Advanced Technology Group
in the Corporate Strategy Office

On the Universally Composable Security of OpenStack

Hoda Maleki (University of Connecticut); Kyle Hogan (MIT); Reza Rahaeimehr (University of Connecticut); Ran Canetti, Mayank Varia, Jason Hennessey (Boston University and NetApp); Marten van Dijk (University of Connecticut); Haibin Zhang (UMBC)

Specifically, this work concentrates on the high-level struc-ture of OpenStack, leaving the further formalization and moredetailed analysis of specific OpenStack services to future work.Specifically, we formulate ideal functionalities that correspond tosome of the core OpenStack modules, and then proves securityof the overall OpenStack protocol given the ideal components.

FlexGroup Volumes: A Distributed WAFL File System

Ram Kesavan, Google; Jason Hennessey, Richard Jernigan, Peter Macko, Keith A. Smith, Daniel Tennant, and Bharadwaj V. R., NetApp

2019 USENIX Annual Technical Conference

More Publications

Peter Desnoyers, Northeastern University – November 2019

Zoned namespace SSDs: Challenges and Opportunities

Zoned NameSpaces (ZNS) are a mechanism proposed in the NVM Express Workgroup to provide features and functionality similar to that of Open Channel SSD, but fully integrated with the NVMe model using a zone concept similar to that in the ZAC/ZBD extensions for SMR disk. The goals of this research are to investigate applications for ZNS SSD, in particular (a) RAID-like functionality over ZNS SSD, (b) strategies for file system support for ZNS, and (c) interfaces and strategies for direct application usage of ZNS SSD.

Jian Huang, University of Illinois at Urbana-Champaign – October 2018

Hardware-Assisted Secure Flash-Based Storage

Modern storage systems have been developed for decades with the security-critical foundation provided by operating system (OS). However, they are still vulnerable to malware attacks and software defects. Adversaries can obtain the OS kernel privilege or leverage software vulnerabilities to bypass, terminate or destroy current malware detection and defense systems. For instance, encryption ransomware accounts for more than half of all malware attacks today, but current software-based defense systems often fail to enable the victims to say no to ransom collectors. Therefore, it is natural to utilize hardware techniques which have been proven effective in defending against malware attacks.

More Fellowships