Difference between revisions of "Linux Security Summit 2012/Schedule"

From Linux Kernel Security Subsystem
Jump to: navigation, search
(Presentations)
 
(21 intermediate revisions by 2 users not shown)
Line 4: Line 4:
  
 
The summit this year will be a two-day event, co-located with [https://events.linuxfoundation.org/events/linuxcon/ LinuxCon].
 
The summit this year will be a two-day event, co-located with [https://events.linuxfoundation.org/events/linuxcon/ LinuxCon].
 +
 +
 +
== Meeting Room ==
 +
 +
The summit will be held in the '''Executive Center 4''' room on the first floor.
  
  
Line 18: Line 23:
 
|-
 
|-
 
|09:00
 
|09:00
| <span style="color:navy">'''Keynote Talk'''</span>
+
| <span style="color:navy">'''Keynote Talk: UEFI Secure Boot'''</span> [http://kernsec.org/files/security_summit_uefi_2012.odp (slides)]
 
| [http://mjg59.dreamwidth.org/ Matthew Garrett], Red Hat
 
| [http://mjg59.dreamwidth.org/ Matthew Garrett], Red Hat
 
|-
 
|-
Line 25: Line 30:
 
|-
 
|-
 
|10:00
 
|10:00
| [[Linux_Security_Summit_2012/Abstracts/Reshetova|Bootstrapping the Policies for LSMs for Native and Web Applications]]
+
| [[Linux_Security_Summit_2012/Abstracts/Reshetova|Bootstrapping the Policies for LSMs for Native and Web Applications]] [http://kernsec.org/files/LinuxSecuritySummit2012_rpm.pdf (slides)]
 
| Elena Reshetova, Intel
 
| Elena Reshetova, Intel
 
|-
 
|-
 
|10:45
 
|10:45
| [[Linux_Security_Summit_2012/Abstracts/Wouters|DNSSEC: The Shiny New Cryptographically Secured Globally Distributed Database ]]
+
| [[Linux_Security_Summit_2012/Abstracts/Wouters|DNSSEC: The Shiny New Cryptographically Secured Globally Distributed Database ]] [http://kernsec.org/files/LinuxCon2012-DNSSEC.pdf (slides)]
 
| Paul Wouters, Red Hat
 
| Paul Wouters, Red Hat
 
|-
 
|-
Line 36: Line 41:
 
|-
 
|-
 
| 11:45
 
| 11:45
| [[Linux_Security_Summit_2012/Abstracts/Walsh|Linux Sandbox Version II - Sandboxing Server Applications]]
+
| [[Linux_Security_Summit_2012/Abstracts/Walsh|Linux Sandbox Version II - Sandboxing Server Applications]] [http://kernsec.org/files/securelinuxcontainers.pdf (slides)]
 
| Dan Walsh, Red Hat
 
| Dan Walsh, Red Hat
 
|-
 
|-
Line 43: Line 48:
 
|-
 
|-
 
| 13:30
 
| 13:30
| [[Linux_Security_Summit_2012/Abstracts/Kasatkin|Upcoming Extensions to the Linux kernel Integrity Subsystem (IMA/EVM)]]
+
| [[Linux_Security_Summit_2012/Abstracts/Kasatkin|Upcoming Extensions to the Linux kernel Integrity Subsystem (IMA/EVM)]] [http://kernsec.org/files/Integrity_Protection_LSS_2012.pdf (slides)]
 
| Dmitry Kasatkin, Intel
 
| Dmitry Kasatkin, Intel
 
|-
 
|-
 
| 14:15
 
| 14:15
| [[Linux_Security_Summit_2012/Abstracts/Steffen|The Linux Integrity Subsystem and TPM-based Network Endpoint Assessment]]
+
| [[Linux_Security_Summit_2012/Abstracts/Steffen|The Linux Integrity Subsystem and TPM-based Network Endpoint Assessment]] [http://kernsec.org/files/LSS_2012_strongSwan_IMA_slides.pdf (slides)]  [http://kernsec.org/files/LSS_2012_strongSwan_IMA.pdf (paper)]
 
| Andreas Steffen, University of Applied Sciences Rapperswil  
 
| Andreas Steffen, University of Applied Sciences Rapperswil  
 
|-
 
|-
Line 54: Line 59:
 
|-
 
|-
 
| 15:15
 
| 15:15
| [[Linux_Security_Summit_2012/Abstracts/Smalley|Middleware MAC for Android]]
+
| [[Linux_Security_Summit_2012/Abstracts/Smalley|Middleware MAC for Android]]  [http://kernsec.org/files/LSS2012-MiddlewareMAC.pdf (slides)]
 
| Stephen Smalley, National Security Agency  
 
| Stephen Smalley, National Security Agency  
 
|-
 
|-
 
| 16:00
 
| 16:00
| [[Linux_Security_Summit_2012/Abstracts/Handa|CaitSith: A New Type of Rule Based In-kernel Access Control]]
+
| [[Linux_Security_Summit_2012/Abstracts/Handa|CaitSith: A New Type of Rule Based In-kernel Access Control]] [http://kernsec.org/files/CaitSith-en.pdf (slides)]
| Tetsuo Handa, NTT Data Intellilink
+
| Tetsuo Handa, NTT
 
|-
 
|-
 
| 16:45
 
| 16:45
| [[Linux_Security_Summit_2012/Abstracts/Cook|Finding Kernel Vulnerabilities Using Coccinelle]]
+
| [[Linux_Security_Summit_2012/Abstracts/Cook|Finding Kernel Vulnerabilities Using Coccinelle]] [http://kernsec.org/files/Coccinelle.pdf (slides)]
 
| Kees Cook, Google
 
| Kees Cook, Google
 
|-
 
|-
Line 68: Line 73:
 
|colspan="2"|''finish''
 
|colspan="2"|''finish''
 
|}
 
|}
 
  
 
== Day 2 (31st Aug) ==
 
== Day 2 (31st Aug) ==
Line 80: Line 84:
 
|-
 
|-
 
|09:00
 
|09:00
| '''Cryptography'''
+
| '''Cryptography''' [http://kernsec.org/files/crypto-201208.odp (slides)]
 
| Herbert Xu, Red Hat
 
| Herbert Xu, Red Hat
 
|-
 
|-
 
|09:20
 
|09:20
| '''AppArmor'''
+
| '''AppArmor''' [http://kernsec.org/files/apparmor-update.odp (slides)]
 
| John Johansen, Canonical
 
| John Johansen, Canonical
 
|-
 
|-
Line 99: Line 103:
 
|-
 
|-
 
|10:40
 
|10:40
| '''Integrity'''
+
| '''Integrity''' [http://kernsec.org/files/LSS-2012-integrity.odp (slides)]
 
| Mimi Zohar, IBM
 
| Mimi Zohar, IBM
 
|-
 
|-
 
|11:00
 
|11:00
 
| '''TOMOYO'''
 
| '''TOMOYO'''
| Tetsuo Handa, NTT Data Intellilink
+
| Tetsuo Handa, NTT
 
|-
 
|-
 
|''11:20''
 
|''11:20''
Line 110: Line 114:
 
|-
 
|-
 
|11:40
 
|11:40
| '''Smack'''
+
| '''Smack''' [http://kernsec.org/files/SmackLinuxSecuritySummit2012.pdf (slides)]
 
| Casey Schaufler, Intel
 
| Casey Schaufler, Intel
 
|-
 
|-
 
|12:00
 
|12:00
| '''YAMA'''
+
| '''Yama''' [http://kernsec.org/files/yama.pdf (slides)]
 
| Kees Cook, Google
 
| Kees Cook, Google
 
|-
 
|-
 
|''12:20''
 
|''12:20''
 
|colspan="2" |''lunch (self-funded at nearby location)''
 
|colspan="2" |''lunch (self-funded at nearby location)''
 +
|}
 +
 +
=== Lightning Talks ===
 +
 +
If you wish to add a breakout session topic, email the program committee, or propose a topic on the day.  Space is limited.
 +
 +
{| border="1" cellpadding="6" cellspacing="0"
 +
!Time
 +
!Topic
 +
!Speaker
 +
|-
 +
|rowspan="1"|14:00
 +
| Trinity: Linux system call fuzzing
 +
| Dave Jones, Red Hat
 
|}
 
|}
  
Line 131: Line 149:
 
!Leader
 
!Leader
 
|-
 
|-
|14:00
+
|14:30
 
| [[Linux_Security_Summit_2012/Abstracts/Bryant|LF Linux Security Workgroup BOF]]  
 
| [[Linux_Security_Summit_2012/Abstracts/Bryant|LF Linux Security Workgroup BOF]]  
 
| Corey Bryant, IBM
 
| Corey Bryant, IBM
 
|-
 
|-
|16:30
+
|17:00
 
|colspan="2"|Breakout session reports
 
|colspan="2"|Breakout session reports
 
|-
 
|-
|''17:00''
+
|''17:30''
 
|colspan="2"|''finish''
 
|colspan="2"|''finish''
 
|}
 
|}

Latest revision as of 00:59, 12 September 2012

Overview

This is the schedule for the Linux Security Summit 2012, to be held in San Diego on August 30th and 31st, 2012.

The summit this year will be a two-day event, co-located with LinuxCon.


Meeting Room

The summit will be held in the Executive Center 4 room on the first floor.


Program

Day 1 (30th Aug)

Presentations

Time Title Presenter
09:00 Keynote Talk: UEFI Secure Boot (slides) Matthew Garrett, Red Hat
09:50 break
10:00 Bootstrapping the Policies for LSMs for Native and Web Applications (slides) Elena Reshetova, Intel
10:45 DNSSEC: The Shiny New Cryptographically Secured Globally Distributed Database (slides) Paul Wouters, Red Hat
11:30 break
11:45 Linux Sandbox Version II - Sandboxing Server Applications (slides) Dan Walsh, Red Hat
12:30 lunch (self-funded at nearby location)
13:30 Upcoming Extensions to the Linux kernel Integrity Subsystem (IMA/EVM) (slides) Dmitry Kasatkin, Intel
14:15 The Linux Integrity Subsystem and TPM-based Network Endpoint Assessment (slides) (paper) Andreas Steffen, University of Applied Sciences Rapperswil
15:00 break
15:15 Middleware MAC for Android (slides) Stephen Smalley, National Security Agency
16:00 CaitSith: A New Type of Rule Based In-kernel Access Control (slides) Tetsuo Handa, NTT
16:45 Finding Kernel Vulnerabilities Using Coccinelle (slides) Kees Cook, Google
17:15 finish

Day 2 (31st Aug)

Kernel Security Subsystem Updates

Time Title Presenter
09:00 Cryptography (slides) Herbert Xu, Red Hat
09:20 AppArmor (slides) John Johansen, Canonical
09:40 Key Management David Howells, Red Hat
10:00 break
10:20 SELinux Eric Paris, Red Hat
10:40 Integrity (slides) Mimi Zohar, IBM
11:00 TOMOYO Tetsuo Handa, NTT
11:20 break
11:40 Smack (slides) Casey Schaufler, Intel
12:00 Yama (slides) Kees Cook, Google
12:20 lunch (self-funded at nearby location)

Lightning Talks

If you wish to add a breakout session topic, email the program committee, or propose a topic on the day. Space is limited.

Time Topic Speaker
14:00 Trinity: Linux system call fuzzing Dave Jones, Red Hat


Breakout Sessions

Freeform track for smaller groups to collaborate on specific issues. If you wish to add a breakout session topic, email the program committee.

Time Details Leader
14:30 LF Linux Security Workgroup BOF Corey Bryant, IBM
17:00 Breakout session reports
17:30 finish