Difference between revisions of "Linux Security Summit 2014"
JamesMorris (talk | contribs) (New page: =Description= The Linux Security Summit (LSS) is a technical forum for collaboration between Linux developers, researchers, and end users. Its primary aim is to foster community efforts ...) |
JamesMorris (talk | contribs) |
||
(33 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
=Description= | = Description = | ||
The Linux Security Summit (LSS) is a technical forum for collaboration | The Linux Security Summit (LSS) is a technical forum for collaboration | ||
Line 11: | Line 11: | ||
* Breakout development sessions | * Breakout development sessions | ||
= Event = | |||
= | The Linux Security Summit for 2014 will be held across '''18 and 19 August''' | ||
in Chicago, USA. It will be co-located with [https://events.linuxfoundation.org/events/linuxcon LinuxCon], along with the Kernel Summit and other events. | |||
All attendees and presenters must be registered to attend LinuxCon. | |||
'''The venue location is the 2nd Floor, "Superior" room A/B''' | |||
= Schedule = | |||
== Day 1 (Monday 18th August) == | |||
{| border="1" cellpadding="6" cellspacing="0" | |||
!Time | |||
!Title | |||
!Presenter | |||
|- | |||
|09:00 | |||
| <span style="color:navy">'''Keynote Talk: Security and Boundaries'''</span> '''([http://www.hansenpartnership.com/SecuritySummit2014/ slides]) ([http://lwn.net/Articles/609003/ LWN coverage])''' | |||
| [http://www.linux.com/news/special-feature/linux-developers/678568-30-linux-kernel-developers-in-30-weeks-james-bottomley James Bottomley], Parallels | |||
|- | |||
|''09:50'' | |||
|colspan="2"|''Break'' | |||
|- | |||
|10:00 | |||
| [[Linux_Security_Summit_2014/Abstracts/Cook_1|Verified Component Firmware]] ''([http://kernsec.org/files/lss2014/cook_firmware.pdf slides])'' | |||
| Kees Cook, Google | |||
|- | |||
|10:45 | |||
| [[Linux_Security_Summit_2014/Abstracts/Smalley|Protecting the Android TCB with SELinux]] ''([http://kernsec.org/files/lss2014/lss2014_androidtcb_smalley.pdf slides]) ([http://lwn.net/Articles/609511/ LWN coverage])'' | |||
| Stephen Smalley, NSA | |||
|- | |||
|''11:30'' | |||
|colspan="2"|''Break'' | |||
|- | |||
|11:45 | |||
| [[Linux_Security_Summit_2014/Abstracts/Schaufler|Tizen, Security and the Internet of Things]] ''([http://kernsec.org/files/lss2014/schaufler_201408-LinuxSecuritySummit-Tizen.pdf slides])'' | |||
| Casey Schaufler, Intel | |||
|- | |||
|''12:30'' | |||
|colspan="2"|''Lunch (self-funded at a nearby location)'' | |||
|- | |||
|14:00 | |||
| [[Linux_Security_Summit_2014/Abstracts/Drysdale|Capsicum on Linux]] ''([http://kernsec.org/files/lss2014/drysdale_CapsicumLSSSlides.pdf slides])'' | |||
| David Drysdale, Google | |||
|- | |||
|14:45 | |||
| [[Linux_Security_Summit_2014/Abstracts/Kurmus|Quantifying and Reducing the Kernel Attack Surface]] ''([http://kernsec.org/files/lss2014/kurmus_quantify_reduce_kernel_attack_surface.pdf slides])'' | |||
| Anil Kurmus, IBM | |||
|- | |||
|''15:30'' | |||
|colspan="2"|''Break'' | |||
|- | |||
|15:45 | |||
| [[Linux_Security_Summit_2014/Abstracts/Safford|Extending the Linux Integrity Subsystem for TCB Protection]] ''([http://kernsec.org/files/lss2014/safford_tcb_integrity.pdf slides])'' | |||
| David Safford & Mimi Zohar, IBM | |||
|- | |||
|16:30 | |||
| [[Linux_Security_Summit_2014/Abstracts/Cook_2|Trusted Kernel Lock-down Patch Series]] -- discussion ''([http://kernsec.org/files/lss2014/cook_lockdown.pdf slides])'' | |||
| Kees Cook, Google | |||
|- | |||
|''17:00'' | |||
|colspan="2"|''Finish'' | |||
|} | |||
== Day 2 (Tuesday 19th August) == | |||
{| border="1" cellpadding="6" cellspacing="0" | |||
!Time | |||
!Title | |||
!Presenter | |||
|- | |||
|09:00 | |||
| SELinux update ''([http://kernsec.org/files/lss2014/lss-state_of_selinux-pmoore-082014-r1.pdf slides])'' | |||
| Paul Moore, Red Hat | |||
|- | |||
|09:20 | |||
| AppArmor update ''([http://kernsec.org/files/lss2014/hicks_lss-2014-apparmor-review.pdf slides])'' | |||
| Tyler Hicks, Canonical | |||
|- | |||
|09:40 | |||
| Integrity update ''([http://kernsec.org/files/lss2014/zohar_LSS2014-LinuxIntegritySubsystem-status.pdf slides])'' | |||
| Mimi Zohar, IBM | |||
|- | |||
|10:00 | |||
| Smack update ''([http://kernsec.org/files/lss2014/schaufler_201408-LinuxSecuritySummit-Smack.pdf slides])'' | |||
| Casey Schaufler, Intel | |||
|- | |||
|''10:20'' | |||
|colspan="2"|''Break'' | |||
|- | |||
|10:30 | |||
| Crypto update ''([http://kernsec.org/files/lss2014/xu-crypto-201408.odp slides])'' | |||
| Herbert Xu, Red Hat | |||
|- | |||
|10:50 | |||
| Seccomp update ''([http://kernsec.org/files/lss2014/cook_seccomp.pdf slides])'' | |||
| Kees Cook, Google | |||
|- | |||
|11:20 | |||
|colspan="2"| Break-out Session #1 | |||
|- | |||
|''12:30'' | |||
|colspan="2"|''Lunch (self-funded at a nearby location)'' | |||
|- | |||
|14:00 | |||
| [[Linux_Security_Summit_2014/Abstracts/Halcrow|EXT4 Encryption]] - discussion ''([http://kernsec.org/files/lss2014/Halcrow_EXT4_Encryption.pdf slides])'' | |||
| Michael Halcrow & Ted Ts'o, Google | |||
|- | |||
|''15:00'' | |||
| colspan="2"|''Break'' | |||
|- | |||
|15:15 | |||
| [[Linux_Security_Summit_2014/Abstracts/Hallyn|Application Confinement with User Namespaces]] ''([http://kernsec.org/files/lss2014/hallyn_namespaces.pdf slides])'' | |||
| Serge Hallyn & Stéphane Graber, Canonical | |||
|- | |||
|16:00 | |||
|colspan="2"| Break-out Session #2 | |||
|- | |||
|''17:00'' | |||
|colspan="2"|''Finish'' | |||
|} | |||
= Call for Participation = | |||
'''The CFP is now closed.''' | |||
The program committee <s>currently seeks</s> sought proposals for: | |||
* Refereed Presentations: 45 minutes in length, including at least 10 minutes of discussion. Papers are encouraged. | |||
* Discussion Topics: 30 minutes in length. | |||
Topic areas include, but are not limited to: | |||
* System hardening | |||
* Access control | |||
* Cryptography | |||
* Integrity control | |||
* Hardware security | |||
* Networking | |||
* Storage | |||
* Virtualization | |||
* Desktop | |||
* Tools | |||
* Management | |||
* Case studies | |||
* Emerging technologies, threats & techniques | |||
Proposals should be submitted in plain text via email to the program | |||
committee at: lss-pc (_at_) ext.namei.org | |||
Abstracts should be approximately 150 words in total. | |||
= Program Committee= | = Program Committee= | ||
Line 38: | Line 185: | ||
* Mimi Zohar, IBM | * Mimi Zohar, IBM | ||
The program committee may be contacted as a group via email: lss-pc | The program committee may be contacted as a group via email: lss-pc [at] lists.linuxfoundation.org |
Latest revision as of 01:22, 5 September 2014
Description
The Linux Security Summit (LSS) is a technical forum for collaboration between Linux developers, researchers, and end users. Its primary aim is to foster community efforts in analyzing and solving Linux security challenges.
The format of the summit will be:
- Refereed presentations
- Subsystem updates
- Breakout development sessions
Event
The Linux Security Summit for 2014 will be held across 18 and 19 August in Chicago, USA. It will be co-located with LinuxCon, along with the Kernel Summit and other events.
All attendees and presenters must be registered to attend LinuxCon.
The venue location is the 2nd Floor, "Superior" room A/B
Schedule
Day 1 (Monday 18th August)
Time | Title | Presenter |
---|---|---|
09:00 | Keynote Talk: Security and Boundaries (slides) (LWN coverage) | James Bottomley, Parallels |
09:50 | Break | |
10:00 | Verified Component Firmware (slides) | Kees Cook, Google |
10:45 | Protecting the Android TCB with SELinux (slides) (LWN coverage) | Stephen Smalley, NSA |
11:30 | Break | |
11:45 | Tizen, Security and the Internet of Things (slides) | Casey Schaufler, Intel |
12:30 | Lunch (self-funded at a nearby location) | |
14:00 | Capsicum on Linux (slides) | David Drysdale, Google |
14:45 | Quantifying and Reducing the Kernel Attack Surface (slides) | Anil Kurmus, IBM |
15:30 | Break | |
15:45 | Extending the Linux Integrity Subsystem for TCB Protection (slides) | David Safford & Mimi Zohar, IBM |
16:30 | Trusted Kernel Lock-down Patch Series -- discussion (slides) | Kees Cook, Google |
17:00 | Finish |
Day 2 (Tuesday 19th August)
Time | Title | Presenter |
---|---|---|
09:00 | SELinux update (slides) | Paul Moore, Red Hat |
09:20 | AppArmor update (slides) | Tyler Hicks, Canonical |
09:40 | Integrity update (slides) | Mimi Zohar, IBM |
10:00 | Smack update (slides) | Casey Schaufler, Intel |
10:20 | Break | |
10:30 | Crypto update (slides) | Herbert Xu, Red Hat |
10:50 | Seccomp update (slides) | Kees Cook, Google |
11:20 | Break-out Session #1 | |
12:30 | Lunch (self-funded at a nearby location) | |
14:00 | EXT4 Encryption - discussion (slides) | Michael Halcrow & Ted Ts'o, Google |
15:00 | Break | |
15:15 | Application Confinement with User Namespaces (slides) | Serge Hallyn & Stéphane Graber, Canonical |
16:00 | Break-out Session #2 | |
17:00 | Finish |
Call for Participation
The CFP is now closed.
The program committee currently seeks sought proposals for:
- Refereed Presentations: 45 minutes in length, including at least 10 minutes of discussion. Papers are encouraged.
- Discussion Topics: 30 minutes in length.
Topic areas include, but are not limited to:
- System hardening
- Access control
- Cryptography
- Integrity control
- Hardware security
- Networking
- Storage
- Virtualization
- Desktop
- Tools
- Management
- Case studies
- Emerging technologies, threats & techniques
Proposals should be submitted in plain text via email to the program
committee at: lss-pc (_at_) ext.namei.org
Abstracts should be approximately 150 words in total.
Program Committee
The Linux Security Summit for 2014 is organized by:
- James Morris, Oracle
- Serge Hallyn, Canonical
- Paul Moore, Red Hat
- Stephen Smalley, NSA
- Joshua Brindle, Quark Security
- Herbert Xu, Red Hat
- John Johansen, Canonical
- Kees Cook, Google
- Casey Schaufler, Intel
- Mimi Zohar, IBM
The program committee may be contacted as a group via email: lss-pc [at] lists.linuxfoundation.org