Check out the new USENIX Web site.
CSET '10 Banner

WiPs Session Abstracts

Secure Home Networks
Back to List of Accepted WiPs
Currently working on a secure home network prototype that allows home appliances to be controlled by a smartphone (Android). The working prototype is capable of communicating with the home devices through both power lines and Wifi. The idea behind the prototype is to securely control and communicate with home appliances using a single mobile platform such as Android. The current working prototype supports Wifi enabled devices and Insteon devices. We are currently developing a credential exchange app that will complement the already-built system, and will allow the house owners to securely share credentials with third-party users with restricted access controls. Work on granular access controls and device update will later follow.

The DETER Project: Advancing the Science of Cyber Security Experimentation and Test
Back to List of Accepted WiPs
The next generation of DETER envisions a major advance in testbed design for improved testbed usability and experimental validity, and for increased size, complexity, and diversity of experiments. The advanced conceptual testbed design will stretch the envelope of testbed technologies and methodologies to influence the direction of future network testbed design. It will also provide an increasingly sophisticated and capable experimental platform as a shared service for a growing set of users, enabling world-class cyber security research. This talk will describe the DETER testbed, and our new efforts aimed at advancing the science of cyber security experimentation.

Experiences with the cyber-DEfense Technology Experimental Research (DETER) Testbed
Back to List of Accepted WiPs
In this talk, I will present my experiences at Pacific Northwest National Laboratory (Summer 2010) related to setting a DETER testbed and connecting it to other DETER testbeds. I will also briefly present the requirements that must be met in order to be able to simulate attacks within the DETER testbed that include: DDoS, worms, and routing protocols.

Control System Emulation Using the DETER Testbed: Determining the Effects of Gain on Control System Stability
Back to List of Accepted WiPs
Control systems are an integral aspect of modern industrial architecture. These systems often regulate critical infrastructures, such as power plants, traffic control systems, security systems, flight control systems, or a wide range of other potentially mission critical systems. Using the DETER testbed, a networked control system (NCS) was emulated over the Abilene network topology. Next, the behavior was simulated using an ordinary differential equation (ODE), and we ran experiments varying the gain to determine its influence on the control signal and how it relates to plant stability. Results show that the aggressiveness of the control signal is paramount in determining the relative stability of the control system.  

Simulating the Internet: Possible, Useful?
Back to List of Accepted WiPs
This talk explores the idea that many cybersecurity research questions need some kind of a live Internet model. There is very little data about the Internet and it takes a lot of time to develop simulations that reproduce it faithfully and quickly enough. I'm interested in building a simulation framework for Internet-scale events. New data could be "sucked into" this framework from various sources, thus representing the  picture of an Internet at a given time. I'm looking for feedback how possible/useful this would be, how people would interact with this framework, etc.

GENI: Global Environment for Network Innovations
Back to List of Accepted WiPs
The talk will provide a brief update on the status of the GENI suite of infrastructures and invite workshop participants to use GENI for their experiments.

A Simple Trustworthy Protocol For Limited Resources Computing Devices
Back to List of Accepted WiPs
Emerging wireless communication technology allow communication between computing devices with limited processing, storage, and bandwidth capability. We propose a public key distribution protocol called simple trustworthy protocol (STP) for wireless peer-to-peer communication. STP hides particular public parameters (such as the prime numbers) and introduces the concept of randomization of the public parameters at the expense reducing key size to minimize communication overhead.

Cyber Scientific Method
Back to List of Accepted WiPs
Lockheed Martin is developing a Cyber Scientific Method (CSM) as part of its work on Phase II of DARPA's National Cyber Range program. The CSM is a formalized yet practical process to facilitate design and execution of sound cyber tests on precisely constructed testbeds using the FACTR tools that automate many of the core testing processes and procedures in the cyber domain, including testbed creation, verification and validation, monitoring, data collection, load and user behavior modeling, testbed reconfiguration & reconstitution and execution without loss of precision or fidelity.

?Need help? Use our Contacts page.

Last changed: 3 Aug. 2010 ch