Changes between Initial Version and Version 1 of Quarterly-ExptsSec-report-2011a.txt


Ignore:
Timestamp:
03/31/11 20:01:05 (13 years ago)
Author:
hxy@cs.ua.edu
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • Quarterly-ExptsSec-report-2011a.txt

    v1 v1  
     1[[PageOutline]]
     2
     3= ExptsSecurity Project Status Report =
     4
     5'''Period: GEC10 (March) 2011''' [[BR]]
     6
     7== I. Major accomplishments ==
     8
     9=== A. Milestones achieved ===
     10
     11We have been working towards achieving the Milestone ExptsSec:
     12S3.b. We have run some experiments to explore running
     13environment vulnerabilities. The experiments also tried to use
     14two aggregates. Report on the results is submitted at this
     15time, presentations are made at GEC10. The suggestions are made
     16with the experiments in the report. At this moment, we don't
     17see a need to revise the experiment design document. The most
     18issue we have is that some S2 developments were not available
     19when we tried to use them for experiments. We will follow up
     20those in the future. [[BR]]
     21
     22=== B. Deliverables made ===
     23
     24
     25(1) Presentation at GEC10.
     26http://groups.geni.net/geni/attachment/wiki/GEC10-presentation.pdf
     27[[BR]]
     28
     29
     30(2) Dawei Li, Xiaoyan Hong, "Practical Exploitation on System
     31Vulnerability of ProtoGENI", 49th ACM Southeast Conference,
     32March 24-26, 2011, Kennesaw, GA, USA.
     33http://groups.geni.net/geni/attachment/wiki/acmse2011_attachment_52.pdf
     34[[BR]]
     35
     36
     37
     38== II. Description of work performed during last quarter ==
     39
     40=== A. Activities and findings ===
     41
     42Major activities are the experiments that explore
     43vulnerabilities in various areas of GENI/ProtoGENI security. We
     44also read documents to study GENI Spiral 2 results. Our
     45findings are made as deliverables.[[BR]]
     46
     47In addition to the results reported and delivered, there are
     48activities study in progress the following aspects of
     49GENI/ProtoGENI security. 1) Conducting various DoS/DDoS attacks
     50in ProtoGENI. 2) Analysis of GENI/ProtoGENI's authentication
     51and its vulnerabilities. 3) Analysis of GENI/ProtoGENI's access
     52control and its vulnerabilities.[[BR]]
     53
     54In GEC10, we also reported work-in-progress that investigates
     55the interface between experiment environment and the
     56Internet.[[BR]]
     57
     58Our REU students are reading documents about federation and
     59following up new developments in this area.[[BR]]
     60
     61
     62We attended and presented results at GEC10 in March 2011. We
     63interacted with other GENI teams during GEC10 and obtained
     64great feedback from them. Two REU students also attended GEC10
     65and participated in tutorials, demo session, etc. [[BR]]
     66
     67
     68=== B. Project participants ===
     69
     70Xiaoyan Hong (PI) [[BR]]
     71Fei Hu (Co-PI) [[BR]]
     72Yang Xiao (Co-PI) [[BR]]
     73Jingcheng Gao (Graduate student) [[BR]]
     74Dawei Li (Graduate student) [[BR]]
     75Fnu Shalini (Graduate student) [[BR]]
     76Darwin Witt (Undergraduate student) [[BR]]
     77Jason Bowman (Undergraduate student) [[BR]]
     78
     79
     80=== C. Publications (individual and organizational) ===
     81
     82Dawei Li, Xiaoyan Hong, "Practical Exploitation on System
     83Vulnerability of ProtoGENI", 49th ACM Southeast Conference,
     84March 24-26, 2011, Kennesaw, GA, USA. [[BR]]
     85
     86=== D. Outreach activities ===
     87
     88We introduced GENI/ProtoGENI security in a graduate course of
     89security in the Spring 2011 as course projects.
     90
     91
     92
     93=== E. Collaborations ===
     94
     95We participated in Cluter C conference-calls. [[BR]]
     96
     97
     98=== F. Other Contributions ===