- Ziqiao Zhou, Yizhou Shan, Weidong Cui, Xinyang Ge, Marcus Peinado, Andrew Baumann. Core slicing: Closing the gap between leaky confidential {VMs} and bare-metal cloud. In , 2023.
Observation
- Observed that typical cloud VMs run with a static allocation of memory and discrete cores, and increasingly rely on I/O offload.
- Cloud providers do not exploit the full complexity enabled by hypervisor-based virtual machines for IaaS workloads.
- Core: VMs offered by major public cloud providers including Amazon and Azure are sized at core granularity and scheduled on distinct physical cores
- Memory: the memory allocated to guest VMs is static; techniques such as memory ballooning or transparent page sharing are avoided
 
- cloud providers limit oversubscription to only their own (first-party) VMs or disable it entirely
Goal
- 
Remove hypervisor from the trusted computing base. 
- 
Instead, run confidential VMs on bare metal hardware. 
- 
Core slicing enables multiple untrusted guest OSes to run on shared bare-metal hardware. 
- 
To ensure isolation without the complexity of virtualization, guests take static slice of a machine’s cores, memory and virtual I/O devices. 
- 
🙂 Bare metal cloud servers can avoid hypervisor-level side channel attacks. 
- 
☹️ No virtualization. Cannot benefit from virtualization techniques.