Skip to content

Poking Holes in the Cloud

Young man and young woman in computer science laboratoryStealthy students find weaknesses in virtual computing security.

 

The latest revolution in the Information Age is “cloud computing.” The data-crunching power and storage capacity of multiple computers are pooled in an offsite virtual “cloud,” creating a shared resource for users. One example: Instagram, a photo-sharing service.

Cloud computing also allows for complex functions to be processed with lightning speed. It’s especially useful for mobile devices such as smartphones, which have limited power.

Young man and young woman in computer science laboratoryAnd it’s vulnerable to attack by UO undergraduates Ryan Snyder and Hannah Pruse (right).

Both seniors in computer and information science, they’ve become adept at poking holes in the “cloud,” so to speak.

In November, UO researchers announced that, in a joint effort with North Carolina State University, they had found a way to exploit cloud-based web browsers, using them to perform large-scale computing tasks without official access. They showed that third parties could potentially take the free computing power of cloud browsers and use it to crack passwords, thereby gaining stealth access to cloud resources—a finding sure to make industry sit up and take note.

Snyder was a coauthor of the accompanying paper, “Abusing Cloud-Based Browsers for Fun and Profit.” He is skilled at “reverse engineering,” which is the process of discovering the technological principles of a system through analysis of its operation.

Snyder was at a campus job-recruitment event last year when he met Joe Pletcher, a UO graduate teaching fellow involved in the cloud-browser project; Pletcher quickly put Snyder to work unlocking the ways that the browsers under review by the research team talked to each other.

Snyder recalled “a lot of late nights” in Deschutes Hall over a five-month period, laboring to write programs giving him access to the browsers and staring at screens of data incomprehensible even to most computer experts. But it was worth it.

“With regular course work, I feel like it’s jumping through the hoops that everyone has jumped through before you,” he said. “With research, you’re contributing something new, something that hasn’t been done before.”

Pruse had a similar reaction after her first taste of research. After excelling at a classroom project in assistant professor Kevin Butler’s operating systems class in 2011, she was invited by Butler to join his lab, the Oregon Systems Infrastructure Research and Information Security Laboratory.

That fall, Pruse began looking at the potential for sensitive data to be compromised through the sharing of computers that is fundamental to cloud computing. Under a concept called “coresidency,” an untrusted party can be an undetected “resident” on information channels; Pruse orchestrated a number of attacks illustrating that this problem is not isolated but rather “a real threat in the cloud computing model,” as she stated in a paper presented at the 2012 Cloud Computing Security Workshop in Raleigh.

“I’m surprised I could be a part of solving real problems,” Pruse said. “I really enjoyed putting my knowledge to work to benefit the future of information security.”

Computer science and security is a great area for students to explore, Butler said, as industry increasingly focuses on sales and product development while relying on universities for research.

The Oregon CIS department includes three courses that offer academic credit for undergraduate research and numerous professors fund undergraduate work from their research grants. Ten undergraduates have worked in the Network Security Research Laboratory, for example, and at one point the lab even included a student from South Eugene High School who analyzed computer traffic for a year.

Undergraduate research is “almost essential” for students seeking entry to top graduate schools, Butler said. And for talented students such as Snyder and Pruse, the career impact can be even more immediate.

“The company in question on Ryan’s project responded very positively to the study,” Pletcher said. “They said, ‘we’d love to hire you."

—Matt Cooper

photo: Jack Liu

Online Extras

Bee Conservative

A Honeybee pollinating a flowerRead the pollination study and habitat recommendations from the Sustainable Farms team.

Latino Roots

A man and woman in front of a wooden cross atop a mountainWatch student documentaries that trace the path of migration from Latin America to Oregon.

Funding for Student Research

Red laser lights on a black backgroundStudents can apply for fellowships and scholarships (including a full-tuition waiver) to support their work.

Economic Impact

An economics bar graphFrom federal forest payments to the benefits of reading readiness, econ honors projects get real.

Summer Program Leads to Big Award

A young woman SPUR student receives prestigious Howard Hughes Medical Institute Award.