Linux Security Summit 2013

From Linux Kernel Security Subsystem
(Difference between revisions)
Jump to: navigation, search
m (Day 1 (19th September))
(Day 1 (19th September))
Line 35: Line 35:
 
|-
 
|-
 
|10:00
 
|10:00
| [[Linux_Security_Summit_2013/Abstracts/Safford|Embedded Linux Security]]
+
| [[Linux_Security_Summit_2013/Abstracts/Safford|Embedded Linux Security]] ''([http://selinuxproject.org/~jmorris/lss2013_slides/safford_embedded_lss_slides.pdf slides] [http://selinuxproject.org/~jmorris/lss2013_slides/safford_embedded_lss_paper.pdf paper])''
 
| David Safford, IBM
 
| David Safford, IBM
 
|-
 
|-
 
|10:45
 
|10:45
| [[Linux_Security_Summit_2013/Abstracts/Johansen|Extending AppArmor Mediation into the Userspace]]
+
| [[Linux_Security_Summit_2013/Abstracts/Johansen|Extending AppArmor Mediation into the Userspace]] ''([http://selinuxproject.org/~jmorris/lss2013_slides/jj_apparmor-userspace-2013.odp slides])''
 
| John Johansen, Canonical
 
| John Johansen, Canonical
 
|-
 
|-
Line 46: Line 46:
 
|-
 
|-
 
|11:45
 
|11:45
| [[Linux_Security_Summit_2013/Abstracts/Schaufler|Multiple Concurrent Security Models? Really?]]
+
| [[Linux_Security_Summit_2013/Abstracts/Schaufler|Multiple Concurrent Security Models? Really?]] ''([http://selinuxproject.org/~jmorris/lss2013_slides/casey_Glass2013.pdf slides])''
 
| Casey Schaufler, Intel
 
| Casey Schaufler, Intel
 
|-
 
|-
Line 53: Line 53:
 
|-
 
|-
 
|14:00
 
|14:00
| [[Linux_Security_Summit_2013/Abstracts/Cook|Linux Kernel ASLR]]
+
| [[Linux_Security_Summit_2013/Abstracts/Cook|Linux Kernel ASLR]] ''([http://selinuxproject.org/~jmorris/lss2013_slides/cook_kaslr.pdf slides])''
 
| Kees Cook, Google
 
| Kees Cook, Google
 
|-
 
|-
 
|14:45
 
|14:45
| [[Linux_Security_Summit_2013/Abstracts/Johansen2|The AppArmor Labeling Model]]
+
| [[Linux_Security_Summit_2013/Abstracts/Johansen2|The AppArmor Labeling Model]] ''([http://selinuxproject.org/~jmorris/lss2013_slides/jj_apparmor-labeling-2013.odp slides])''
 
| John Johansen, Canonical
 
| John Johansen, Canonical
 
|-
 
|-

Revision as of 14:47, 20 September 2013

Contents

Description

The Linux Security Summit (LSS) is a technical forum for collaboration between Linux developers, researchers, and end users. Its primary aim is to foster community efforts in analyzing and solving Linux security challenges.

The format of the summit will be:

  • Refereed presentations
  • Subsystem updates
  • Breakout development sessions

Schedule

The Linux Security Summit for 2013 will be held across 19 and 20 September in New Orleans, USA. It will be co-located with LinuxCon, as well as Linux Plumbers.


Day 1 (19th September)

Time Title Presenter
09:00 Keynote Talk Ted Ts'o, Google
09:50 Break
Refereed Talks
10:00 Embedded Linux Security (slides paper) David Safford, IBM
10:45 Extending AppArmor Mediation into the Userspace (slides) John Johansen, Canonical
11:30 Break
11:45 Multiple Concurrent Security Models? Really? (slides) Casey Schaufler, Intel
12:30 Lunch (self-funded at a nearby location)
14:00 Linux Kernel ASLR (slides) Kees Cook, Google
14:45 The AppArmor Labeling Model (slides) John Johansen, Canonical
15:30 Break
Short Topics
15:50 SELinux update Paul Moore, Red Hat
16:10 Smack update Casey Schaufler, Intel
16:30 Integrity update Mimi Zohar, IBM
16:50 Core Kernel - "Fixing anti-patterns" Kees Cook, Google
17:30 Finish

Day 2 (20th September)

Break-out sessions starting at 9am.

Details TBA.


Note that Linux Security Summit attendees and speakers must be registered to attend LinuxCon. See the LinuxCon site for details on registration, travel, and accommodation. (For those wishing to also attend Plumbers, a separate registration for that is required).

Call for Participation

The Linux Security Summit CFP closed on 14th June.

Accepted speakers will be notified by 21st of June.

The program committee currently seeks proposals for:

  • Refereed Presentations:

45 minutes in length, including at least 10 minutes of discussion. Papers are encouraged.


Topic areas include, but are not limited to:

  • System hardening
  • Access control
  • Cryptography
  • Integrity control
  • Hardware security
  • Networking
  • Storage
  • Virtualization
  • Desktop
  • Tools
  • Management
  • Case studies
  • Emerging technologies, threats & techniques


Proposals should be submitted in plain text via email to the program committee at: lss-pc (_at_) ext.namei.org

Abstracts should be approximately 150 words in total.

Program Committee

The Linux Security Summit for 2013 is organized by:

  • James Morris, Oracle
  • Serge Hallyn, Canonical
  • Paul Moore, Red Hat
  • Stephen Smalley, NSA
  • Joshua Brindle, Quark Security
  • Herbert Xu, Red Hat
  • John Johansen, Canonical
  • Kees Cook, Google
  • Casey Schaufler, Intel
  • Mimi Zohar, IBM

The program committee may be contacted as a group via email: lss-pc (_at_) ext.namei.org

Personal tools
Namespaces

Variants
Actions
Navigation
Tools