Virtual switches have become popular among cloud operating systems to interconnect virtual machines in a more flexible manner. However, this paper demonstrates that virtual switches introduce new attack surfaces in cloud setups, whose effects can be disastrous. Our analysis shows that these vulnerabilities are caused by: (1) inappropriate security assumptions (privileged virtual switch execution in kernel and user space), (2) the logical centralization of such networks (e.g., OpenStack or SDN), (3) the presence of bi-directional communication channels between data plane systems and the centralized controller, and (4) non-standard protocol parsers. Our work highlights the need to accommodate the data plane(s) in our threat models. In particu...
Abstract: Cloud computing is becoming more and more popular in computing infrastructure and it also ...
Cloud Computing (CC) has become one of the most transformative computing technologies and a key busi...
Combining high-speed network accesses and powerful computer virtualization, cloud computing provides...
Virtual switches have become popular among cloud operating systems to interconnect virtual machines ...
Virtual switches are a crucial component of SDN-based cloud systems, enabling the interconnection of...
In this dissertation we adopt a threat model where the data center network infrastructure is potenti...
Hardware virtualisation is the core technology which enables resource sharing among multiple virtual...
Data privacy and security is a leading concern for providers and customers of cloud computing, where...
Cloud providers attempt to maintain the highest levels of isolation between Virtual Machines (VMs) a...
Enterprises continuously seek innovative approaches to reduce operational computing costs while get...
Abstract — Cloud security is one of most important issues that has attracted a lot of research and d...
Infrastructure as a Service (IaaS) cloud has been attracting more and more customers as it provides ...
Cloud computing enables users to consume various IT resources in an on-demand manner, and with low m...
© 2015 Dr. Yi HanWhile cloud computing has obvious advantages over traditional on-premises computing...
Third-party cloud computing represents the promise of out-sourcing as applied to computation. Servic...
Abstract: Cloud computing is becoming more and more popular in computing infrastructure and it also ...
Cloud Computing (CC) has become one of the most transformative computing technologies and a key busi...
Combining high-speed network accesses and powerful computer virtualization, cloud computing provides...
Virtual switches have become popular among cloud operating systems to interconnect virtual machines ...
Virtual switches are a crucial component of SDN-based cloud systems, enabling the interconnection of...
In this dissertation we adopt a threat model where the data center network infrastructure is potenti...
Hardware virtualisation is the core technology which enables resource sharing among multiple virtual...
Data privacy and security is a leading concern for providers and customers of cloud computing, where...
Cloud providers attempt to maintain the highest levels of isolation between Virtual Machines (VMs) a...
Enterprises continuously seek innovative approaches to reduce operational computing costs while get...
Abstract — Cloud security is one of most important issues that has attracted a lot of research and d...
Infrastructure as a Service (IaaS) cloud has been attracting more and more customers as it provides ...
Cloud computing enables users to consume various IT resources in an on-demand manner, and with low m...
© 2015 Dr. Yi HanWhile cloud computing has obvious advantages over traditional on-premises computing...
Third-party cloud computing represents the promise of out-sourcing as applied to computation. Servic...
Abstract: Cloud computing is becoming more and more popular in computing infrastructure and it also ...
Cloud Computing (CC) has become one of the most transformative computing technologies and a key busi...
Combining high-speed network accesses and powerful computer virtualization, cloud computing provides...