The following are a number of attacks on high performance clusters running Linux developed at the Center for Computer Security Research at Mississippi State University. Each attack is demonstrated with a proof-of-concept C exploit (using the MPI/PRO libraries), and a set of data files that describe the execution of the attack on a research cluster.
Do not run these attacks on any production machine or cluster. Experiment with them only in an controlled environment where you will not disrupt normal operations of your organization.
From this page, you may browse publications that are related to this research, view the source code of the proof-of-concept attacks that have been developed and data sets that have been generated in the progress of this study.
For questions regarding the attacks and data on this page, or the web site, email firstname.lastname@example.org
Questions and comments about this web site may be directed to the webmaster at email@example.com