- About us
- Code of Conduct
- Google SoC
- Recent posts
- Security Workshops
After another great year of Google Summer of Code 2013 and another 14 successful student projects, The Honeynet Project and students world-wide were eagerly waiting to hear if Google would decide to run GSoC again. 2014 marks a special milestone as the 10th year of GSoC, so Google broke from tradition and announced the GSoC 2014 program dates in early October, before the GSoC 2013 Mentors Summit (which our members once again enjoyed attending and contributing to). Hopefully the past decade of GSoC success means great things for open source, interested students and the Honeynet Project once again this summer!
We really enjoyed our experience as a successful mentoring organization in Google Summer of Code 2009, Google Summer of Code 2010, Google Summer of Code 2011, Google Summer of Code 2012 and Google Summer of Code 2013 so we are very happy to announce that we have once again applied to participate as a mentoring organization in GSoC 2014.
Google will be reviewing Org applications over the coming days then announcing the official list of participating mentoring Orgs for GSoC 2014 on their official blog on 19:00 UTC on Monday February 24th. Usually 300-500 potential mentoring organizations apply, with only 150-200 lucky Orgs being selected. In the mean time, potential mentoring orgs will be improving their project ideas, preparing mentors, fielding student questions and keeping their fingers crossed in the hope of being selected.
Potential GSoC students and other interested parties view our still under development list of possible project ideas and potential mentors. As in previous years, this list of proposed project ideas is not definitive and (assuming we get selected to participate) will remain a work in progress until GSoC 2014 student applications officially start on March 10th. We are also still open to receiving and mentoring interesting and novel project ideas received from students, including informal contact before official student applications begin. We will also probably post a public survey link here and on our main blog to allow anyone interested to suggest project ideas too. So if there is a research topic you are interested in working on this summer, please suggest it, or get in touch to discuss it further.
The third and fourth milestones GSoC 2014 milestones (after Org application and Org selection) will be student applications and acceptance. GSoC 2014 student applications begins on March 10th at 19:00 UTC and closed on March 21st at 19:00 UTC. These dates are over a month earlier than last year, meaning that the GSoC 2014 timeline looks quite different to previous years, so please make sure you check the official GSoC 2014 timeline carefully if you plan on applying.
To avoid disappointment and missed deadlines, if you are a student applying to GSoC this year, please make sure you submit your student application well in advance and don't leave it to the last minute! A good idea is to begin talking to us as soon as Google announces the official list of GSoC 2014 mentoring orgs (ie from February 24th). The sooner is usually the better, although since GSoC is highly competitive for both students and Orgs, we obviously cannot guarantee we will be selected to participate this year. Please bear that in mind when making contact.
On April 21st Google will officially announce the list of approximately 1000 lucky students who will be accepted to participate in GSoC 2014. We very much hope that many of you reading this page will be amongst that number and about to start working for the summer on another exciting information security project with The Honeynet Project.
You can find our in progress GSoC 2014 ideas page here:
Often students ask us what kind of projects we are likely to be offering in a coming year. If you want to get an idea of the kind of projects ideas we proposed and the accepted projects we ran during GSoC 2009-2013, you can view these here:
* GSoC 2013 Project Ideas
* GSoC 2013 Accepted Projects
* GSoC 2012 Project Ideas
* GSoC 2012 Accepted Projects
* GSoC 2011 Project Ideas
* GSoC 2011 Accepted Projects
* GSoC 2010 Project Ideas
* GSoC 2010 Accepted Projects
* GSoC 2009 Project Ideas
* GSoC 2009 Accepted Projects
If you are wondering what participating in GSoC as a student with the Honeynet Project feels like, you can read last year's weekly student blogs to find out more about their experiences:
You could also watch previous students Sebastien Popleau present on his Ghost USB Honeypot, Claudio Guarnieri present on Cuckoo sandbox or Maximilian Hills talk on using his HoneyProxy for man-in-the-middle traffic analysis at recent public workshops.
If you have any questions, please drop by in our #gsoc-honeynet IRC channel on irc.freenode.net and say "hi" (note you may need to idle there for a few hours before you get an answer to a specific question, as our members do have to sleep and come from timezones all over the world, so please be patient and wait a few hours before chasing a response).
We still have our public mailing list for interested prospective GSoC students to get in touch and discuss project ideas for GSoC with the Honeynet Project - see https://public.honeynet.org/mailman/listinfo/gsoc for details. Please sign up if you have any questions about getting involved with the Honeynet Project in GSoC 2014.
Our GSoC 2014 organisational administrators this year are:
So with the US, Europe and Asia covered we can hopefully offer students and mentors round the clock support again this year!
You can find copies of recent presentations by our Chief Research Officer David Watson on our achievements during GSoC 2009 to GSoC 2012 or GSoC 2009 and GSoC 2010, which hopefully provide a good introduction to the Honeynet Project and our collective activities from recent GSoCs. You can also read/watch David's presentations from two of our recent annual workshops in the San Francisco Bay Area (2012) or Paris (2011) too.
To get a feel for how previous successful GSoC student projects are advancing our knowledge and capabilities and generating benefits in the read world, see:
* Threatpost: Android reverse engineering toolset
* SC Magazine: Cuckoo and Malwr.com open source sandbox
* Dark Reading: Simplifying Android malware analysis
* SANS: Forensic challenges and Android malware
* Dark Reading: Honeysink for sinkholing botnets
* Dark Reading: Studying stealthy attacks
* Dark Reading: Web vulnerability honeypots
GSoC is not the only way you can become involved in the with honeynet technologies and open source software - check out our current or historic series of forensic challenges. Or learn more about the practical, real world application of honeynet technology in our popular series of "Know Your Enemy" whitepapers, which now include projects and tools output from previous GSoCs students or mentors such as PicViz, Glastopf, Qebek or Conficker.