Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hyojeong Lee is active.

Publication


Featured researches published by Hyojeong Lee.


high performance distributed computing | 2011

InContext: simple parallelism for distributed applications

Sunghwan Yoo; Hyojeong Lee; Charles Edwin Killian; Milind Kulkarni

As networking services, such as DHTs, provide increasingly complex functionality, providing acceptable performance will require parallelizing their operations on individual nodes. Unfortunately, the event-driven style in which these applications have traditionally been written makes it difficult to reason about parallelism, and providing safe, efficient parallel implementations of distributed systems remains a challenge. In this paper, we introduce a declarative programming model based on contexts, which allows programmers to specify the sharing behavior of event handlers. Programs that adhere to the programming model can be safely parallelized according to an abstract execution model, with parallel behavior that is well-defined with respect to the expected sequential behavior. The declarative nature of the programming model allows conformance to be captured as a safety property that can be verified using a model checker. We develop a prototype implementation of our abstract execution model and show that distributed applications written in our programming model can be automatically and efficiently parallelized. To recover additional parallelism, we present an optimization to the implementation based on state snapshots that permits more events to proceed in parallel. We evaluate our prototype implementation through several case studies and demonstrate significant speedup over optimized sequential implementations.


dependable systems and networks | 2015

Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations

Samuel Jero; Hyojeong Lee; Cristina Nita-Rotaru

We present a new method for finding attacks in unmodified transport protocol implementations using the specification of the protocol state machine to reduce the search space of possible attacks. Such reduction is obtained by appling malicious actions to all packets of the same type observed in the same state instead of applying them to individual packets. Our method requires knowledge of the packet formats and protocol state machine. We demonstrate our approach by developing SNAKE, a tool that automatically finds performance and resource exhaustion attacks on unmodified transport protocol implementations. SNAKE utilizes virtualization to run unmodified implementations in their intended environments and network emulation to create the network topology. SNAKE was able to find 9 attacks on 2 transport protocols, 5 of which we believe to be unknown in the literature.


international conference on distributed computing systems | 2014

Turret: A Platform for Automated Attack Finding in Unmodified Distributed System Implementations

Hyojeong Lee; Jeff Seibert; Endadul Hoque; Charles Edwin Killian; Cristina Nita-Rotaru

Security and performance are critical goals for distributed systems. The increased design complexity, incomplete expertise of developers, and limited functionality of existing testing tools often result in bugs and vulnerabilities that prevent implementations from achieving their design goals in practice. Many of these bugs, vulnerabilities, and misconfigurations manifest after the code has already been deployed making the debugging process difficult and costly. In this paper, we present Turret, a platform for automatically finding performance attacks in unmodified implementations of distributed systems. Turret does not require the user to provide any information about vulnerabilities and runs the implementation in the same operating system setup as the deployment, with an emulated network. Turret uses a new attack finding algorithm and several optimizations that allow it to find attacks in a matter of minutes. We ran Turret on 5 different distributed system implementations specifically designed to tolerate insider attacks, and found 30 performance attacks, 24 of which were not previously reported to the best of our knowledge.


IEEE ACM Transactions on Networking | 2016

Automated Adversarial Testing of Unmodified Wireless Routing Implementations

Endadul Hoque; Hyojeong Lee; Rahul Potharaju; Charles Edwin Killian; Cristina Nita-Rotaru

Numerous routing protocols have been designed and subjected to model checking and simulations. However, model checking the design or testing the simulator-based prototype of a protocol does not guarantee that the implementation is free of bugs and vulnerabilities. Testing implementations beyond their basic functionality (also known as adversarial testing) can increase protocol robustness. We focus on automated adversarial testing of real-world implementations of wireless routing protocols. In our previous work we created Turret, a platform that uses a network emulator and virtualization to test unmodified binaries of general distributed systems. Based on Turret, we create Turret-W designed specifically for wireless routing protocols. Turret-W includes new functionalities such as differentiating routing messages from data messages to enable evaluation of attacks on the control plane and the data plane separately, support for several additional protocols (e.g., those that use homogeneous/heterogenous packet formats, those that run on geographic forwarding (not just IP), those that operate at the data link layer instead of the network layer), support for several additional attacks (e.g., replay attacks) and for establishment of adversarial side-channels that allow for collusion. Turret-W can test not only general routing attacks, but also wireless specific attacks such as wormhole. Using Turret-W on publicly available implementations of five representative routing protocols, we (re-)discovered 37 attacks and 3 bugs. All these bugs and 5 of the total attacks were not previously reported to the best of our knowledge.


ACM Transactions on Information and System Security | 2015

Gatling: Automatic Performance Attack Discovery in Large-Scale Distributed Systems

Hyojeong Lee; Jeff Seibert; Dylan Fistrovic; Charles Edwin Killian; Cristina Nita-Rotaru

In this article, we propose Gatling, a framework that automatically finds performance attacks caused by insider attackers in large-scale message-passing distributed systems. In performance attacks, malicious nodes deviate from the protocol when sending or creating messages, with the goal of degrading system performance. We identify a representative set of basic malicious message delivery and lying actions and design a greedy search algorithm that finds effective attacks consisting of a subset of these actions. Although lying malicious actions are protocol dependent, requiring the format and meaning of messages, Gatling captures them without needing to modify the target system by using a type-aware compiler. We have implemented and used Gatling on nine systems, a virtual coordinate system, a distributed hash table lookup service and application, two multicast systems and one file sharing application, and three secure systems designed specifically to tolerate insiders, two based on virtual coordinates and one using Outlier Detection, one invariant derived from physical laws, and the last one a Byzantine resilient replication system. We found a total of 48 attacks, with the time needed to find each attack ranging from a few minutes to a few hours.


network and distributed system security symposium | 2012

Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems.

Hyojeong Lee; Jeff Seibert; Charles Edwin Killian; Cristina Nita-Rotaru


annual information security symposium | 2012

Gatling: automatic attack discovery in large-scale distributed systems

Hyojeong Lee; Jeff Seibert; Charles Edwin Killian; Cristina Nita-Rotaru


teragrid conference | 2011

Enabling online geospatial isotopic model development and analysis

Hyojeong Lee; Lan Zhao; Gabriel J. Bowen; Christopher C Miller; Ajay Kalangi; Tonglin Zhang; Jason B. West


annual information security symposium | 2013

A platform for finding attacks in unmodified implementations of intrusion tolerant systems

Hyojeong Lee; Jeff Seibert; Endadul Hoque; Charles Edwin Killian; Cristina Nita-Rotaru


Archive | 2016

A Testing Platform for Teaching Secure Distributed Systems Programming

Endadul Hoque; Hyojeong Lee; Charles Edwin Killian; Cristina Nita-Rotaru

Collaboration


Dive into the Hyojeong Lee's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge