Proceedings 2022 Network and Distributed System Security Symposium 2022
DOI: 10.14722/ndss.2022.23149
|View full text |Cite
|
Sign up to set email alerts
|

Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks

Abstract: Cloud computing paradigms have emerged as a major facility to store and process the massive data produced by various business units, public organizations, Internet-of-Things (IoT), and cyber-physical systems (CPS). To meet users' performance requirements while maximizing resource utilization to achieve cost-efficiency, cloud administrators leverage schedulers to orchestrate tasks to different physical nodes and allow applications from different users to share the same physical node. On the other hand, micro-ar… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 42 publications
0
1
0
Order By: Relevance
“…The goal of such attacks is to distribute malicious container images by exploiting the potential typos made by container users. Similarly, there exist attacks whereby the goal of adversaries is to influence the scheduler to co-locate the attacker's application with a targeted victim applications [28,29]. It is worth mentioning that co-location is an important prerequisite to perform certain attacks like Rowhammer [30], Spectre [31] or Meltdown [32].…”
Section: Threat Modelmentioning
confidence: 99%
“…The goal of such attacks is to distribute malicious container images by exploiting the potential typos made by container users. Similarly, there exist attacks whereby the goal of adversaries is to influence the scheduler to co-locate the attacker's application with a targeted victim applications [28,29]. It is worth mentioning that co-location is an important prerequisite to perform certain attacks like Rowhammer [30], Spectre [31] or Meltdown [32].…”
Section: Threat Modelmentioning
confidence: 99%
“…Primarily cloud computing enables software developers to delegate infrastructure maintenance and operational responsibilities to cloud providers so enabling them to concentrate exclusively on the core business logic of their programs [24]. Additionally, the platform operates on a pay-peruse framework, wherein users are solely billed in accordance with the amount of resources they utilize [25]. At now, serverless computing is available in two distinct variations, namely backend as a service (BaaS) and function as a service (FaaS) [26].…”
Section: Introductionmentioning
confidence: 99%