New technology intended to improve the security of cloud computing may still be vulnerable to attacks, according to a new study co-authored by a University of Central Florida researcher.

Some of the vulnerabilities were detailed in a research presentation at the USENIX Security Symposium on Aug. 15, in Santa Clara, California.

The study examined processor manufacturer AMD’s Secure Encrypted Virtualization technology, a new advancement, which aims to provide privacy of computation and data in public clouds without needing to trust the cloud service providers and their software so users can experience confidential cloud computing.

“The goal is to essentially say, ‘Hey you don’t have to trust the cloud computing companies, you can just trust the processor,’” said Yan Solihin, a professor in UCF’s Department of Computer Science who helped co-author the study. “That’s the promise. What we show in the paper is it’s not easy to get to that promise.”

The lead author of the research paper was Mengyuan Li, a doctoral student in The Ohio State University’s Department of Computer Science and Engineering. Co-authors also included Zhiqiang Lin and Yinqian Zhang, associate professors in the university’s Department of Computer Science and Engineering.

The team worked together to discover the vulnerability and demonstrate the proof-of-concept attacks successfully in a lab setting.

“My student, Mengyuan, put quite a lot of effort in this work,” Zhang said.

Other computer processor companies, such as Intel, also offer similar environments that are walled off from the cloud computing service. AMD’s processor is unique, however, because it encrypts the entire memory, unlike other processors, where only portions of the memory are encrypted at a time.

This is an added security feature, but also means that the processor is reliant on input and output messages with the cloud computer software, rather than dedicating a portion of encrypted memory for that. It’s in these incoming and outgoing communications where the vulnerabilities lay, the researchers said.

Other researchers have reported the memory-integrity problems in the processor in the past, but this study was the first to report the vulnerabilities in the input and output operations, along with resulting other problems.

Despite evolving research to improve the security of cloud computing, using those services can be economically beneficial for users and businesses and may even be more secure for businesses that do not have the resources to hire information technology specialists to manage and safeguard their systems, Solihin said.

“There are risks with putting your information in the cloud, but there are benefits as well,” Solihin said. “You have to consider that. There are a lot of efforts to make your data secure.”

The technology from AMD analyzed in the research is still new and not widely deployed, Zhang said. The results of the research have also been relayed to AMD to help them implement fixes in future versions of their processor.

“I think we are still in the process for this technology to become mature,” Zhang said. “The purpose of this study is to inform the vendors to build trusted execution environments to support this secure cloud operation you at least have to consider these types of attacks.’”

Jason Thomas, head of product security at AMD, said this type of research is part of the computing ecosystem that helps improve products.

“At AMD we are committed to developing technology with high security standards and collaborating with the entire computing ecosystem to help ensure the safety of user information,” Thomas said.

“AMD SEV is a differentiated technology designed to provide advanced protection of memory from inadvertent vulnerabilities in a typical multi-tenant operating environment,” he said. “With the recent introduction of our 2nd Gen EPYC server processors, more virtual machines than ever before can leverage SEV technology – in combination with solutions designed to guard against malicious attack vectors – as a foundational tool in their overall virtualization security suite.”

Solihin is the director of UCF’s Cybersecurity and Privacy Cluster, and the Charles Millican chair of computer science at UCF. He joined UCF in 2018.

The research was supported by National Science Foundation grants, research gifts from Intel and DFINITY as well as from funding from UCF.