1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012...
-
Upload
silvia-arnold -
Category
Documents
-
view
218 -
download
1
Transcript of 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012...
![Page 1: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference.](https://reader035.fdocuments.net/reader035/viewer/2022081516/56649e7a5503460f94b7ab4b/html5/thumbnails/1.jpg)
1
Abusing Cloud-Based Browsers for Fun and
Profit
Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan,Ryan Snyder, Kevin Butler, William Enck
2012 Annual Computer Security Applications Conference
![Page 2: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference.](https://reader035.fdocuments.net/reader035/viewer/2022081516/56649e7a5503460f94b7ab4b/html5/thumbnails/2.jpg)
2
IntroductionApproach overviewBrowser resource limitationsDesigning and scheduling jobsEvaluationDiscussion
Outline
![Page 3: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference.](https://reader035.fdocuments.net/reader035/viewer/2022081516/56649e7a5503460f94b7ab4b/html5/thumbnails/3.jpg)
3
Pay-per-use computationEC2
Cloud-based Web browsersJavaScript executes on the server
Arbitrary general-purpose computation within cloud-based browsers
Browser MapReduce(BMR)Mapper.jsReducer.js
Introduction
![Page 4: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference.](https://reader035.fdocuments.net/reader035/viewer/2022081516/56649e7a5503460f94b7ab4b/html5/thumbnails/4.jpg)
4
Approach overview(1)
![Page 5: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference.](https://reader035.fdocuments.net/reader035/viewer/2022081516/56649e7a5503460f94b7ab4b/html5/thumbnails/5.jpg)
5
Cloud browsers have articial limitationsMappers cannot use local storage to
communicate intermediate resultsBit.ly
Encode URLs up to 2022 characters in lengthRate-limits requests to 99 per IP address per
minute
Job scheduling
Approach overview(2)
![Page 6: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference.](https://reader035.fdocuments.net/reader035/viewer/2022081516/56649e7a5503460f94b7ab4b/html5/thumbnails/6.jpg)
6
BenchmarksComputationElapsed TimeMemory
Cloud browsersAmazon SilkCloud BrowseOpera MiniPuffin
Browser resource limitations
![Page 7: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference.](https://reader035.fdocuments.net/reader035/viewer/2022081516/56649e7a5503460f94b7ab4b/html5/thumbnails/7.jpg)
7
Benchmarks(1)
![Page 8: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference.](https://reader035.fdocuments.net/reader035/viewer/2022081516/56649e7a5503460f94b7ab4b/html5/thumbnails/8.jpg)
8
Benchmarks(2)
![Page 9: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference.](https://reader035.fdocuments.net/reader035/viewer/2022081516/56649e7a5503460f94b7ab4b/html5/thumbnails/9.jpg)
9
Benchmark Results
![Page 10: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference.](https://reader035.fdocuments.net/reader035/viewer/2022081516/56649e7a5503460f94b7ab4b/html5/thumbnails/10.jpg)
10
Map and reduce abstractionScheduling jobsExample applications
Word CountDistributed GrepDistributed Sort
Designing and scheduling jobs
![Page 11: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference.](https://reader035.fdocuments.net/reader035/viewer/2022081516/56649e7a5503460f94b7ab4b/html5/thumbnails/11.jpg)
11
Mapper Abstraction
![Page 12: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference.](https://reader035.fdocuments.net/reader035/viewer/2022081516/56649e7a5503460f94b7ab4b/html5/thumbnails/12.jpg)
12
Reducer Abstraction
![Page 13: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference.](https://reader035.fdocuments.net/reader035/viewer/2022081516/56649e7a5503460f94b7ab4b/html5/thumbnails/13.jpg)
13
To effectively use cloud browser an URL shortening service resource
AssumeInput is divided into a large number of equally
sized filesMapper schedulingReducer scheduling
Scheduling Jobs(1)
![Page 14: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference.](https://reader035.fdocuments.net/reader035/viewer/2022081516/56649e7a5503460f94b7ab4b/html5/thumbnails/14.jpg)
14
Scheduling Jobs(2)
![Page 15: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference.](https://reader035.fdocuments.net/reader035/viewer/2022081516/56649e7a5503460f94b7ab4b/html5/thumbnails/15.jpg)
15
Master determinesMn, the number of mappers to spawnMf, the number of input files to pass to each
mapper
Mapper Scheduling(1)
Assumes fs is several times smaller than bs
![Page 16: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference.](https://reader035.fdocuments.net/reader035/viewer/2022081516/56649e7a5503460f94b7ab4b/html5/thumbnails/16.jpg)
16
Rate limiting of URL shortening services
Bit.lyEncode URLs up to 2022 characters in length, Us =
2022Rate-limits requests to 99 per IP address per
minute, Un = 99
Mapper Scheduling(2)
![Page 17: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference.](https://reader035.fdocuments.net/reader035/viewer/2022081516/56649e7a5503460f94b7ab4b/html5/thumbnails/17.jpg)
17
Application speficbucket in bucket sortPartition in word count
Reducer Scheduling
![Page 18: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference.](https://reader035.fdocuments.net/reader035/viewer/2022081516/56649e7a5503460f94b7ab4b/html5/thumbnails/18.jpg)
18
Word Counthttp://foo.com/?word1=5&word2=7&...
Distributed Grephttp://foo.com/?
bar1.txt=45&bar1.txt=48&bar2.txt=34Distributed Sort
TeraSorthttp://foo.com/?
key1=file1&key2=file2&key3=file3
Example Applications
![Page 19: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference.](https://reader035.fdocuments.net/reader035/viewer/2022081516/56649e7a5503460f94b7ab4b/html5/thumbnails/19.jpg)
19
Experiment setupWord Count
100 most downloaded books from www.gutenberg.com/ebooks/
Distributed GrepIRC logs for the #debian channel
Distributed SortHadoop teragenA 10 character key and an 88 character value
Evaluation
![Page 20: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference.](https://reader035.fdocuments.net/reader035/viewer/2022081516/56649e7a5503460f94b7ab4b/html5/thumbnails/20.jpg)
20
Evaluation - results(1)
![Page 21: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference.](https://reader035.fdocuments.net/reader035/viewer/2022081516/56649e7a5503460f94b7ab4b/html5/thumbnails/21.jpg)
21
Evaluation - results(2)
![Page 22: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference.](https://reader035.fdocuments.net/reader035/viewer/2022081516/56649e7a5503460f94b7ab4b/html5/thumbnails/22.jpg)
22
Recommendations for Cloud Browser ProvidersRate limits on authenticated user
Enhancing BMRUsing multiple cloud browserCombination of URL shortening services
Discussion
![Page 23: 1 Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, William Enck 2012 Annual Computer Security Applications Conference.](https://reader035.fdocuments.net/reader035/viewer/2022081516/56649e7a5503460f94b7ab4b/html5/thumbnails/23.jpg)
23
THE END