Difference between revisions of "Security Presentations"

From eLinux.org
Jump to: navigation, search
(Open Source CVE Monitoring and Management: Cutting Through the Vulnerability Storm [ELC 2019])
(Introduction to Reverse Engineering [ELC 2018])
Line 82: Line 82:
 
'''Presenter: '''Mike Anderson, The PTR Group, Inc. <br>
 
'''Presenter: '''Mike Anderson, The PTR Group, Inc. <br>
 
'''Summary:'''
 
'''Summary:'''
This presentation will covers , the techniques used by the cracker<br>
+
This presentation will covers , the techniques used by <br>
to reverse engineer your hardware and your software. We will look at <br>
+
the cracker to reverse engineer your hardware and your software.<br>
techniques to bypass physical security as well as repopulating connectors on <br>
+
Also will talk about techniques to bypass physical security .<br>
motherboards, reading flash storage, accessing firmware updates and the software <br>
 
techniques used to find vulnerabilities in your code.
 
 
* [https://elinux.org/images/c/c5/IntroductionToReverseEngineering_Anderson.pdf PDF] | [https://www.youtube.com/watch?v=7v7UaMsgg_c VIDEO]
 
* [https://elinux.org/images/c/c5/IntroductionToReverseEngineering_Anderson.pdf PDF] | [https://www.youtube.com/watch?v=7v7UaMsgg_c VIDEO]
  

Revision as of 01:45, 6 October 2020

Contents

SELinux

Securing Embedded Linux [ELC 2016]

Presenter: Michael E. Anderson, The PTR Group
Summary: This presentation talks about the attackers, Secure boot techniques
encryption, certificates, code signing and digital signatures.Also discusses
about characteristics of a secure system and steps to secure the data center,
border gateway and the edge devices.

Creating a Secure Router Using SELinux [ELC 2010]

Presenter: Mike Anderson
Summary: This presentation provides information about the problem of
securing a firewall/router, SELinux, layering security on an
example device and debugging the security policy.

Development of Embedded SE Linux [ELC 2008]

Presenter: Yuichi Nakamura
Summary: This presentation talks about What is SELinux, difficulties in
Embedded SELinux, development of Embedded SELinux and application
to various devices.

Comparison of Secure OSes and embedded SELinux activity in Japan [ELC 2007]

Presenter: Yuichi Nakamura
Summary: These slides give information about SELinux & AppArmor
and about SELinux activities in Japan.

Others

Technical Overview of the Trusted Firmware: A Class Open Source Project [ELC 2020]

Presenter: Sandrine Bailleux & Joanna Farley, Arm
Summary: This presentation talks about what is Trusted Firmware-A
and how to rearchitecturing the Secure World Software.

Inside the Linux Security Modules (LSM) [ELC 2020]

Presenter: Vandana Salve, Prasme Systems
Summary: This presentation provides information on Linux Security
Modules(LSM),integration of an LSM into the linux kernel,
architecture and types of LSMs.

Introduction to Embedded Linux Security [ELC 2020]

Presenter: Sergio Prado, Embedded Labworks
Summary: This presentation talks about security, secure boot
concepts and it's implementation.

The Bad Guys Just Broke My Crypto - What Do I Do? [ELC 2020]

Presenter: Kris Chaplin, Intel UK
Summary: This presentation give information about secure communication
and methods to protect the data.

Open Source CVE Monitoring and Management: Cutting Through the Vulnerability Storm [ELC 2019]

Presenter: Akshay Bhat, Timesys
Summary: This presentation will introduce the process of monitoring CVE's,
determining applicability, assessing the severity and finding fixes.
Some of the challenges in tracking CVE's due to NVD/MITRE feeds having
incorrect/missing data.

Introduction to Reverse Engineering [ELC 2018]

Presenter: Mike Anderson, The PTR Group, Inc.
Summary: This presentation will covers , the techniques used by
the cracker to reverse engineer your hardware and your software.
Also will talk about techniques to bypass physical security .

Drinking From the CVE Firehouse: Or How To Ensure Your Open Source Product Survives the Onslaught of Publicly Known Security Vulnerabilities [ELC 2017]

Presenter: Ryan Ware, Intel Corporation
Summary:

Forward Porting Google Nexus 5X/6P - Lessons from the Trenches and What's Next [ELC 2017]

Presenter: Jeremy McNicoll, Red Hat
Summary:


Securing the Connected Car[ELC 2017]

Presenter: Eystein Stenberg, Mender.io
Summary:

Exporting Virtual Memory as dmabuf [ELC 2017]

Presenter: Nikhil Devshatwar, Texas Instruments
Summary:

Securing Embedded Linux Systems with TPM 2.0 [ELC 2017]

Presenter: Philip Tricca, Intel
Summary:

SecurityPI: IronClad you Raspberry Pi [ELC 2017]

Presenter: Rabimba Karanjai
Summary:

Zephyr Project: Developed with Security in Mind [ELC 2016]

Presenter: Constanza Health
Summary:

Handling Top Security Threats for Connected Embedded Devices [ELC 2016]

Presenter: Eystein Stenberg, Mender.io
Summary:

Intelligence at the Edge. Embracing the Data Flood [ELC 2016]

Presenter: Andrzej Wieczorek & Niklas Kvarnström, Tieto
Summary:

Understanding Threat Models for Embedded Devices [ELC 2010]

Presenter: Jake Edge
Summary:

Security issues for embedded devices [ELC 2009]

Presenter: Jake Edge
Summary:

Recent Security Features and Issues in Embedded Systems [ELC 2008]

Presenter: KaiGai Kohei
Summary: