23
Abusing Cloud-Based Browsers for Fun and Profit 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 012 Annual Computer Security Applications Conference

1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference

Embed Size (px)

Citation preview

Page 1: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference

1

Abusing Cloud-Based Browsers for Fun and

Profit

Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan,Ryan Snyder, Kevin Butler, William Enck

2012 Annual Computer Security Applications Conference

Page 2: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference

2

IntroductionApproach overviewBrowser resource limitationsDesigning and scheduling jobsEvaluationDiscussion

Outline

Page 3: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference

3

Pay-per-use computationEC2

Cloud-based Web browsersJavaScript executes on the server

Arbitrary general-purpose computation within cloud-based browsers

Browser MapReduce(BMR)Mapper.jsReducer.js

Introduction

Page 4: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference

4

Approach overview(1)

Page 5: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference

5

Cloud browsers have articial limitationsMappers cannot use local storage to

communicate intermediate resultsBit.ly

Encode URLs up to 2022 characters in lengthRate-limits requests to 99 per IP address per

minute

Job scheduling

Approach overview(2)

Page 6: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference

6

BenchmarksComputationElapsed TimeMemory

Cloud browsersAmazon SilkCloud BrowseOpera MiniPuffin

Browser resource limitations

Page 7: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference

7

Benchmarks(1)

Page 8: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference

8

Benchmarks(2)

Page 9: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference

9

Benchmark Results

Page 10: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference

10

Map and reduce abstractionScheduling jobsExample applications

Word CountDistributed GrepDistributed Sort

Designing and scheduling jobs

Page 11: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference

11

Mapper Abstraction

Page 12: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference

12

Reducer Abstraction

Page 13: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference

13

To effectively use cloud browser an URL shortening service resource

AssumeInput is divided into a large number of equally

sized filesMapper schedulingReducer scheduling

Scheduling Jobs(1)

Page 14: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference

14

Scheduling Jobs(2)

Page 15: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference

15

Master determinesMn, the number of mappers to spawnMf, the number of input files to pass to each

mapper

Mapper Scheduling(1)

Assumes fs is several times smaller than bs

Page 16: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference

16

Rate limiting of URL shortening services

Bit.lyEncode URLs up to 2022 characters in length, Us =

2022Rate-limits requests to 99 per IP address per

minute, Un = 99

Mapper Scheduling(2)

Page 17: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference

17

Application speficbucket in bucket sortPartition in word count

Reducer Scheduling

Page 18: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference

18

Word Counthttp://foo.com/?word1=5&word2=7&...

Distributed Grephttp://foo.com/?

bar1.txt=45&bar1.txt=48&bar2.txt=34Distributed Sort

TeraSorthttp://foo.com/?

key1=file1&key2=file2&key3=file3

Example Applications

Page 19: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference

19

Experiment setupWord Count

100 most downloaded books from www.gutenberg.com/ebooks/

Distributed GrepIRC logs for the #debian channel

Distributed SortHadoop teragenA 10 character key and an 88 character value

Evaluation

Page 20: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference

20

Evaluation - results(1)

Page 21: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference

21

Evaluation - results(2)

Page 22: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference

22

Recommendations for Cloud Browser ProvidersRate limits on authenticated user

Enhancing BMRUsing multiple cloud browserCombination of URL shortening services

Discussion

Page 23: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference

23

THE END