Difference between revisions of "Security Presentations"

From eLinux.org
Jump to: navigation, search
(Created page with "= '''SELinux''' = = '''Security in IoT''' = == Technical Overview of the Trusted Firmware: A Class Open Source Project [ELC 2020] == '''Presenter: ''' Sandrine Bailleux & Jo...")
 
Line 27: Line 27:
 
* [https://www.youtube.com/watch?v=-3klh4Eo_hE VIDEO]  
 
* [https://www.youtube.com/watch?v=-3klh4Eo_hE VIDEO]  
  
== [ELC] ==
+
== Open Source CVE Monitoring and Management: Cutting Through the Vulnerability Storm [ELC 2019] ==
'''Presenter:''' <br>
+
'''Presenter: '''Akshay Bhat, Timesys <br>
 
'''Summary:'''
 
'''Summary:'''
 +
This presentation will introduce the process of monitoring CVE's, <br>
 +
determining applicability, assessing the severity and finding fixes. <br>
 +
Some of the challenges in tracking CVE's due to NVD/MITRE feeds having <br>
 +
incorrect/missing data, leading to missed vulnerabilities and a false sense of
 +
security has also been covered.<br>
  
* [PDF] | [VIDEO]  
+
* [https://elinux.org/images/0/0a/Open-Source-CVE-Monitoring-and-Management-V3.pdf PDF] | [https://www.youtube.com/watch?v=cCzb0lewVj4 VIDEO]  
  
  
== [ELC] ==
+
== Introduction to Reverse Engineering [ELC 2018] ==
'''Presenter:''' <br>
+
'''Presenter: '''Mike Anderson, The PTR Group, Inc. <br>
 
'''Summary:'''
 
'''Summary:'''
 
+
This presentation will covers , the techniques used by the cracker<br>
* [PDF] | [VIDEO]  
+
to reverse engineer your hardware and your software. We will look at <br>
 +
techniques to bypass physical security as well as repopulating connectors on <br>
 +
motherboards, reading flash storage, accessing firmware updates and the software <br>
 +
techniques used to find vulnerabilities in your code.
 +
* [https://elinux.org/images/c/c5/IntroductionToReverseEngineering_Anderson.pdf PDF] | [https://www.youtube.com/watch?v=7v7UaMsgg_c VIDEO]  
  
 
== [ELC] ==
 
== [ELC] ==

Revision as of 22:51, 5 October 2020

SELinux

Security in IoT

Technical Overview of the Trusted Firmware: A Class Open Source Project [ELC 2020]

Presenter: Sandrine Bailleux & Joanna Farley, Arm
Summary:

Inside the Linux Security Modules (LSM) [ELC 2020]

Presenter: Vandana Salve, Prasme Systems
Summary:

Introduction to Embedded Linux Security [ELC 2020]

Presenter: Sergio Prado, Embedded Labworks
Summary:

The Bad Guys Just Broke My Crypto - What Do I Do? [ELC 2020]

Presenter: Kris Chaplin, Intel UK
Summary:

Open Source CVE Monitoring and Management: Cutting Through the Vulnerability Storm [ELC 2019]

Presenter: Akshay Bhat, Timesys
Summary: This presentation will introduce the process of monitoring CVE's,
determining applicability, assessing the severity and finding fixes.
Some of the challenges in tracking CVE's due to NVD/MITRE feeds having
incorrect/missing data, leading to missed vulnerabilities and a false sense of security has also been covered.


Introduction to Reverse Engineering [ELC 2018]

Presenter: Mike Anderson, The PTR Group, Inc.
Summary: This presentation will covers , the techniques used by the cracker

to reverse engineer your hardware and your software. We will look at 

techniques to bypass physical security as well as repopulating connectors on
motherboards, reading flash storage, accessing firmware updates and the software
techniques used to find vulnerabilities in your code.

[ELC]

Presenter:
Summary:

  • [PDF] | [VIDEO]

[ELC]

Presenter:
Summary:

  • [PDF] | [VIDEO]

[ELC]

Presenter:
Summary:

  • [PDF] | [VIDEO]

[ELC]

Presenter:
Summary:

  • [PDF] | [VIDEO]

[ELC]

Presenter:
Summary:

  • [PDF] | [VIDEO]

[ELC]

Presenter:
Summary:

  • [PDF] | [VIDEO]