| 1 | [[PageOutline]] |
| 2 | |
| 3 | = ExptsSecurity Project Status Report = |
| 4 | |
| 5 | '''Period: GEC16 (March 19-21) 2013''' [[BR]] |
| 6 | |
| 7 | == I. Major accomplishments == |
| 8 | |
| 9 | === A. Milestones achieved === |
| 10 | |
| 11 | No milestone was set for this time period. All the milestones were achieved by GEC15 report, with deliverables made, see the Milestone ExptsSec:S4.d. [[BR]] |
| 12 | |
| 13 | |
| 14 | === B. Deliverables made === |
| 15 | |
| 16 | == II. Description of work performed during last quarter == |
| 17 | |
| 18 | === A. Activities and findings === |
| 19 | Major activities are education related and publication related. We used ProtoGENI in a graduate course of distributed systems during 2013 spring semester. [[BR]] |
| 20 | |
| 21 | There were research activities by Dr Hong on the control plane of software defined networks. |
| 22 | |
| 23 | A paper was accepted by IEEE System Journal. In the paper we introduced our experimental study on the vulnerability of ProtoGENI and considerations on mitigating strategies. [[BR]] |
| 24 | |
| 25 | === B. Project participants === |
| 26 | |
| 27 | Xiaoyan Hong (PI) [[BR]] Fei Hu (Co-PI) [[BR]] Yang Xiao |
| 28 | (Co-PI) [[BR]] |
| 29 | |
| 30 | === C. Publications (individual and organizational) === |
| 31 | |
| 32 | Dawei Li, Xiaoyan Hong, Darwin Witt, “ProtoGENI, a Prototype GENI under Security Vulnerabilities: An Experiment-Based Security Study”, IEEE Systems Journal, special issue on Security and Privacy of Complex Systems, accepted for publication, 2012. [[BR]] |
| 33 | |
| 34 | |
| 35 | === D. Outreach activities === |
| 36 | |
| 37 | |
| 38 | === E. Collaborations === |
| 39 | |
| 40 | |
| 41 | === F. Other Contributions === |