New technology intended to improve the security of cloud computing may still be vulnerable to attacks, according to a new study co-authored by a 麻豆原创 researcher.

Some of the vulnerabilities were detailed in a research presentation at the USENIX Security Symposium on Aug. 15, in Santa Clara, California.

The study examined processor manufacturer AMD鈥檚 Secure Encrypted Virtualization technology, a new advancement, which aims to provide privacy of computation and data in public clouds without needing to trust the cloud service providers and their software so users can experience confidential cloud computing.

鈥淭he goal is to essentially say, 鈥楬ey you don鈥檛 have to trust the cloud computing companies, you can just trust the processor,鈥欌 said Yan Solihin, a professor in 麻豆原创鈥檚 Department of Computer Science who helped co-author the study. 鈥淭hat鈥檚 the promise. What we show in the paper is it鈥檚 not easy to get to that promise.鈥

The lead author of the research paper was Mengyuan Li, a doctoral student in The Ohio State University鈥檚 Department of Computer Science and Engineering. Co-authors also included Zhiqiang Lin and Yinqian Zhang, associate professors in the university鈥檚 Department of Computer Science and Engineering.

The team worked together to discover the vulnerability and demonstrate the proof-of-concept attacks successfully in a lab setting.

鈥淢y student, Mengyuan, put quite a lot of effort in this work,鈥 Zhang said.

Other computer processor companies, such as Intel, also offer similar environments that are walled off from the cloud computing service. AMD鈥檚 processor is unique, however, because it encrypts the entire memory, unlike other processors, where only portions of the memory are encrypted at a time.

This is an added security feature, but also means that the processor is reliant on input and output messages with the cloud computer software, rather than dedicating a portion of encrypted memory for that. It鈥檚 in these incoming and outgoing communications where the vulnerabilities lay, the researchers said.

Other researchers have reported the memory-integrity problems in the processor in the past, but this study was the first to report the vulnerabilities in the input and output operations, along with resulting other problems.

Despite evolving research to improve the security of cloud computing, using those services can be economically beneficial for users and businesses and may even be more secure for businesses that do not have the resources to hire information technology specialists to manage and safeguard their systems, Solihin said.

鈥淭here are risks with putting your information in the cloud, but there are benefits as well,鈥 Solihin said. 鈥淵ou have to consider that. There are a lot of efforts to make your data secure.鈥

The technology from AMD analyzed in the research is still new and not widely deployed, Zhang said. The results of the research have also been relayed to AMD to help them implement fixes in future versions of their processor.

鈥淚 think we are still in the process for this technology to become mature,鈥 Zhang said. 鈥淭he purpose of this study is to inform the vendors to build trusted execution environments to support this secure cloud operation you at least have to consider these types of attacks.鈥欌

Jason Thomas, head of product security at AMD, said this type of research is part of the computing ecosystem that helps improve products.

鈥淎t AMD we are committed to developing technology with high security standards and collaborating with the entire computing ecosystem to help ensure the safety of user information,鈥 Thomas said.

鈥淎MD SEV is a differentiated technology designed to provide advanced protection of memory from inadvertent vulnerabilities in a typical multi-tenant operating environment,鈥 he said. 鈥淲ith the recent introduction of our 2nd Gen EPYC server processors, more virtual machines than ever before can leverage SEV technology 鈥 in combination with solutions designed to guard against malicious attack vectors 鈥 as a foundational tool in their overall virtualization security suite.鈥

Solihin is the director of 麻豆原创鈥檚 Cybersecurity and Privacy Cluster, and the Charles Millican chair of computer science at 麻豆原创. He joined 麻豆原创 in 2018.

The research was supported by National Science Foundation grants, research gifts from Intel and DFINITY as well as from funding from 麻豆原创.