Hey, You, Get Off of My Cloud : Exploring Information Leakage in Third-Party Compute Clouds. Yan Qiang , 2009-1-7. Conference & Authors. CCS 09’ University of California, San Diego , USA Thomas Ristenpart, Hovav Shacham, Stefan Savage Massachusetts Institute of Technology, Cambridge , USA
Yan Qiang, 2009-1-7
*Extra Price will be charged for the amount of data transfer IN/OUT.
Different availability zones use different IP regions.
Each instance has one internal IP and one external IP. Both are static.
External IP: 18.104.22.168
External Name: ec2-75-101-210-100.computer-1.amazonaws.com
Internal IP: 10.252.146.52
Internal Name: domU-12-31-38-00-8D-C6.computer-1.internal
The same instance type within the same zone uses similar IP regions even for different accounts.
Mapping decision heuristic:
A /24 inherits any included sampled instance type.
A /24 containing a Dom0 IP address only contains Dom0 IP address.
All /24’s between two consecutive Dom0 /24’s inherit the former’s associated type.
*/24 is a subnet whose netmask is 255.255.255.0.
Forty M1.small victims launched by two accounts.
(a third account for co-resident exploits)
Increased time lag after victim launched does not affect too much when exact region and instance type are known in the experiments.
Placement locality has a strong impact.