Bit of a Close Talker: A Practical Guide to Serverless Cloud Co-Location Attacks
By: Wei Shao , Najmeh Nazari , Behnam Omidi and more
Potential Business Impact:
Finds ways hackers can spy on cloud programs.
Serverless computing has revolutionized cloud computing by offering an efficient and cost-effective way for users to develop and deploy applications without managing infrastructure details. However, serverless cloud users remain vulnerable to various types of attacks, including micro-architectural side-channel attacks. These attacks typically rely on the physical co-location of victim and attacker instances, and attackers will need to exploit cloud schedulers to achieve co-location with victims. Therefore, it is crucial to study vulnerabilities in serverless cloud schedulers and assess the security of different serverless scheduling algorithms. This study addresses the gap in understanding and constructing co-location attacks in serverless clouds. We present a comprehensive methodology to uncover exploitable features in serverless scheduling algorithms and devise strategies for constructing co-location attacks through normal user interfaces. In our experiments, we successfully reveal exploitable vulnerabilities and achieve instance co-location on prevalent open-source infrastructures and Microsoft Azure Functions. We also present a mitigation strategy to defend against co-location attacks in serverless clouds. Our work highlights critical areas for security enhancements in current cloud schedulers, offering insights to fortify serverless computing environments against potential co-location attacks.
Similar Papers
The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment
Cryptography and Security
Finds hidden dangers in code-sharing websites.
Towards Energy-Efficient Serverless Computing with Hardware Isolation
Distributed, Parallel, and Cluster Computing
Saves energy by giving each task its own tiny computer.
Security Vulnerabilities in Quantum Cloud Systems: A Survey on Emerging Threats
Cryptography and Security
Secures powerful quantum computers for everyone.