Secure networked applications

Fraida Fund

The exercises in this experiment will focus on the confidentiality of network services - to what extent are services that offer remote login, file transfer, or web access, protected from disclosure to unauthorized individuals? In particular, we will consider confidentiality with respect to malicious users who might be eavesdropping on network traffic.

You can run this experiment on GENI, Cloudlab, FABRIC, or Chameleon!

Secure networked applications


This material is based upon work supported by the National Science Foundation under Grant No. 2231984.

Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.