access Control Models and
Technologies (pp. 63-74). ACM.
Bates, A., Mood, B., Pletcher, J., Pruse, H., Valafar, M., &
Butler, K. (2012, October). Detecting co-residency
with active traffic analysis techniques. In Proceedings
of the 2012 ACM Workshop on Cloud computing
security workshop (pp. 1-12). ACM.
Godfrey, M., & Zulkernine, M. (2014). Preventing Cache-
Based Side-Channel Attacks in a Cloud Environment.
Cloud Computing, IEEE Transactions on, 2(4), 395-
408.
Godfrey, M., & Zulkernine, M. (2013, June). A server-
side solution to cache-based side-channel attacks in
the cloud. In Cloud Computing (CLOUD), 2013 IEEE
Sixth International Conference on (pp. 163-170).
IEEE.
Han, Y., Chan, J., Alpcan, T., & Leckie, C. (2014, June).
Virtual machine allocation policies against co-resident
attacks in cloud computing. In Communications
(ICC), 2014 IEEE International Conference on (pp.
786-792). IEEE.
Hund, R., Willems, C., & Holz, T. (2013, May). Practical
timing side channel attacks against kernel space
ASLR. In Security and Privacy (SP), 2013 IEEE
Symposium on (pp. 191-205). IEEE.
Ristenpart, T., Tromer, E., Shacham, H., & Savage, S.
(2009, November). Hey, you, get off of my cloud:
exploring information leakage in third-party compute
clouds. In Proceedings of the 16th ACM conference
on Computer and communications security (pp. 199-
212). ACM.
Raj, H., Nathuji, R., Singh, A., & England, P. (2009,
November). Resource management for isolation
enhanced cloud services. In Proceedings of the 2009
ACM workshop on Cloud computing security (pp. 77-
84). ACM.
Shen, Q., Wan, M., Zhang, Z., Zhang, Z., Qing, S., & Wu,
Z. (2013). A covert channel using event channel state
on xen hypervisor. In Information and
Communications Security (pp. 125-134). Springer
International Publishing.
Varadarajan, V., Zhang, Y., Ristenpart, T., & Swift, M.
(2015, August). A placement vulnerability study in
multi-tenant public clouds. In 24th USENIX Security
Symposium (USENIX Security 15)(Washington, DC
(pp. 913-928).
Varadarajan, V., Kooburat, T., Farley, B., Ristenpart, T.,
& Swift, M. M. (2012, October). Resource-freeing
attacks: improve your cloud performance (at your
neighbor's expense). In Proceedings of the 2012 ACM
conference on Computer and communications security
(pp. 281-292). ACM.
Wu, Z., Xu, Z., & Wang, H. (2012, August). Whispers in
the Hyper-space: High-speed Covert Channel Attacks
in the Cloud. In USENIX Security symposium (pp.
159-173).
Xu, Y., Bailey, M., Jahanian, F., Joshi, K., Hiltunen, M.,
& Schlichting, R. (2011, October). An exploration of
L2 cache covert channels in virtualized environments.
In Proceedings of the 3rd ACM workshop on Cloud
computing security workshop (pp. 29-40). ACM.
Yarom, Y., & Falkner, K. E. (2013). Flush+ Reload: a
High Resolution, Low Noise, L3 Cache Side-Channel
Attack. IACR Cryptology ePrint Archive, 2013, 448.
Zhang, Y., Juels, A., Oprea, A., & Reiter, M. K. (2011,
May). Homealone: Co-residency detection in the cloud
via side-channel analysis. In Security and Privacy
(SP), 2011 IEEE Symposium on (pp. 313-328). IEEE.
Zhang, Y., Juels, A., Reiter, M. K., & Ristenpart, T.
(2012, October). Cross-VM side channels and their
use to extract private keys. In Proceedings of the 2012
ACM conference on Computer and communications
security (pp. 305-316). ACM.
Zhang, Y., Juels, A., Reiter, M. K., & Ristenpart, T.
(2014, November). Cross-tenant side-channel attacks
in paas clouds. In Proceedings of the 2014 ACM
ICISSP 2016 - 2nd International Conference on Information Systems Security and Privacy