| 1 | [[PageOutline]] |
| 2 | |
| 3 | = ExptsSecurity Project Status Report = |
| 4 | |
| 5 | '''Period: GEC10 (March) 2011''' [[BR]] |
| 6 | |
| 7 | == I. Major accomplishments == |
| 8 | |
| 9 | === A. Milestones achieved === |
| 10 | |
| 11 | We have been working towards achieving the Milestone ExptsSec: |
| 12 | S3.b. We have run some experiments to explore running |
| 13 | environment vulnerabilities. The experiments also tried to use |
| 14 | two aggregates. Report on the results is submitted at this |
| 15 | time, presentations are made at GEC10. The suggestions are made |
| 16 | with the experiments in the report. At this moment, we don't |
| 17 | see a need to revise the experiment design document. The most |
| 18 | issue we have is that some S2 developments were not available |
| 19 | when we tried to use them for experiments. We will follow up |
| 20 | those in the future. [[BR]] |
| 21 | |
| 22 | === B. Deliverables made === |
| 23 | |
| 24 | |
| 25 | (1) Presentation at GEC10. |
| 26 | http://groups.geni.net/geni/attachment/wiki/GEC10-presentation.pdf |
| 27 | [[BR]] |
| 28 | |
| 29 | |
| 30 | (2) Dawei Li, Xiaoyan Hong, "Practical Exploitation on System |
| 31 | Vulnerability of ProtoGENI", 49th ACM Southeast Conference, |
| 32 | March 24-26, 2011, Kennesaw, GA, USA. |
| 33 | http://groups.geni.net/geni/attachment/wiki/acmse2011_attachment_52.pdf |
| 34 | [[BR]] |
| 35 | |
| 36 | |
| 37 | |
| 38 | == II. Description of work performed during last quarter == |
| 39 | |
| 40 | === A. Activities and findings === |
| 41 | |
| 42 | Major activities are the experiments that explore |
| 43 | vulnerabilities in various areas of GENI/ProtoGENI security. We |
| 44 | also read documents to study GENI Spiral 2 results. Our |
| 45 | findings are made as deliverables.[[BR]] |
| 46 | |
| 47 | In addition to the results reported and delivered, there are |
| 48 | activities study in progress the following aspects of |
| 49 | GENI/ProtoGENI security. 1) Conducting various DoS/DDoS attacks |
| 50 | in ProtoGENI. 2) Analysis of GENI/ProtoGENI's authentication |
| 51 | and its vulnerabilities. 3) Analysis of GENI/ProtoGENI's access |
| 52 | control and its vulnerabilities.[[BR]] |
| 53 | |
| 54 | In GEC10, we also reported work-in-progress that investigates |
| 55 | the interface between experiment environment and the |
| 56 | Internet.[[BR]] |
| 57 | |
| 58 | Our REU students are reading documents about federation and |
| 59 | following up new developments in this area.[[BR]] |
| 60 | |
| 61 | |
| 62 | We attended and presented results at GEC10 in March 2011. We |
| 63 | interacted with other GENI teams during GEC10 and obtained |
| 64 | great feedback from them. Two REU students also attended GEC10 |
| 65 | and participated in tutorials, demo session, etc. [[BR]] |
| 66 | |
| 67 | |
| 68 | === B. Project participants === |
| 69 | |
| 70 | Xiaoyan Hong (PI) [[BR]] |
| 71 | Fei Hu (Co-PI) [[BR]] |
| 72 | Yang Xiao (Co-PI) [[BR]] |
| 73 | Jingcheng Gao (Graduate student) [[BR]] |
| 74 | Dawei Li (Graduate student) [[BR]] |
| 75 | Fnu Shalini (Graduate student) [[BR]] |
| 76 | Darwin Witt (Undergraduate student) [[BR]] |
| 77 | Jason Bowman (Undergraduate student) [[BR]] |
| 78 | |
| 79 | |
| 80 | === C. Publications (individual and organizational) === |
| 81 | |
| 82 | Dawei Li, Xiaoyan Hong, "Practical Exploitation on System |
| 83 | Vulnerability of ProtoGENI", 49th ACM Southeast Conference, |
| 84 | March 24-26, 2011, Kennesaw, GA, USA. [[BR]] |
| 85 | |
| 86 | === D. Outreach activities === |
| 87 | |
| 88 | We introduced GENI/ProtoGENI security in a graduate course of |
| 89 | security in the Spring 2011 as course projects. |
| 90 | |
| 91 | |
| 92 | |
| 93 | === E. Collaborations === |
| 94 | |
| 95 | We participated in Cluter C conference-calls. [[BR]] |
| 96 | |
| 97 | |
| 98 | === F. Other Contributions === |