Linux Security Summit 2015

From Linux Kernel Security Subsystem
(Difference between revisions)
Jump to: navigation, search
(Program Committee)
(5 intermediate revisions by one user not shown)
Line 18: Line 18:
in Seattle, WA, USA.  It will be co-located with [ LinuxCon] and other events.
in Seattle, WA, USA.  It will be co-located with [ LinuxCon] and other events.
All attendees and presenters must be registered to attend LinuxCon.
LinuxCon registration is ''not'' required to attend LSS.
Registration and general event details may be found here: []
Registration and general event details may be found here: []
= Call for Participation =
= Call for Participation =
Line 58: Line 60:
* [[Linux_Security_Summit_2015/Bio/Morris|James Morris, Oracle]]
* [[Linux_Security_Summit_2015/Bio/Morris|James Morris, Oracle]]
* [[Linux_Security_Summit_2015/Bio/Hallyn|Serge Hallyn, Canonical]]
* [[Linux_Security_Summit_2015/Bio/Hallyn|Serge Hallyn, Canonical]]
* Paul Moore, Red Hat
* [[Linux_Security_Summit_2015/Bio/Moore|Paul Moore, Red Hat]]
* Stephen Smalley, NSA
* [[Linux_Security_Summit_2015/Bio/Smalley|Stephen Smalley, NSA]]
* Joshua Brindle, Quark Security
* Joshua Brindle, Quark Security
* Herbert Xu, Red Hat
* [[Linux_Security_Summit_2015/Bio/Xu|Herbert Xu, Red Hat]]
* John Johansen, Canonical
* John Johansen, Canonical
* [[Linux_Security_Summit_2015/Bio/Cook|Kees Cook, Google]]
* [[Linux_Security_Summit_2015/Bio/Cook|Kees Cook, Google]]

Latest revision as of 22:38, 9 August 2015


[edit] Description

The Linux Security Summit (LSS) is a technical forum for collaboration between Linux developers, researchers, and end users. Its primary aim is to foster community efforts in analyzing and solving Linux security challenges.

The format of the summit will be:

  • Refereed presentations
  • Subsystem updates
  • Breakout development sessions

[edit] Event

The Linux Security Summit for 2015 will be held across 20 and 21 August in Seattle, WA, USA. It will be co-located with LinuxCon and other events.

LinuxCon registration is not required to attend LSS.

Registration and general event details may be found here:

[edit] Schedule

Note: LSS will be held in the Jefferson Room, 4th Floor, Union St Tower

[edit] Day 1 (Thursday 20th August)

Time Title Presenter
09:00 Welcome James Morris, Oracle
09:05 Keynote: Giant Bags of Mostly Water - Securing your IT Infrastructure by Securing your Team (slides) Konstantin Ryabitsev, Linux Foundation (see also Reddit AMA)
09:55 Break
10:00 CC3: An Identity Attested Linux Security Supervisor Architecture (slides, paper) Greg Wettstein, IDfusion
10:45 SELinux in Android Lollipop and Android M (slides) Stephen Smalley, NSA
11:30 Break
11:45 Discussion: Rethinking Audit (slides) Paul Moore, Red Hat
12:45 Lunch
14:00 Assembling Secure OS Images (slides) Elena Reshetova, Intel
14:45 Linux and Mobile Device Encryption (slides) Paul Lawrence and Mike Halcrow, Google
15:30 Break
16:00 Discussion: Core Infrastructure Initiative (slides) Emily Ratliff, Linux Foundation
17:00 Finish

[edit] Day 2 (Friday 21st August)

Time Title Presenter
09:00 Security Framework for Constraining Application Privileges (slides) Lukasz Wojciechowski, Samsung
09:45 IMA/EVM: Real Applications for Embedded Networking Systems (slides) Petko Manolov, Konsulko Group, and Mark Baushke, Juniper Networks
10:30 Break
10:45 Ioctl Command Whitelisting in SELinux (slides) Jeffrey Vander Stoep, Google
11:30 IMA/EVM on Android Device (slides) Dmitry Kasatkin, Huawei Technologies
12:15 Lunch
13:30 Subsystem Update: Smack (slides) Casey Schaufler, Intel
13:50 Subsystem Update: AppArmor (slides) John Johansen, Canonical
14:10 Subsystem Update: Integrity (slides) Mimi Zohar, IBM
14:30 Break
14:40 Subsystem Update: SELinux (slides) Paul Moore, Red Hat
15:00 Subsystem Update: Capabilities (slides) Serge Hallyn, Canonical
15:20 Subsystem Update: Seccomp (slides) Kees Cook, Google
15:40 Discussion: Linux Security Module Stacking Next Steps (slides) Casey Schaufler, Intel
16:10 Break
16:20 GRR Rapid Response: Remote Live Forensics for Incident Response (slides) Sean Gillespie, CrowdStrike
17:00 Finish

[edit] Call for Participation

The CFP is now closed.

The program committee sought proposals for:

  • Refereed Presentations: 45 minutes in length, including at least 10 minutes of discussion. Papers are encouraged.
  • Discussion Topics: 30 minutes in length.

Topic areas include, but are not limited to:

  • System hardening
  • Access control
  • Cryptography
  • Integrity control
  • Hardware security
  • Networking
  • Storage
  • Virtualization
  • Desktop
  • Tools
  • Management
  • Case studies
  • Emerging technologies, threats & techniques

[edit] Program Committee

The Linux Security Summit for 2015 is organized by:

The program committee may be contacted as a group via email:

Personal tools