CMSC 491A/691A- Spring 2004

Project

Overview


As discussed in class, we will do projects in groups of 2 students where possible. Each group can either select their own topic with the consent of the instructor, or select from one of the options listed below and described in class. In each instance, the expectations from 491A enrollees is that they will either develop a tool to implement some known attack, or where such tools are available, tweak/improve/experiment with them. The expectation bar is higher for 691A enrollees, who are expected at least develop new tools, and perhaps even look for new vulnerabilities. Depending on project needs, appropriate equipment in the Cyberdefense Lab may be used. The suggested topics include
  1. Breaking WEP/WPA/802.11i
  2. Attacking Bluetooth
  3. Securing Ad-Hoc Networks -- IDS, Secure Routing
  4. Developing trust relationships in Ad-Hoc networks
  5. Policy Driven Security and Privacy -- Improving Peer-Peer data sharing systems
  6. Distributed Intrusion Detection

Documents  (10 points)

Please note that pdf, ps and text (formatted to 72 columns) are the only formats we will accept.
  • On or before March 7th, you will submit (electronically) a document detailing your proposal, assumptions you have made, experiments you plan to run and a plan of execution (including a proposed timeline). This should be emailed to instructor with the subject  " Project Proposal".
  • On March 19th, and April 20th you will submit a brief  reports of your progress to date, changes in the design if any, as well as an updated timeline. Again, this will be via email , with the subject "[First|Second]Project Report".
  • The project report detailing your work (the system design, experimental studies etc.) as well as submission of your code, will be due in a similar manner - emailed with subject as "Final Report". Code should be attached as a tarred, gzipped file. This will be due by May 10th 
  • You will also arrange to demonstrate your project to the instructor between May 3rd and May 10th.

  • You are allowed and encouraged to discuss the project across groups. Clearly, you are not allowed to share solutions. You may read papers and textbooks in this area as well -- some pointers are provided in the reference list. However, you should cite the sources you have consulted when documenting your project.  


    Anupam Joshi
    Last modified: Tue Mar 2 11:10:46 EST 2004