Difference between revisions of "Linux Security Summit 2015/Schedule"
Jump to navigation
Jump to search
JamesMorris (talk | contribs) |
JamesMorris (talk | contribs) |
||
(34 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
= Schedule = | = Schedule = | ||
Note: LSS will be held in the '''Jefferson Room, 4th Floor, Union St Tower''' | |||
== Day 1 (Thursday 20th August) == | == Day 1 (Thursday 20th August) == | ||
Line 13: | Line 16: | ||
|- | |- | ||
|09:05 | |09:05 | ||
| '''<span style="color:navy">Keynote:</span> Giant Bags of Mostly Water - Securing your IT Infrastructure by Securing your Team''' | | '''<span style="color:navy">Keynote:</span>''' Giant Bags of Mostly Water - Securing your IT Infrastructure by Securing your Team ''([http://kernsec.org/files/lss2015/giant-bags-of-mostly-water.pdf slides])'' | ||
| [[Linux_Security_Summit_2015/Bio/Kon|Konstantin Ryabitsev, Linux Foundation]] (see also [https://www.linux.com/news/featured-blogs/200-libby-clark/814542-15-reddit-ama-questions-for-kernelorg-sysadmin-konstantin-ryabitsev Reddit AMA]) | | [[Linux_Security_Summit_2015/Bio/Kon|Konstantin Ryabitsev, Linux Foundation]] (see also [https://www.linux.com/news/featured-blogs/200-libby-clark/814542-15-reddit-ama-questions-for-kernelorg-sysadmin-konstantin-ryabitsev Reddit AMA]) | ||
|- | |- | ||
Line 20: | Line 23: | ||
|- | |- | ||
|10:00 | |10:00 | ||
| [[Linux_Security_Summit_2015/Abstracts/Wettstein|CC3: An Identity Attested Linux Security Supervisor Architecture]] | | [[Linux_Security_Summit_2015/Abstracts/Wettstein|CC3: An Identity Attested Linux Security Supervisor Architecture]] ''([http://kernsec.org/files/lss2015/idfusion-iso-identity-slides.pdf slides], [http://kernsec.org/files/lss2015/idfusion-iso-identity-paper.pdf paper])'' | ||
| [[Linux_Security_Summit_2015/Bio/Wettstein|Greg Wettstein, IDfusion]] | | [[Linux_Security_Summit_2015/Bio/Wettstein|Greg Wettstein, IDfusion]] | ||
|- | |- | ||
|10:45 | |10:45 | ||
| [[Linux_Security_Summit_2015/Abstracts/Smalley|SELinux in Android Lollipop and Android M]] | | [[Linux_Security_Summit_2015/Abstracts/Smalley|SELinux in Android Lollipop and Android M]] ''([http://kernsec.org/files/lss2015/lss2015_selinuxinandroidlollipopandm_smalley.pdf slides])'' | ||
| [[Linux_Security_Summit_2015/Bio/Smalley|Stephen Smalley, NSA]] | | [[Linux_Security_Summit_2015/Bio/Smalley|Stephen Smalley, NSA]] | ||
|- | |- | ||
Line 31: | Line 34: | ||
|- | |- | ||
|11:45 | |11:45 | ||
| [[Linux_Security_Summit_2015/Abstracts/ | |[[Linux_Security_Summit_2015/Abstracts/Moore|Discussion: Rethinking Audit]] ''([http://kernsec.org/files/lss2015/lss-audit_rework-pmoore-082015-r2.pdf slides])'' | ||
| [[Linux_Security_Summit_2015/Bio/ | |[[Linux_Security_Summit_2015/Bio/Moore|Paul Moore, Red Hat]] | ||
|- | |- | ||
|''12:45'' | |''12:45'' | ||
Line 38: | Line 41: | ||
|- | |- | ||
|14:00 | |14:00 | ||
|[[Linux_Security_Summit_2015/Abstracts/Reshetova|Assembling Secure OS Images]] | |[[Linux_Security_Summit_2015/Abstracts/Reshetova|Assembling Secure OS Images]] ''([http://kernsec.org/files/lss2015/reshetova.pdf slides])'' | ||
|[[Linux_Security_Summit_2015/Bio/Reshetova|Elena Reshetova, Intel]] | |[[Linux_Security_Summit_2015/Bio/Reshetova|Elena Reshetova, Intel]] | ||
|- | |- | ||
|14:45 | |14:45 | ||
|[[Linux_Security_Summit_2015/Abstracts/Halcrow|Linux and Mobile Device Encryption]] | |[[Linux_Security_Summit_2015/Abstracts/Halcrow|Linux and Mobile Device Encryption]] ''([http://kernsec.org/files/lss2015/halcrow.pdf slides])'' | ||
|[[Linux_Security_Summit_2015/Bio/Halcrow|Paul Lawrence and Mike Halcrow, Google]] | |[[Linux_Security_Summit_2015/Bio/Halcrow|Paul Lawrence and Mike Halcrow, Google]] | ||
|- | |- | ||
Line 50: | Line 53: | ||
|- | |- | ||
|16:00 | |16:00 | ||
| [[Linux_Security_Summit_2015/Abstracts/Ratliff|Discussion: Core Infrastructure Initiative]] | | [[Linux_Security_Summit_2015/Abstracts/Ratliff|Discussion: Core Infrastructure Initiative]] ''([http://kernsec.org/files/lss2015/CII-for-LSS-August2015-forposting.pdf slides])'' | ||
| [[Linux_Security_Summit_2015/Bio/Ratliff|Emily Ratliff, Linux Foundation]] | | [[Linux_Security_Summit_2015/Bio/Ratliff|Emily Ratliff, Linux Foundation]] | ||
|- | |- | ||
Line 65: | Line 68: | ||
|- | |- | ||
|09:00 | |09:00 | ||
| [[Linux_Security_Summit_2015/Abstracts/Wojciechowski|Security Framework for Constraining Application Privileges]] | | [[Linux_Security_Summit_2015/Abstracts/Wojciechowski|Security Framework for Constraining Application Privileges]] ''([http://kernsec.org/files/lss2015/AppPrivs.pdf slides])'' | ||
| [[Linux_Security_Summit_2015/Bio/Wojciechowski|Lukasz Wojciechowski, Samsung]] | | [[Linux_Security_Summit_2015/Bio/Wojciechowski|Lukasz Wojciechowski, Samsung]] | ||
|- | |- | ||
|09:45 | |09:45 | ||
|[[Linux_Security_Summit_2015/Abstracts/Manolov|IMA/EVM: Real Applications for Embedded Networking Systems]] | |[[Linux_Security_Summit_2015/Abstracts/Manolov|IMA/EVM: Real Applications for Embedded Networking Systems]] ''([http://kernsec.org/files/lss2015/ima-applications-slides.pdf slides])'' | ||
| [[Linux_Security_Summit_2015/Bio/Baushke|Petko Manolov, Konsulko Group, and Mark Baushke, Juniper Networks]] | | [[Linux_Security_Summit_2015/Bio/Baushke|Petko Manolov, Konsulko Group, and Mark Baushke, Juniper Networks]] | ||
|- | |- | ||
Line 76: | Line 79: | ||
|- | |- | ||
|10:45 | |10:45 | ||
|[[Linux_Security_Summit_2015/Abstracts/Vander_Stoep|Ioctl Command Whitelisting in SELinux]] | |[[Linux_Security_Summit_2015/Abstracts/Vander_Stoep|Ioctl Command Whitelisting in SELinux]] ''([http://kernsec.org/files/lss2015/vanderstoep.pdf slides])'' | ||
|[[Linux_Security_Summit_2015/Bio/VanderStoep|Jeffrey Vander Stoep, Google]] | |[[Linux_Security_Summit_2015/Bio/VanderStoep|Jeffrey Vander Stoep, Google]] | ||
|- | |- | ||
|11:30 | |11:30 | ||
|[[Linux_Security_Summit_2015/Abstracts/Kasatkin|IMA/EVM on Android Device]] | |[[Linux_Security_Summit_2015/Abstracts/Kasatkin|IMA/EVM on Android Device]] ''([http://kernsec.org/files/lss2015/LSS2015_IMA_EVM_On_Android.pdf slides])'' | ||
|[[Linux_Security_Summit_2015/Bio/Kasatkin|Dmitry Kasatkin, Huawei Technologies]] | |[[Linux_Security_Summit_2015/Bio/Kasatkin|Dmitry Kasatkin, Huawei Technologies]] | ||
|- | |- | ||
Line 87: | Line 90: | ||
|- | |- | ||
|13:30 | |13:30 | ||
|Subsystem Update: Smack | |Subsystem Update: Smack ''([http://kernsec.org/files/lss2015/201508-LinuxSecuritySummit-Smack.pdf slides])'' | ||
|[[Linux_Security_Summit_2015/Bio/Schaufler|Casey Schaufler, Intel]] | |[[Linux_Security_Summit_2015/Bio/Schaufler|Casey Schaufler, Intel]] | ||
|- | |- | ||
|13:50 | |13:50 | ||
|Subsystem Update: AppArmor | |Subsystem Update: AppArmor ''([http://kernsec.org/files/lss2015/lss-apparmor-update-2015.odp slides])'' | ||
|John Johansen, Canonical | |[[Linux_Security_Summit_2015/Bio/Johansen|John Johansen, Canonical]] | ||
|- | |- | ||
|14:10 | |14:10 | ||
|Subsystem Update: Integrity | |Subsystem Update: Integrity ''([http://kernsec.org/files/lss2015/LSS2015-LinuxIntegritySubsystemStatus.pdf slides])'' | ||
|[[Linux_Security_Summit_2015/Bio/Zohar|Mimi Zohar, IBM]] | |[[Linux_Security_Summit_2015/Bio/Zohar|Mimi Zohar, IBM]] | ||
|- | |- | ||
Line 102: | Line 105: | ||
|- | |- | ||
|14:40 | |14:40 | ||
|Subsystem Update: SELinux | |Subsystem Update: SELinux ''([http://kernsec.org/files/lss2015/lss-state_of_selinux-pmoore-082015-r1.pdf slides])'' | ||
|[[Linux_Security_Summit_2015/Bio/Moore|Paul Moore, Red Hat]] | |[[Linux_Security_Summit_2015/Bio/Moore|Paul Moore, Red Hat]] | ||
|- | |- | ||
|15:00 | |15:00 | ||
|Subsystem Update: Capabilities | |Subsystem Update: Capabilities ''([http://kernsec.org/files/lss2015/capa.pdf slides])'' | ||
| [[Linux_Security_Summit_2015/Bio/Hallyn|Serge Hallyn, Canonical]] | | [[Linux_Security_Summit_2015/Bio/Hallyn|Serge Hallyn, Canonical]] | ||
|- | |- | ||
|15:20 | |15:20 | ||
|Subsystem Update: Seccomp | |Subsystem Update: Seccomp ''([http://kernsec.org/files/lss2015/seccomp.pdf slides])'' | ||
|[[Linux_Security_Summit_2015/Bio/Cook|Kees Cook, Google]] | |[[Linux_Security_Summit_2015/Bio/Cook|Kees Cook, Google]] | ||
|- | |- | ||
|15:40 | |15:40 | ||
| [[Linux_Security_Summit_2015/Abstracts/Schaufler_Stacking|Discussion: Linux Security Module Stacking Next Steps]] | | [[Linux_Security_Summit_2015/Abstracts/Schaufler_Stacking|Discussion: Linux Security Module Stacking Next Steps]] ''([http://kernsec.org/files/lss2015/201508-LinuxSecuritySummit-Stacking.pdf slides])'' | ||
| [[Linux_Security_Summit_2015/Bio/Schaufler|Casey Schaufler, Intel]] | | [[Linux_Security_Summit_2015/Bio/Schaufler|Casey Schaufler, Intel]] | ||
|- | |- | ||
Line 120: | Line 123: | ||
| colspan="2"|<span style="color:darkgreen">''Break''</span> | | colspan="2"|<span style="color:darkgreen">''Break''</span> | ||
|- | |- | ||
|16: | |16:20 | ||
|[[Linux_Security_Summit_2015/Abstracts/ | | [[Linux_Security_Summit_2015/Abstracts/Gillespie_GRR|GRR Rapid Response: Remote Live Forensics for Incident Response]] ''([http://kernsec.org/files/lss2015/GRR.pdf slides])'' | ||
|[[Linux_Security_Summit_2015/Bio/ | | [[Linux_Security_Summit_2015/Bio/Gillespie|Sean Gillespie, CrowdStrike]] | ||
|- | |- | ||
|''17:00'' | |''17:00'' | ||
|colspan="2"|<span style="color:darkgreen">''Finish''</span> | |colspan="2"|<span style="color:darkgreen">''Finish''</span> | ||
|} | |} |
Latest revision as of 18:05, 26 August 2015
Schedule
Note: LSS will be held in the Jefferson Room, 4th Floor, Union St Tower
Day 1 (Thursday 20th August)
Time | Title | Presenter |
---|---|---|
09:00 | Welcome | James Morris, Oracle |
09:05 | Keynote: Giant Bags of Mostly Water - Securing your IT Infrastructure by Securing your Team (slides) | Konstantin Ryabitsev, Linux Foundation (see also Reddit AMA) |
09:55 | Break | |
10:00 | CC3: An Identity Attested Linux Security Supervisor Architecture (slides, paper) | Greg Wettstein, IDfusion |
10:45 | SELinux in Android Lollipop and Android M (slides) | Stephen Smalley, NSA |
11:30 | Break | |
11:45 | Discussion: Rethinking Audit (slides) | Paul Moore, Red Hat |
12:45 | Lunch | |
14:00 | Assembling Secure OS Images (slides) | Elena Reshetova, Intel |
14:45 | Linux and Mobile Device Encryption (slides) | Paul Lawrence and Mike Halcrow, Google |
15:30 | Break | |
16:00 | Discussion: Core Infrastructure Initiative (slides) | Emily Ratliff, Linux Foundation |
17:00 | Finish |