Difference between revisions of "Linux Security Summit 2015/Schedule"

From Linux Kernel Security Subsystem
Jump to navigation Jump to search
 
(5 intermediate revisions by the same user not shown)
Line 34: Line 34:
|-
|-
|11:45
|11:45
|[[Linux_Security_Summit_2015/Abstracts/Moore|Discussion: Rethinking Audit]]
|[[Linux_Security_Summit_2015/Abstracts/Moore|Discussion: Rethinking Audit]] ''([http://kernsec.org/files/lss2015/lss-audit_rework-pmoore-082015-r2.pdf slides])''
|[[Linux_Security_Summit_2015/Bio/Moore|Paul Moore, Red Hat]]
|[[Linux_Security_Summit_2015/Bio/Moore|Paul Moore, Red Hat]]
|-
|-
Line 98: Line 98:
|-
|-
|14:10
|14:10
|Subsystem Update: Integrity
|Subsystem Update: Integrity ''([http://kernsec.org/files/lss2015/LSS2015-LinuxIntegritySubsystemStatus.pdf slides])''
|[[Linux_Security_Summit_2015/Bio/Zohar|Mimi Zohar, IBM]]
|[[Linux_Security_Summit_2015/Bio/Zohar|Mimi Zohar, IBM]]
|-
|-
Line 105: Line 105:
|-
|-
|14:40
|14:40
|Subsystem Update: SELinux
|Subsystem Update: SELinux ''([http://kernsec.org/files/lss2015/lss-state_of_selinux-pmoore-082015-r1.pdf slides])''
|[[Linux_Security_Summit_2015/Bio/Moore|Paul Moore, Red Hat]]
|[[Linux_Security_Summit_2015/Bio/Moore|Paul Moore, Red Hat]]
|-
|-
|15:00
|15:00
|Subsystem Update: Capabilities
|Subsystem Update: Capabilities ''([http://kernsec.org/files/lss2015/capa.pdf slides])''
| [[Linux_Security_Summit_2015/Bio/Hallyn|Serge Hallyn, Canonical]]
| [[Linux_Security_Summit_2015/Bio/Hallyn|Serge Hallyn, Canonical]]
|-
|-
Line 124: Line 124:
|-
|-
|16:20
|16:20
| [[Linux_Security_Summit_2015/Abstracts/Gillespie_GRR|GRR Rapid Response: Remote Live Forensics for Incident Response]]
| [[Linux_Security_Summit_2015/Abstracts/Gillespie_GRR|GRR Rapid Response: Remote Live Forensics for Incident Response]] ''([http://kernsec.org/files/lss2015/GRR.pdf slides])''
| [[Linux_Security_Summit_2015/Bio/Gillespie|Sean Gillespie, CrowdStrike]]
| [[Linux_Security_Summit_2015/Bio/Gillespie|Sean Gillespie, CrowdStrike]]
|-
|-

Latest revision as of 18:05, 26 August 2015

Schedule

Note: LSS will be held in the Jefferson Room, 4th Floor, Union St Tower


Day 1 (Thursday 20th August)

Time Title Presenter
09:00 Welcome James Morris, Oracle
09:05 Keynote: Giant Bags of Mostly Water - Securing your IT Infrastructure by Securing your Team (slides) Konstantin Ryabitsev, Linux Foundation (see also Reddit AMA)
09:55 Break
10:00 CC3: An Identity Attested Linux Security Supervisor Architecture (slides, paper) Greg Wettstein, IDfusion
10:45 SELinux in Android Lollipop and Android M (slides) Stephen Smalley, NSA
11:30 Break
11:45 Discussion: Rethinking Audit (slides) Paul Moore, Red Hat
12:45 Lunch
14:00 Assembling Secure OS Images (slides) Elena Reshetova, Intel
14:45 Linux and Mobile Device Encryption (slides) Paul Lawrence and Mike Halcrow, Google
15:30 Break
16:00 Discussion: Core Infrastructure Initiative (slides) Emily Ratliff, Linux Foundation
17:00 Finish

Day 2 (Friday 21st August)

Time Title Presenter
09:00 Security Framework for Constraining Application Privileges (slides) Lukasz Wojciechowski, Samsung
09:45 IMA/EVM: Real Applications for Embedded Networking Systems (slides) Petko Manolov, Konsulko Group, and Mark Baushke, Juniper Networks
10:30 Break
10:45 Ioctl Command Whitelisting in SELinux (slides) Jeffrey Vander Stoep, Google
11:30 IMA/EVM on Android Device (slides) Dmitry Kasatkin, Huawei Technologies
12:15 Lunch
13:30 Subsystem Update: Smack (slides) Casey Schaufler, Intel
13:50 Subsystem Update: AppArmor (slides) John Johansen, Canonical
14:10 Subsystem Update: Integrity (slides) Mimi Zohar, IBM
14:30 Break
14:40 Subsystem Update: SELinux (slides) Paul Moore, Red Hat
15:00 Subsystem Update: Capabilities (slides) Serge Hallyn, Canonical
15:20 Subsystem Update: Seccomp (slides) Kees Cook, Google
15:40 Discussion: Linux Security Module Stacking Next Steps (slides) Casey Schaufler, Intel
16:10 Break
16:20 GRR Rapid Response: Remote Live Forensics for Incident Response (slides) Sean Gillespie, CrowdStrike
17:00 Finish