LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

Timing Channel in IaaS: How to Identify and Investigate

Photo by hannahrdg from unsplash

Recently, the Infrastructure as a Service Cloud (IaaS) (e.g., Amazon EC2) has been widely used by many organizations. However, some IaaS security issues create serious threats to its users. A… Click to show full abstract

Recently, the Infrastructure as a Service Cloud (IaaS) (e.g., Amazon EC2) has been widely used by many organizations. However, some IaaS security issues create serious threats to its users. A typical issue is the timing channel. This kind of channel can be a cross-VM information channel, as proven by many researchers. Owing to the fact that it is covert and traceless, the traditional identification methods cannot build an accurate analysis model and obtain a compromised result. We investigated the underlying behavior of the timing channel from the perspective of the memory activity records and summarized the signature of the timing channel in the underlying memory activities. An identification method based on the long-term behavior signatures was proposed. We proposed a complete set of forensics steps including evidence extraction, identification, record reserve, and evidence reports. We studied four typical timing channels, and the experiments showed that these channels can be detected and investigated, even with the disturbances from normal processes.

Keywords: channel iaas; timing channel; iaas identify; timing; identify investigate

Journal Title: IEEE Access
Year Published: 2019

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.