Difference between revisions of "Linux Security Summit 2015/Schedule"

From Linux Kernel Security Subsystem
Jump to navigation Jump to search
 
(81 intermediate revisions by the same user not shown)
Line 1: Line 1:
= Schedule =
= Schedule =
Note: LSS will be held in the '''Jefferson Room, 4th Floor, Union St Tower'''


== Day 1 (Thursday 20th August) ==
== Day 1 (Thursday 20th August) ==
Line 9: Line 12:
|-
|-
|09:00
|09:00
| <span style="color:navy">Keynote (TBA)</span>
|Welcome
| ...
|[[Linux_Security_Summit_2015/Bio/Morris|James Morris, Oracle]]
|-
|09:05
| '''<span style="color:navy">Keynote:</span>''' Giant Bags of Mostly Water - Securing your IT Infrastructure by Securing your Team ''([http://kernsec.org/files/lss2015/giant-bags-of-mostly-water.pdf slides])''
| [[Linux_Security_Summit_2015/Bio/Kon|Konstantin Ryabitsev, Linux Foundation]]  (see also [https://www.linux.com/news/featured-blogs/200-libby-clark/814542-15-reddit-ama-questions-for-kernelorg-sysadmin-konstantin-ryabitsev Reddit AMA])
|-
|-
|''09:50''
|''09:55''
|colspan="2"|''Break''
|colspan="2"|<span style="color:darkgreen">''Break''</span>
|-
|-
|10:00
|10:00
| [[Linux_Security_Summit_2015/Abstracts/Stiller|Linux Incident Response]]
| [[Linux_Security_Summit_2015/Abstracts/Wettstein|CC3: An Identity Attested Linux Security Supervisor Architecture]] ''([http://kernsec.org/files/lss2015/idfusion-iso-identity-slides.pdf slides], [http://kernsec.org/files/lss2015/idfusion-iso-identity-paper.pdf paper])''
| Mike Scutt and Tim Stiller, Rapid7
| [[Linux_Security_Summit_2015/Bio/Wettstein|Greg Wettstein, IDfusion]]
|-
|-
|10:45
|10:45
| [[Linux_Security_Summit_2015/Abstracts/Wettstein|CC3: An Identity Attested Linux Security Supervisor Architecture]]
| [[Linux_Security_Summit_2015/Abstracts/Smalley|SELinux in Android Lollipop and Android M]] ''([http://kernsec.org/files/lss2015/lss2015_selinuxinandroidlollipopandm_smalley.pdf slides])''
| Greg Wettstein, IDfusion
| [[Linux_Security_Summit_2015/Bio/Smalley|Stephen Smalley, NSA]]
|-
|-
|''11:30''
|''11:30''
|colspan="2"|''Break''
|colspan="2"|<span style="color:darkgreen">''Break''</span>
|-
|-
|11:45
|11:45
| [[Linux_Security_Summit_2015/Abstracts/Smalley|SELinux in Android Lollipop and Android M]]
|[[Linux_Security_Summit_2015/Abstracts/Moore|Discussion: Rethinking Audit]] ''([http://kernsec.org/files/lss2015/lss-audit_rework-pmoore-082015-r2.pdf slides])''
| Stephen Smalley, NSA
|[[Linux_Security_Summit_2015/Bio/Moore|Paul Moore, Red Hat]]
|-
|-
|''12:30''
|''12:45''
|colspan="2"|''Lunch (self-funded at a nearby location)''
|colspan="2"|<span style="color:darkgreen">''Lunch''</span>
|-
|-
|14:00
|14:00
| [[Linux_Security_Summit_2015/Abstracts/Reshetova|Assembling Secure OS Images]] (To be confirmed...)
|[[Linux_Security_Summit_2015/Abstracts/Reshetova|Assembling Secure OS Images]] ''([http://kernsec.org/files/lss2015/reshetova.pdf slides])''
| Elena Reshetova, Intel
|[[Linux_Security_Summit_2015/Bio/Reshetova|Elena Reshetova, Intel]]
|-
|-
|14:45
|14:45
| [[Linux_Security_Summit_2015/Abstracts/Wojciechowski|Security Framework for Constraining Application Privileges]]
|[[Linux_Security_Summit_2015/Abstracts/Halcrow|Linux and Mobile Device Encryption]] ''([http://kernsec.org/files/lss2015/halcrow.pdf slides])''
| Lukasz Wojciechowski, Samsung
|[[Linux_Security_Summit_2015/Bio/Halcrow|Paul Lawrence and Mike Halcrow, Google]]
|-
|-
|''15:30''
|''15:30''
|colspan="2"|''Break''
|colspan="2"|<span style="color:darkgreen">''Break''</span>
|-
|-
|-
|16:00
|16:00
| AAA
| [[Linux_Security_Summit_2015/Abstracts/Ratliff|Discussion: Core Infrastructure Initiative]] ''([http://kernsec.org/files/lss2015/CII-for-LSS-August2015-forposting.pdf slides])''
| BBB
| [[Linux_Security_Summit_2015/Bio/Ratliff|Emily Ratliff, Linux Foundation]]
|-
|16:30
| AAA
| BBB
|-
|-
|''17:00''
|''17:00''
|colspan="2"|''Finish''
|colspan="2"|<span style="color:darkgreen">''Finish''</span>
|}
|}


== Day 2 (Friday 21st August) ==
== Day 2 (Friday 21st August) ==
Line 65: Line 68:
|-
|-
|09:00
|09:00
| SELinux update
| [[Linux_Security_Summit_2015/Abstracts/Wojciechowski|Security Framework for Constraining Application Privileges]] ''([http://kernsec.org/files/lss2015/AppPrivs.pdf slides])''
| TBA
| [[Linux_Security_Summit_2015/Bio/Wojciechowski|Lukasz Wojciechowski, Samsung]]
|-
|09:45
|[[Linux_Security_Summit_2015/Abstracts/Manolov|IMA/EVM: Real Applications for Embedded Networking Systems]] ''([http://kernsec.org/files/lss2015/ima-applications-slides.pdf slides])''
| [[Linux_Security_Summit_2015/Bio/Baushke|Petko Manolov, Konsulko Group, and Mark Baushke, Juniper Networks]]
|-
|''10:30''
|colspan="2"|<span style="color:darkgreen">''Break''</span>
|-
|10:45
|[[Linux_Security_Summit_2015/Abstracts/Vander_Stoep|Ioctl Command Whitelisting in SELinux]] ''([http://kernsec.org/files/lss2015/vanderstoep.pdf slides])''
|[[Linux_Security_Summit_2015/Bio/VanderStoep|Jeffrey Vander Stoep, Google]]
|-
|-
|09:20
|11:30
| AppArmor update
|[[Linux_Security_Summit_2015/Abstracts/Kasatkin|IMA/EVM on Android Device]] ''([http://kernsec.org/files/lss2015/LSS2015_IMA_EVM_On_Android.pdf slides])''
| TBA
|[[Linux_Security_Summit_2015/Bio/Kasatkin|Dmitry Kasatkin, Huawei Technologies]]
|-
|-
|09:40
|''12:15''
| Integrity update
|colspan="2"|<span style="color:darkgreen">''Lunch''</span>
| TBA
|-
|-
|10:00
|13:30
| Smack update
|Subsystem Update: Smack ''([http://kernsec.org/files/lss2015/201508-LinuxSecuritySummit-Smack.pdf slides])''
| TBA
|[[Linux_Security_Summit_2015/Bio/Schaufler|Casey Schaufler, Intel]]
|-
|-
|''10:20''
|13:50
|colspan="2"|''Break''
|Subsystem Update: AppArmor ''([http://kernsec.org/files/lss2015/lss-apparmor-update-2015.odp slides])''
|[[Linux_Security_Summit_2015/Bio/Johansen|John Johansen, Canonical]]
|-
|-
|10:30
|14:10
| Crypto / Keys update
|Subsystem Update: Integrity ''([http://kernsec.org/files/lss2015/LSS2015-LinuxIntegritySubsystemStatus.pdf slides])''
| TBA
|[[Linux_Security_Summit_2015/Bio/Zohar|Mimi Zohar, IBM]]
|-
|-
|10:50
|''14:30''
| Seccomp update
|colspan="2"|<span style="color:darkgreen">''Break''</span>
| TBA
|-
|-
|11:20
|14:40
|colspan="2"| Break-out Session #1
|Subsystem Update: SELinux ''([http://kernsec.org/files/lss2015/lss-state_of_selinux-pmoore-082015-r1.pdf slides])''
|[[Linux_Security_Summit_2015/Bio/Moore|Paul Moore, Red Hat]]
|-
|-
|''12:30''
|15:00
|colspan="2"|''Lunch (self-funded at a nearby location)''
|Subsystem Update: Capabilities ''([http://kernsec.org/files/lss2015/capa.pdf slides])''
| [[Linux_Security_Summit_2015/Bio/Hallyn|Serge Hallyn, Canonical]]
|-
|-
|14:00
|15:20
| AAA
|Subsystem Update: Seccomp ''([http://kernsec.org/files/lss2015/seccomp.pdf slides])''
| BBB
|[[Linux_Security_Summit_2015/Bio/Cook|Kees Cook, Google]]
|-
|-
|''15:00''
|15:40
| colspan="2"|''Break''
| [[Linux_Security_Summit_2015/Abstracts/Schaufler_Stacking|Discussion: Linux Security Module Stacking Next Steps]] ''([http://kernsec.org/files/lss2015/201508-LinuxSecuritySummit-Stacking.pdf slides])''
| [[Linux_Security_Summit_2015/Bio/Schaufler|Casey Schaufler, Intel]]
|-
|-
|15:15
|''16:10''
| AAA
| colspan="2"|<span style="color:darkgreen">''Break''</span>
| BBB
|-
|-
|16:00 
|16:20
|colspan="2"| Break-out Session #2
| [[Linux_Security_Summit_2015/Abstracts/Gillespie_GRR|GRR Rapid Response: Remote Live Forensics for Incident Response]] ''([http://kernsec.org/files/lss2015/GRR.pdf slides])''
| [[Linux_Security_Summit_2015/Bio/Gillespie|Sean Gillespie, CrowdStrike]]
|-
|-
|''17:00''
|''17:00''
|colspan="2"|''Finish''
|colspan="2"|<span style="color:darkgreen">''Finish''</span>
|}
|}

Latest revision as of 18:05, 26 August 2015

Schedule

Note: LSS will be held in the Jefferson Room, 4th Floor, Union St Tower


Day 1 (Thursday 20th August)

Time Title Presenter
09:00 Welcome James Morris, Oracle
09:05 Keynote: Giant Bags of Mostly Water - Securing your IT Infrastructure by Securing your Team (slides) Konstantin Ryabitsev, Linux Foundation (see also Reddit AMA)
09:55 Break
10:00 CC3: An Identity Attested Linux Security Supervisor Architecture (slides, paper) Greg Wettstein, IDfusion
10:45 SELinux in Android Lollipop and Android M (slides) Stephen Smalley, NSA
11:30 Break
11:45 Discussion: Rethinking Audit (slides) Paul Moore, Red Hat
12:45 Lunch
14:00 Assembling Secure OS Images (slides) Elena Reshetova, Intel
14:45 Linux and Mobile Device Encryption (slides) Paul Lawrence and Mike Halcrow, Google
15:30 Break
16:00 Discussion: Core Infrastructure Initiative (slides) Emily Ratliff, Linux Foundation
17:00 Finish

Day 2 (Friday 21st August)

Time Title Presenter
09:00 Security Framework for Constraining Application Privileges (slides) Lukasz Wojciechowski, Samsung
09:45 IMA/EVM: Real Applications for Embedded Networking Systems (slides) Petko Manolov, Konsulko Group, and Mark Baushke, Juniper Networks
10:30 Break
10:45 Ioctl Command Whitelisting in SELinux (slides) Jeffrey Vander Stoep, Google
11:30 IMA/EVM on Android Device (slides) Dmitry Kasatkin, Huawei Technologies
12:15 Lunch
13:30 Subsystem Update: Smack (slides) Casey Schaufler, Intel
13:50 Subsystem Update: AppArmor (slides) John Johansen, Canonical
14:10 Subsystem Update: Integrity (slides) Mimi Zohar, IBM
14:30 Break
14:40 Subsystem Update: SELinux (slides) Paul Moore, Red Hat
15:00 Subsystem Update: Capabilities (slides) Serge Hallyn, Canonical
15:20 Subsystem Update: Seccomp (slides) Kees Cook, Google
15:40 Discussion: Linux Security Module Stacking Next Steps (slides) Casey Schaufler, Intel
16:10 Break
16:20 GRR Rapid Response: Remote Live Forensics for Incident Response (slides) Sean Gillespie, CrowdStrike
17:00 Finish