Difference between revisions of "Security Presentations"

From eLinux.org
Jump to: navigation, search
(Creating a Secure Router Using SELinux [ELC 2010])
(SELinux)
Line 5: Line 5:
  
 
* [https://elinux.org/images/5/54/Manderson4.pdf  PDF]
 
* [https://elinux.org/images/5/54/Manderson4.pdf  PDF]
 +
 +
== Creating a Secure Router Using SELinux [ELC 2010] ==
 +
'''Presenter: '''Mike Anderson  <br>
 +
'''Summary:'''
 +
 +
* [https://elinux.org/images/8/8f/SELinux_Anderson.pdf PDF]
  
 
= '''Security in IoT''' =
 
= '''Security in IoT''' =

Revision as of 23:50, 5 October 2020

Contents

SELinux

Securing Embedded Linux [ELC 2016]

Presenter: Michael E. Anderson, The PTR Group
Summary:

Creating a Secure Router Using SELinux [ELC 2010]

Presenter: Mike Anderson
Summary:

Security in IoT

Linux Cryptographic Acceleration on an i.MX6 [ELC 2017]

Presenter: Sean Hudson, Mentor Graphics, Inc.
Summary:

Others

Technical Overview of the Trusted Firmware: A Class Open Source Project [ELC 2020]

Presenter: Sandrine Bailleux & Joanna Farley, Arm
Summary:

Inside the Linux Security Modules (LSM) [ELC 2020]

Presenter: Vandana Salve, Prasme Systems
Summary:

Introduction to Embedded Linux Security [ELC 2020]

Presenter: Sergio Prado, Embedded Labworks
Summary:

The Bad Guys Just Broke My Crypto - What Do I Do? [ELC 2020]

Presenter: Kris Chaplin, Intel UK
Summary:

Open Source CVE Monitoring and Management: Cutting Through the Vulnerability Storm [ELC 2019]

Presenter: Akshay Bhat, Timesys
Summary: This presentation will introduce the process of monitoring CVE's,
determining applicability, assessing the severity and finding fixes.
Some of the challenges in tracking CVE's due to NVD/MITRE feeds having
incorrect/missing data, leading to missed vulnerabilities and a false sense of security has also been covered.


Introduction to Reverse Engineering [ELC 2018]

Presenter: Mike Anderson, The PTR Group, Inc.
Summary: This presentation will covers , the techniques used by the cracker

to reverse engineer your hardware and your software. We will look at 

techniques to bypass physical security as well as repopulating connectors on
motherboards, reading flash storage, accessing firmware updates and the software
techniques used to find vulnerabilities in your code.

Drinking From the CVE Firehouse: Or How To Ensure Your Open Source Product Survives the Onslaught of Publicly Known Security Vulnerabilities [ELC 2017]

Presenter: Ryan Ware, Intel Corporation
Summary:

Forward Porting Google Nexus 5X/6P - Lessons from the Trenches and What's Next [ELC 2017]

Presenter: Jeremy McNicoll, Red Hat
Summary:


Securing the Connected Car[ELC 2017]

Presenter: Eystein Stenberg, Mender.io
Summary:

Exporting Virtual Memory as dmabuf [ELC 2017]

Presenter: Nikhil Devshatwar, Texas Instruments
Summary:

Securing Embedded Linux Systems with TPM 2.0 [ELC 2017]

Presenter: Philip Tricca, Intel
Summary:

SecurityPI: IronClad you Raspberry Pi [ELC 2017]

Presenter: Rabimba Karanjai
Summary:

Zephyr Project: Developed with Security in Mind [ELC 2016]

Presenter: Constanza Health
Summary:

Handling Top Security Threats for Connected Embedded Devices [ELC 2016]

Presenter: Eystein Stenberg, Mender.io
Summary:

Intelligence at the Edge. Embracing the Data Flood [ELC 2016]

Presenter: Andrzej Wieczorek & Niklas Kvarnström, Tieto
Summary:

Understanding Threat Models for Embedded Devices [ELC]

Presenter: Jake Edge
Summary:

Security issues for embedded devices [ELC 2009]

Presenter: Jake Edge
Summary:

Recent Security Features and Issues in Embedded Systems [ELC 2008]

Presenter: KaiGai Kohei
Summary:

Development of Embedded SE Linux [ELC 2008]

Presenter: Yuichi Nakamura
Summary:

Comparison of Secure OSes and embedded SELinux activity in Japan [ELC 2007]

Presenter: Yuichi Nakamura
Summary: