Title
AmazonIA: When Elasticity Snaps Back
Abstract
Cloud Computing is an emerging technology promising new business opportunities and easy deployment of web services.\ Much has been written about the risks and benefits of cloud computing in the last years. The literature on clouds often points out security and privacy challenges as the main obstacles, and proposes solutions and guidelines to avoid them. However, most of these works deal with either malicious cloud providers or customers, but ignore the severe threats caused by unaware users.\ In this paper we consider security and privacy aspects of emph{real-life} cloud deployments, independently from malicious cloud providers or customers. We focus on the popular Amazon Elastic Compute Cloud (EC2) and give a detailed and systematic analysis of various crucial vulnerabilities in publicly available and widely used Amazon Machine Images (AMIs) and show how to eliminate them.\ Our Amazon underline{I}mage underline{A}ttacks (AmazonIA) deploy an automated tool that uses only publicly available interfaces and makes emph{no} assumptions on the underlying cloud infrastructure. We were able to extract highly sensitive information (including passwords, keys, and credentials) from a variety of publicly available AMIs. The extracted information allows to (i) start (botnet) instances worth thousands of dollars per day, (ii) provide backdoors into the running machines, (iii) launch impersonation attacks, or (iv) access the source code of the entire web service. Our attacks can be used to completely compromise several real web services offered by companies (including IT-security companies), e.g., for website statistics/user tracking, two-factor authentication, or price comparison. Further, we show mechanisms to identify the AMI of certain running instances.\ Following the maxim ``security and privacy by design'' we show how our automated tools together with changes to the user interface can be used to mitigate our attacks.
Year
DOI
Field
2011
10.1145/2046707.2046753
World Wide Web,Internet privacy,Authentication,Privacy by Design,Computer security,Computer science,Botnet,Cloud computing security,Information sensitivity,Web service,User interface,Cloud computing
DocType
Citations 
PageRank 
Conference
47
1.92
References 
Authors
17
5
Name
Order
Citations
PageRank
Sven Bugiel166538.04
Stefan Nürnberger224912.79
Thomas Pöppelmann335717.96
Ahmad-reza Sadeghi45463334.69
Thomas Schneider5154069.17