Using Tratr to tame Adversarial Synchronization

PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM(2022)

引用 0|浏览7
暂无评分
摘要
We show that Linux containers are vulnerable to a new class of attacks - synchronization attacks - that exploit kernel synchronization to harm application performance, where an unprivileged attacker can control the duration of kernel critical sections to stall victims running in other containers on the same operating system. Furthermore, a subset of these attacks - framing attacks - persistently harm performance by expanding data structures even after the attacker quiesces. We demonstrate three such attacks on the Linux kernel involving the inode cache, the directory cache, and the futex table. We design Tratr, a Linux kernel extension, to detect and mitigate synchronization and framing attacks with low overhead, prevent attacks from worsening, and recover by repairing data structures to their pre-attack state. Using microbenchmarks and real-world workloads, we show that Tratr can detect an attack within seconds and recover instantaneously, guaranteeing similar performance to baseline. Our experiments show that Tratr can detect simultaneous attacks and mitigate them with minimal overhead.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要