Difference between revisions of "Linux Security Summit 2015/Schedule"

From Linux Kernel Security Subsystem
Jump to navigation Jump to search
 
(28 intermediate revisions by the same user not shown)
Line 16: Line 16:
|-
|-
|09:05
|09:05
| '''<span style="color:navy">Keynote:</span>''' Giant Bags of Mostly Water - Securing your IT Infrastructure by Securing your Team
| '''<span style="color:navy">Keynote:</span>''' Giant Bags of Mostly Water - Securing your IT Infrastructure by Securing your Team ''([http://kernsec.org/files/lss2015/giant-bags-of-mostly-water.pdf slides])''
| [[Linux_Security_Summit_2015/Bio/Kon|Konstantin Ryabitsev, Linux Foundation]]  (see also [https://www.linux.com/news/featured-blogs/200-libby-clark/814542-15-reddit-ama-questions-for-kernelorg-sysadmin-konstantin-ryabitsev Reddit AMA])
| [[Linux_Security_Summit_2015/Bio/Kon|Konstantin Ryabitsev, Linux Foundation]]  (see also [https://www.linux.com/news/featured-blogs/200-libby-clark/814542-15-reddit-ama-questions-for-kernelorg-sysadmin-konstantin-ryabitsev Reddit AMA])
|-
|-
Line 23: Line 23:
|-
|-
|10:00
|10:00
| [[Linux_Security_Summit_2015/Abstracts/Wettstein|CC3: An Identity Attested Linux Security Supervisor Architecture]]
| [[Linux_Security_Summit_2015/Abstracts/Wettstein|CC3: An Identity Attested Linux Security Supervisor Architecture]] ''([http://kernsec.org/files/lss2015/idfusion-iso-identity-slides.pdf slides], [http://kernsec.org/files/lss2015/idfusion-iso-identity-paper.pdf paper])''
| [[Linux_Security_Summit_2015/Bio/Wettstein|Greg Wettstein, IDfusion]]
| [[Linux_Security_Summit_2015/Bio/Wettstein|Greg Wettstein, IDfusion]]
|-
|-
Line 34: Line 34:
|-
|-
|11:45
|11:45
| [[Linux_Security_Summit_2015/Abstracts/Stiller|Linux Incident Response]]
|[[Linux_Security_Summit_2015/Abstracts/Moore|Discussion: Rethinking Audit]] ''([http://kernsec.org/files/lss2015/lss-audit_rework-pmoore-082015-r2.pdf slides])''
| [[Linux_Security_Summit_2015/Bio/Stiller|Mike Scutt and Tim Stiller, Rapid7]]  
|[[Linux_Security_Summit_2015/Bio/Moore|Paul Moore, Red Hat]]
|-
|-
|''12:45''
|''12:45''
Line 41: Line 41:
|-
|-
|14:00
|14:00
|[[Linux_Security_Summit_2015/Abstracts/Reshetova|Assembling Secure OS Images]]
|[[Linux_Security_Summit_2015/Abstracts/Reshetova|Assembling Secure OS Images]] ''([http://kernsec.org/files/lss2015/reshetova.pdf slides])''
|[[Linux_Security_Summit_2015/Bio/Reshetova|Elena Reshetova, Intel]]
|[[Linux_Security_Summit_2015/Bio/Reshetova|Elena Reshetova, Intel]]
|-
|-
|14:45
|14:45
|[[Linux_Security_Summit_2015/Abstracts/Halcrow|Linux and Mobile Device Encryption]]
|[[Linux_Security_Summit_2015/Abstracts/Halcrow|Linux and Mobile Device Encryption]] ''([http://kernsec.org/files/lss2015/halcrow.pdf slides])''
|[[Linux_Security_Summit_2015/Bio/Halcrow|Paul Lawrence and Mike Halcrow, Google]]  
|[[Linux_Security_Summit_2015/Bio/Halcrow|Paul Lawrence and Mike Halcrow, Google]]  
|-
|-
Line 53: Line 53:
|-
|-
|16:00
|16:00
| [[Linux_Security_Summit_2015/Abstracts/Ratliff|Discussion: Core Infrastructure Initiative]]
| [[Linux_Security_Summit_2015/Abstracts/Ratliff|Discussion: Core Infrastructure Initiative]] ''([http://kernsec.org/files/lss2015/CII-for-LSS-August2015-forposting.pdf slides])''
| [[Linux_Security_Summit_2015/Bio/Ratliff|Emily Ratliff, Linux Foundation]]
| [[Linux_Security_Summit_2015/Bio/Ratliff|Emily Ratliff, Linux Foundation]]
|-
|-
Line 68: Line 68:
|-
|-
|09:00
|09:00
| [[Linux_Security_Summit_2015/Abstracts/Wojciechowski|Security Framework for Constraining Application Privileges]]
| [[Linux_Security_Summit_2015/Abstracts/Wojciechowski|Security Framework for Constraining Application Privileges]] ''([http://kernsec.org/files/lss2015/AppPrivs.pdf slides])''
| [[Linux_Security_Summit_2015/Bio/Wojciechowski|Lukasz Wojciechowski, Samsung]]  
| [[Linux_Security_Summit_2015/Bio/Wojciechowski|Lukasz Wojciechowski, Samsung]]  
|-
|-
|09:45
|09:45
|[[Linux_Security_Summit_2015/Abstracts/Manolov|IMA/EVM: Real Applications for Embedded Networking Systems]]
|[[Linux_Security_Summit_2015/Abstracts/Manolov|IMA/EVM: Real Applications for Embedded Networking Systems]] ''([http://kernsec.org/files/lss2015/ima-applications-slides.pdf slides])''
| [[Linux_Security_Summit_2015/Bio/Baushke|Petko Manolov, Konsulko Group, and Mark Baushke, Juniper Networks]]  
| [[Linux_Security_Summit_2015/Bio/Baushke|Petko Manolov, Konsulko Group, and Mark Baushke, Juniper Networks]]  
|-
|-
Line 79: Line 79:
|-
|-
|10:45
|10:45
|[[Linux_Security_Summit_2015/Abstracts/Vander_Stoep|Ioctl Command Whitelisting in SELinux]]
|[[Linux_Security_Summit_2015/Abstracts/Vander_Stoep|Ioctl Command Whitelisting in SELinux]] ''([http://kernsec.org/files/lss2015/vanderstoep.pdf slides])''
|[[Linux_Security_Summit_2015/Bio/VanderStoep|Jeffrey Vander Stoep, Google]]  
|[[Linux_Security_Summit_2015/Bio/VanderStoep|Jeffrey Vander Stoep, Google]]  
|-
|-
|11:30
|11:30
|[[Linux_Security_Summit_2015/Abstracts/Kasatkin|IMA/EVM on Android Device]]
|[[Linux_Security_Summit_2015/Abstracts/Kasatkin|IMA/EVM on Android Device]] ''([http://kernsec.org/files/lss2015/LSS2015_IMA_EVM_On_Android.pdf slides])''
|[[Linux_Security_Summit_2015/Bio/Kasatkin|Dmitry Kasatkin, Huawei Technologies]]  
|[[Linux_Security_Summit_2015/Bio/Kasatkin|Dmitry Kasatkin, Huawei Technologies]]  
|-
|-
Line 94: Line 94:
|-
|-
|13:50
|13:50
|Subsystem Update: AppArmor
|Subsystem Update: AppArmor ''([http://kernsec.org/files/lss2015/lss-apparmor-update-2015.odp slides])''
|John Johansen, Canonical
|[[Linux_Security_Summit_2015/Bio/Johansen|John Johansen, Canonical]]
|-
|-
|14:10
|14:10
|Subsystem Update: Integrity
|Subsystem Update: Integrity ''([http://kernsec.org/files/lss2015/LSS2015-LinuxIntegritySubsystemStatus.pdf slides])''
|[[Linux_Security_Summit_2015/Bio/Zohar|Mimi Zohar, IBM]]
|[[Linux_Security_Summit_2015/Bio/Zohar|Mimi Zohar, IBM]]
|-
|-
Line 105: Line 105:
|-
|-
|14:40
|14:40
|Subsystem Update: SELinux
|Subsystem Update: SELinux ''([http://kernsec.org/files/lss2015/lss-state_of_selinux-pmoore-082015-r1.pdf slides])''
|[[Linux_Security_Summit_2015/Bio/Moore|Paul Moore, Red Hat]]
|[[Linux_Security_Summit_2015/Bio/Moore|Paul Moore, Red Hat]]
|-
|-
|15:00
|15:00
|Subsystem Update: Capabilities
|Subsystem Update: Capabilities ''([http://kernsec.org/files/lss2015/capa.pdf slides])''
| [[Linux_Security_Summit_2015/Bio/Hallyn|Serge Hallyn, Canonical]]
| [[Linux_Security_Summit_2015/Bio/Hallyn|Serge Hallyn, Canonical]]
|-
|-
|15:20
|15:20
|Subsystem Update: Seccomp
|Subsystem Update: Seccomp ''([http://kernsec.org/files/lss2015/seccomp.pdf slides])''
|[[Linux_Security_Summit_2015/Bio/Cook|Kees Cook, Google]]
|[[Linux_Security_Summit_2015/Bio/Cook|Kees Cook, Google]]
|-
|-
Line 123: Line 123:
| colspan="2"|<span style="color:darkgreen">''Break''</span>
| colspan="2"|<span style="color:darkgreen">''Break''</span>
|-
|-
|16:30
|16:20
|[[Linux_Security_Summit_2015/Abstracts/Moore|Discussion: Rethinking Audit]]
| [[Linux_Security_Summit_2015/Abstracts/Gillespie_GRR|GRR Rapid Response: Remote Live Forensics for Incident Response]] ''([http://kernsec.org/files/lss2015/GRR.pdf slides])''
|[[Linux_Security_Summit_2015/Bio/Moore|Paul Moore, Red Hat]]
| [[Linux_Security_Summit_2015/Bio/Gillespie|Sean Gillespie, CrowdStrike]]
|-
|-
|''17:00''
|''17:00''
|colspan="2"|<span style="color:darkgreen">''Finish''</span>
|colspan="2"|<span style="color:darkgreen">''Finish''</span>
|}
|}

Latest revision as of 18:05, 26 August 2015

Schedule

Note: LSS will be held in the Jefferson Room, 4th Floor, Union St Tower


Day 1 (Thursday 20th August)

Time Title Presenter
09:00 Welcome James Morris, Oracle
09:05 Keynote: Giant Bags of Mostly Water - Securing your IT Infrastructure by Securing your Team (slides) Konstantin Ryabitsev, Linux Foundation (see also Reddit AMA)
09:55 Break
10:00 CC3: An Identity Attested Linux Security Supervisor Architecture (slides, paper) Greg Wettstein, IDfusion
10:45 SELinux in Android Lollipop and Android M (slides) Stephen Smalley, NSA
11:30 Break
11:45 Discussion: Rethinking Audit (slides) Paul Moore, Red Hat
12:45 Lunch
14:00 Assembling Secure OS Images (slides) Elena Reshetova, Intel
14:45 Linux and Mobile Device Encryption (slides) Paul Lawrence and Mike Halcrow, Google
15:30 Break
16:00 Discussion: Core Infrastructure Initiative (slides) Emily Ratliff, Linux Foundation
17:00 Finish

Day 2 (Friday 21st August)

Time Title Presenter
09:00 Security Framework for Constraining Application Privileges (slides) Lukasz Wojciechowski, Samsung
09:45 IMA/EVM: Real Applications for Embedded Networking Systems (slides) Petko Manolov, Konsulko Group, and Mark Baushke, Juniper Networks
10:30 Break
10:45 Ioctl Command Whitelisting in SELinux (slides) Jeffrey Vander Stoep, Google
11:30 IMA/EVM on Android Device (slides) Dmitry Kasatkin, Huawei Technologies
12:15 Lunch
13:30 Subsystem Update: Smack (slides) Casey Schaufler, Intel
13:50 Subsystem Update: AppArmor (slides) John Johansen, Canonical
14:10 Subsystem Update: Integrity (slides) Mimi Zohar, IBM
14:30 Break
14:40 Subsystem Update: SELinux (slides) Paul Moore, Red Hat
15:00 Subsystem Update: Capabilities (slides) Serge Hallyn, Canonical
15:20 Subsystem Update: Seccomp (slides) Kees Cook, Google
15:40 Discussion: Linux Security Module Stacking Next Steps (slides) Casey Schaufler, Intel
16:10 Break
16:20 GRR Rapid Response: Remote Live Forensics for Incident Response (slides) Sean Gillespie, CrowdStrike
17:00 Finish