Difference between revisions of "Security Presentations"

From eLinux.org
Jump to: navigation, search
Line 2: Line 2:
  
 
= '''Security in IoT''' =
 
= '''Security in IoT''' =
 +
== Linux Cryptographic Acceleration on an i.MX6 [ELC 2017] ==
 +
'''Presenter: '''Sean Hudson, Mentor Graphics, Inc. <br>
 +
'''Summary:'''
 +
 +
* [https://elinux.org/images/d/da/2017-02_-_ELC_-_Hudson_-_Linux_Cryptographic_Acceleration_on_an_MX6.pdf PDF] | [https://www.youtube.com/watch?v=mNwwAcK_HJM VIDEO]
 +
 +
='''Others'''=
  
 
== Technical Overview of the Trusted Firmware: A Class Open Source Project [ELC 2020] ==
 
== Technical Overview of the Trusted Firmware: A Class Open Source Project [ELC 2020] ==
Line 49: Line 56:
 
* [https://elinux.org/images/c/c5/IntroductionToReverseEngineering_Anderson.pdf PDF] | [https://www.youtube.com/watch?v=7v7UaMsgg_c VIDEO]  
 
* [https://elinux.org/images/c/c5/IntroductionToReverseEngineering_Anderson.pdf PDF] | [https://www.youtube.com/watch?v=7v7UaMsgg_c VIDEO]  
  
== [ELC] ==
+
== Drinking From the CVE Firehouse: Or How To Ensure Your Open Source Product Survives the Onslaught of Publicly Known Security Vulnerabilities [ELC 2017] ==
'''Presenter:''' <br>
+
'''Presenter: '''Ryan Ware, Intel Corporation <br>
 
'''Summary:'''
 
'''Summary:'''
  
* [PDF] | [VIDEO]  
+
* [https://elinux.org/images/8/8c/Drinking_From_The_CVE_Firehose.pdf PDF] | [https://www.youtube.com/watch?v=WOBU4ibPxVA VIDEO]  
 +
 
 +
== Forward Porting Google Nexus 5X/6P - Lessons from the Trenches and What's Next [ELC 2017] ==
 +
'''Presenter: '''Jeremy McNicoll, Red Hat <br>
 +
'''Summary:'''
 +
 
 +
* [https://elinux.org/images/a/a6/JRM_NEXUS_ELC_2017.pdf PDF] | [https://www.youtube.com/watch?v=77tuFtM4gjA VIDEO]
 +
 
  
== [ELC] ==
+
== Securing the Connected Car[ELC 2017] ==
'''Presenter:''' <br>
+
'''Presenter: '''Eystein Stenberg, Mender.io <br>
 
'''Summary:'''
 
'''Summary:'''
  
* [PDF] | [VIDEO]  
+
* [https://elinux.org/images/4/4a/Securing_the_Connected_Car-Eystein_Stenberg.pdf PDF] | [https://www.youtube.com/watch?v=BoxaquHtnIo VIDEO]  
  
== [ELC] ==
+
== Exporting Virtual Memory as dmabuf [ELC 2017] ==
'''Presenter:''' <br>
+
'''Presenter: '''Nikhil Devshatwar, Texas Instruments <br>
 
'''Summary:'''
 
'''Summary:'''
  
* [PDF] | [VIDEO]  
+
* [https://elinux.org/images/6/6b/ELC-virtmem-exp.pdf PDF] | [https://www.youtube.com/watch?v=LFU39w7lY08 VIDEO]  
  
== [ELC] ==
+
== Securing Embedded Linux Systems with TPM 2.0 [ELC 2017] ==
'''Presenter:''' <br>
+
'''Presenter: '''Philip Tricca, Intel <br>
 
'''Summary:'''
 
'''Summary:'''
  
* [PDF] | [VIDEO]  
+
* [https://elinux.org/images/6/6e/ELC2017_TPM2-and-TSS_Tricca.pdf PDF] | [https://www.youtube.com/watch?v=0qu9R7Tlw9o VIDEO]
  
== [ELC] ==
+
== SecurityPI: IronClad you Raspberry Pi [ELC 2017] ==
'''Presenter:''' <br>
+
'''Presenter: '''Rabimba Karanjai <br>
 
'''Summary:'''
 
'''Summary:'''
  
* [PDF] | [VIDEO]  
+
* [https://www.youtube.com/watch?v=nls9t66ecq8 VIDEO]
  
== [ELC] ==
+
== Zephyr Project: Developed with Security in Mind [ELC 2016] ==
'''Presenter:''' <br>
+
'''Presenter: '''Constanza Health <br>
 
'''Summary:'''
 
'''Summary:'''
  
* [PDF] | [VIDEO]
+
* [https://elinux.org/index.php?title=Special:Upload&wpDestFile=Constanza.pdf PDF] | [https://youtu.be/-LuBclNB5jc VIDEO]

Revision as of 23:37, 5 October 2020

SELinux

Security in IoT

Linux Cryptographic Acceleration on an i.MX6 [ELC 2017]

Presenter: Sean Hudson, Mentor Graphics, Inc.
Summary:

Others

Technical Overview of the Trusted Firmware: A Class Open Source Project [ELC 2020]

Presenter: Sandrine Bailleux & Joanna Farley, Arm
Summary:

Inside the Linux Security Modules (LSM) [ELC 2020]

Presenter: Vandana Salve, Prasme Systems
Summary:

Introduction to Embedded Linux Security [ELC 2020]

Presenter: Sergio Prado, Embedded Labworks
Summary:

The Bad Guys Just Broke My Crypto - What Do I Do? [ELC 2020]

Presenter: Kris Chaplin, Intel UK
Summary:

Open Source CVE Monitoring and Management: Cutting Through the Vulnerability Storm [ELC 2019]

Presenter: Akshay Bhat, Timesys
Summary: This presentation will introduce the process of monitoring CVE's,
determining applicability, assessing the severity and finding fixes.
Some of the challenges in tracking CVE's due to NVD/MITRE feeds having
incorrect/missing data, leading to missed vulnerabilities and a false sense of security has also been covered.


Introduction to Reverse Engineering [ELC 2018]

Presenter: Mike Anderson, The PTR Group, Inc.
Summary: This presentation will covers , the techniques used by the cracker

to reverse engineer your hardware and your software. We will look at 

techniques to bypass physical security as well as repopulating connectors on
motherboards, reading flash storage, accessing firmware updates and the software
techniques used to find vulnerabilities in your code.

Drinking From the CVE Firehouse: Or How To Ensure Your Open Source Product Survives the Onslaught of Publicly Known Security Vulnerabilities [ELC 2017]

Presenter: Ryan Ware, Intel Corporation
Summary:

Forward Porting Google Nexus 5X/6P - Lessons from the Trenches and What's Next [ELC 2017]

Presenter: Jeremy McNicoll, Red Hat
Summary:


Securing the Connected Car[ELC 2017]

Presenter: Eystein Stenberg, Mender.io
Summary:

Exporting Virtual Memory as dmabuf [ELC 2017]

Presenter: Nikhil Devshatwar, Texas Instruments
Summary:

Securing Embedded Linux Systems with TPM 2.0 [ELC 2017]

Presenter: Philip Tricca, Intel
Summary:

SecurityPI: IronClad you Raspberry Pi [ELC 2017]

Presenter: Rabimba Karanjai
Summary:

Zephyr Project: Developed with Security in Mind [ELC 2016]

Presenter: Constanza Health
Summary: