Difference between revisions of "Linux Security Summit 2012/Schedule"
Jump to navigation
Jump to search
JamesMorris (talk | contribs) |
JamesMorris (talk | contribs) |
||
(40 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
= Overview = | |||
This is the schedule for the [[Linux_Security_Summit_2012|Linux Security Summit 2012]], to be held in San Diego on August 30th and 31st, 2012. | This is the schedule for the [[Linux_Security_Summit_2012|Linux Security Summit 2012]], to be held in San Diego on August 30th and 31st, 2012. | ||
The summit this year will be a two-day event, co-located with [https://events.linuxfoundation.org/events/linuxcon/ LinuxCon] | The summit this year will be a two-day event, co-located with [https://events.linuxfoundation.org/events/linuxcon/ LinuxCon]. | ||
== Meeting Room == | |||
The summit will be held in the '''Executive Center 4''' room on the first floor. | |||
= Program = | |||
== Day 1 (30th Aug) == | |||
=== Presentations === | |||
{| border="1" cellpadding="6" cellspacing="0" | |||
!Time | |||
!Title | |||
!Presenter | |||
|- | |||
|09:00 | |||
| <span style="color:navy">'''Keynote Talk: UEFI Secure Boot'''</span> [http://kernsec.org/files/security_summit_uefi_2012.odp (slides)] | |||
| [http://mjg59.dreamwidth.org/ Matthew Garrett], Red Hat | |||
|- | |||
|''09:50'' | |||
|colspan="2"|''break'' | |||
|- | |||
|10:00 | |||
| [[Linux_Security_Summit_2012/Abstracts/Reshetova|Bootstrapping the Policies for LSMs for Native and Web Applications]] [http://kernsec.org/files/LinuxSecuritySummit2012_rpm.pdf (slides)] | |||
| Elena Reshetova, Intel | |||
|- | |||
|10:45 | |||
| [[Linux_Security_Summit_2012/Abstracts/Wouters|DNSSEC: The Shiny New Cryptographically Secured Globally Distributed Database ]] [http://kernsec.org/files/LinuxCon2012-DNSSEC.pdf (slides)] | |||
| Paul Wouters, Red Hat | |||
|- | |||
|''11:30'' | |||
|colspan="2"|''break'' | |||
|- | |||
| 11:45 | |||
| [[Linux_Security_Summit_2012/Abstracts/Walsh|Linux Sandbox Version II - Sandboxing Server Applications]] [http://kernsec.org/files/securelinuxcontainers.pdf (slides)] | |||
| Dan Walsh, Red Hat | |||
|- | |||
|''12:30'' | |||
|colspan="2" |''lunch (self-funded at nearby location)'' | |||
|- | |||
| 13:30 | |||
| [[Linux_Security_Summit_2012/Abstracts/Kasatkin|Upcoming Extensions to the Linux kernel Integrity Subsystem (IMA/EVM)]] [http://kernsec.org/files/Integrity_Protection_LSS_2012.pdf (slides)] | |||
| Dmitry Kasatkin, Intel | |||
|- | |||
| 14:15 | |||
| [[Linux_Security_Summit_2012/Abstracts/Steffen|The Linux Integrity Subsystem and TPM-based Network Endpoint Assessment]] [http://kernsec.org/files/LSS_2012_strongSwan_IMA_slides.pdf (slides)] [http://kernsec.org/files/LSS_2012_strongSwan_IMA.pdf (paper)] | |||
| Andreas Steffen, University of Applied Sciences Rapperswil | |||
|- | |||
|''15:00'' | |||
|colspan="2"|''break'' | |||
|- | |||
| 15:15 | |||
| [[Linux_Security_Summit_2012/Abstracts/Smalley|Middleware MAC for Android]] [http://kernsec.org/files/LSS2012-MiddlewareMAC.pdf (slides)] | |||
| Stephen Smalley, National Security Agency | |||
|- | |||
| 16:00 | |||
| [[Linux_Security_Summit_2012/Abstracts/Handa|CaitSith: A New Type of Rule Based In-kernel Access Control]] [http://kernsec.org/files/CaitSith-en.pdf (slides)] | |||
| Tetsuo Handa, NTT | |||
|- | |||
| 16:45 | |||
| [[Linux_Security_Summit_2012/Abstracts/Cook|Finding Kernel Vulnerabilities Using Coccinelle]] [http://kernsec.org/files/Coccinelle.pdf (slides)] | |||
| Kees Cook, Google | |||
|- | |||
|''17:15'' | |||
|colspan="2"|''finish'' | |||
|} | |||
== Day 2 (31st Aug) == | |||
=== Kernel Security Subsystem Updates === | |||
{| border="1" cellpadding="6" cellspacing="0" | |||
!Time | |||
!Title | |||
!Presenter | |||
|- | |||
|09:00 | |||
| '''Cryptography''' [http://kernsec.org/files/crypto-201208.odp (slides)] | |||
| Herbert Xu, Red Hat | |||
|- | |||
|09:20 | |||
| '''AppArmor''' [http://kernsec.org/files/apparmor-update.odp (slides)] | |||
| John Johansen, Canonical | |||
|- | |||
|09:40 | |||
| '''Key Management''' | |||
| David Howells, Red Hat | |||
|- | |||
|''10:00'' | |||
|colspan="2"|''break'' | |||
|- | |||
|10:20 | |||
| '''SELinux''' | |||
| Eric Paris, Red Hat | |||
|- | |||
|10:40 | |||
| '''Integrity''' [http://kernsec.org/files/LSS-2012-integrity.odp (slides)] | |||
| Mimi Zohar, IBM | |||
|- | |||
|11:00 | |||
| '''TOMOYO''' | |||
| Tetsuo Handa, NTT | |||
|- | |||
|''11:20'' | |||
|colspan="2"|''break'' | |||
|- | |||
|11:40 | |||
| '''Smack''' [http://kernsec.org/files/SmackLinuxSecuritySummit2012.pdf (slides)] | |||
| Casey Schaufler, Intel | |||
|- | |||
|12:00 | |||
| '''Yama''' [http://kernsec.org/files/yama.pdf (slides)] | |||
| Kees Cook, Google | |||
|- | |||
|''12:20'' | |||
|colspan="2" |''lunch (self-funded at nearby location)'' | |||
|} | |||
=== Lightning Talks === | |||
If you wish to add a breakout session topic, email the program committee, or propose a topic on the day. Space is limited. | |||
{| border="1" cellpadding="6" cellspacing="0" | |||
!Time | |||
!Topic | |||
!Speaker | |||
|- | |||
|rowspan="1"|14:00 | |||
| Trinity: Linux system call fuzzing | |||
| Dave Jones, Red Hat | |||
|} | |||
=== Breakout Sessions === | |||
Freeform track for smaller groups to collaborate on specific issues. If you wish to add a breakout session topic, email the program committee. | |||
{| border="1" cellpadding="6" cellspacing="0" | |||
!Time | |||
!Details | |||
!Leader | |||
|- | |||
|14:30 | |||
| [[Linux_Security_Summit_2012/Abstracts/Bryant|LF Linux Security Workgroup BOF]] | |||
| Corey Bryant, IBM | |||
|- | |||
|17:00 | |||
|colspan="2"|Breakout session reports | |||
|- | |||
|''17:30'' | |||
|colspan="2"|''finish'' | |||
|} |
Latest revision as of 00:59, 12 September 2012
Overview
This is the schedule for the Linux Security Summit 2012, to be held in San Diego on August 30th and 31st, 2012.
The summit this year will be a two-day event, co-located with LinuxCon.
Meeting Room
The summit will be held in the Executive Center 4 room on the first floor.
Program
Day 1 (30th Aug)
Presentations
Day 2 (31st Aug)
Kernel Security Subsystem Updates
Time | Title | Presenter |
---|---|---|
09:00 | Cryptography (slides) | Herbert Xu, Red Hat |
09:20 | AppArmor (slides) | John Johansen, Canonical |
09:40 | Key Management | David Howells, Red Hat |
10:00 | break | |
10:20 | SELinux | Eric Paris, Red Hat |
10:40 | Integrity (slides) | Mimi Zohar, IBM |
11:00 | TOMOYO | Tetsuo Handa, NTT |
11:20 | break | |
11:40 | Smack (slides) | Casey Schaufler, Intel |
12:00 | Yama (slides) | Kees Cook, Google |
12:20 | lunch (self-funded at nearby location) |
Lightning Talks
If you wish to add a breakout session topic, email the program committee, or propose a topic on the day. Space is limited.
Time | Topic | Speaker |
---|---|---|
14:00 | Trinity: Linux system call fuzzing | Dave Jones, Red Hat |
Breakout Sessions
Freeform track for smaller groups to collaborate on specific issues. If you wish to add a breakout session topic, email the program committee.
Time | Details | Leader |
---|---|---|
14:30 | LF Linux Security Workgroup BOF | Corey Bryant, IBM |
17:00 | Breakout session reports | |
17:30 | finish |