| 1 | [[PageOutline]] |
| 2 | |
| 3 | = ExptsSecurity Project Status Report = |
| 4 | |
| 5 | '''Period: GEC11 (July) 2011''' [[BR]] |
| 6 | |
| 7 | == I. Major accomplishments == |
| 8 | |
| 9 | === A. Milestones achieved === |
| 10 | |
| 11 | We delivered the report as stated in the Milestone ExptsSec: |
| 12 | S3.c before GEC11. The report summarized the experiments to |
| 13 | explore vulnerabilities in different layers of the GENI |
| 14 | security model. Some of the experiments are published in |
| 15 | Globecom 2011. The related suggestions are made with the |
| 16 | experiments. We are continuing experiments that follow up the |
| 17 | current development of the ProtoGENI for next Milestone. [[BR]] |
| 18 | |
| 19 | |
| 20 | === B. Deliverables made === |
| 21 | |
| 22 | (1) Report for the Milestone ExptsSec: S3.c. |
| 23 | http://groups.geni.net/geni/attachment/wiki/ExptsSec-milestone-s3c.pdf |
| 24 | [[BR]] |
| 25 | |
| 26 | |
| 27 | (2) Dawei Li, Xiaoyan Hong, "Evaluation of Security |
| 28 | Vulnerabilities by Using ProtoGENI as a Launchpad", IEEE |
| 29 | Globecom 2011, Houston, USA, Dec. 2011. |
| 30 | http://groups.geni.net/geni/attachment/wiki/Globecom11-ProtoGENI-cr.pdf |
| 31 | [[BR]] |
| 32 | |
| 33 | |
| 34 | |
| 35 | == II. Description of work performed during last quarter == |
| 36 | |
| 37 | === A. Activities and findings === |
| 38 | |
| 39 | |
| 40 | Major activities are the experiments that explore |
| 41 | vulnerabilities in different layers of the GENI/ProtoGENI |
| 42 | security model. We also read documents to study GENI Spiral 2 |
| 43 | and Spiral 3 results. Our findings are made as deliverables. We |
| 44 | are continuing running experiments that follow up the current |
| 45 | development of the ProtoGENI for next Milestone. [[BR]] |
| 46 | |
| 47 | |
| 48 | Our REU students have read documents about federation and |
| 49 | followed up new developments in this area. They also |
| 50 | participated in experiments and contributed to the writings of |
| 51 | the delivered reports and papers. [[BR]] |
| 52 | |
| 53 | |
| 54 | We participated in GEC11 in July 2011. We discussed our work |
| 55 | with other GENI teams and Dr Vicraj Thomas, and obtained great |
| 56 | feedback from them. We also attended related tracks and |
| 57 | sessions. [[BR]] |
| 58 | |
| 59 | |
| 60 | === B. Project participants === |
| 61 | |
| 62 | Xiaoyan Hong (PI) [[BR]] Fei Hu (Co-PI) [[BR]] Yang Xiao |
| 63 | (Co-PI) [[BR]] Bo Fu (Graduate student) [[BR]] Jingcheng Gao |
| 64 | (Graduate student) [[BR]] Bo Gu (Graduate student) [[BR]] |
| 65 | Mohammed Hoque (Graduate student) [[BR]] Dawei Li (Graduate |
| 66 | student) [[BR]] Darwin Witt (Undergraduate student) [[BR]] |
| 67 | Jason Bowman (Undergraduate student) [[BR]] |
| 68 | |
| 69 | |
| 70 | === C. Publications (individual and organizational) === |
| 71 | |
| 72 | Dawei Li, Xiaoyan Hong, "Evaluation of Security Vulnerabilities |
| 73 | by Using ProtoGENI as a Launchpad", IEEE Globecom 2011, |
| 74 | Houston, USA, Dec. 2011. [[BR]] |
| 75 | |
| 76 | === D. Outreach activities === |
| 77 | |
| 78 | We introduced GENI/ProtoGENI security in a graduate course of |
| 79 | security in the Spring 2011 as course projects. |
| 80 | |
| 81 | |
| 82 | === E. Collaborations === |
| 83 | |
| 84 | We participated in Cluter C conference-calls. [[BR]] |
| 85 | |
| 86 | |
| 87 | === F. Other Contributions === |