Difference between revisions of "Security Presentations"

From eLinux.org
Jump to: navigation, search
(Getting Your Patches in Mainline Linux: What Not To Do (and a Few Things You Could Try Instead) [ELCE 2018])
(Getting Your Patches in Mainline Linux: What Not To Do (and a Few Things You Could Try Instead) [ELCE 2018])
Line 130: Line 130:
 
Sub-System, Crypto API and protected keys usage.<br>
 
Sub-System, Crypto API and protected keys usage.<br>
 
* [https://elinux.org/images/e/ea/Under_Lock_And_Key_ELC_2019.pdf PDF] | [https://youtu.be/GbcpwUBFGDw?list=PLbzoR-pLrL6pamOj4UifcMJf560Ph6mJp VIDEO]
 
* [https://elinux.org/images/e/ea/Under_Lock_And_Key_ELC_2019.pdf PDF] | [https://youtu.be/GbcpwUBFGDw?list=PLbzoR-pLrL6pamOj4UifcMJf560Ph6mJp VIDEO]
 
== Getting Your Patches in Mainline Linux: What Not To Do (and a Few Things You Could Try Instead) [ELCE 2018] ==
 
'''Presenter: '''Marc Zyngier, ARM <br>
 
'''Summary:'''
 
 
* [https://elinux.org/images/2/26/Getting-Your-Patches-in-Mainline-Linux-What-Not-To-Do-and-a-Few-Things-You-Could-Try-Instead-Marc-Zyngier-ARM.pdf PDF] | [https://youtu.be/LIdznotOxvg VIDEO]
 
  
 
== Using Seccomp to Limit the Kernel Attack Surface [ELCE 2018] ==
 
== Using Seccomp to Limit the Kernel Attack Surface [ELCE 2018] ==

Revision as of 06:46, 6 October 2020

Contents

SELinux

Securing Embedded Linux [ELC 2016]

Presenter: Michael E. Anderson, The PTR Group
Summary: This presentation talks about the attackers, Secure boot techniques
encryption, certificates, code signing and digital signatures.Also discusses
about characteristics of a secure system and steps to secure the data center,
border gateway and the edge devices.

Creating a Secure Router Using SELinux [ELC 2010]

Presenter: Mike Anderson
Summary: This presentation provides information about the problem of
securing a firewall/router, SELinux, layering security on an
example device and debugging the security policy.

Development of Embedded SE Linux [ELC 2008]

Presenter: Yuichi Nakamura
Summary: This presentation talks about What is SELinux, difficulties in
Embedded SELinux, development of Embedded SELinux and application
to various devices.

Comparison of Secure OSes and embedded SELinux activity in Japan [ELC 2007]

Presenter: Yuichi Nakamura
Summary: These slides give information about SELinux & AppArmor
and about SELinux activities in Japan.

Security in embedded devices

Introduction to Embedded Linux Security [ELC 2020]

Presenter: Sergio Prado, Embedded Labworks
Summary: This presentation talks about security, secure boot
concepts and it's implementation.

Handling Top Security Threats for Connected Embedded Devices [ELC 2016]

Presenter: Eystein Stenberg, Mender.io
Summary: This talk will explain the most effective strategies
and detail the practical steps needed to tackle top security
threats for connected embedded devices.

Understanding Threat Models for Embedded Devices [ELC 2010]

Presenter: Jake Edge
Summary: This presentation talks about potential threats, threat model
and protection of data for embedded devices.

Security issues for embedded devices [ELC 2009]

Presenter: Jake Edge
Summary: These slides give information about the attack surface ,attacks and
attackers and security issues for embedded devices.

Recent Security Features and Issues in Embedded Systems [ELC 2008]

Presenter: KaiGai Kohei
Summary: This presentation discusses about evolution of OS security, sorting
out security requirements and recent security features and issues in
embedded systems.


Others

Technical Overview of the Trusted Firmware: A Class Open Source Project [ELC 2020]

Presenter: Sandrine Bailleux & Joanna Farley, Arm
Summary: This presentation talks about what is Trusted Firmware-A
and how to rearchitecturing the Secure World Software.

Inside the Linux Security Modules (LSM) [ELC 2020]

Presenter: Vandana Salve, Prasme Systems
Summary: This presentation provides information on Linux Security
Modules(LSM),integration of an LSM into the linux kernel,
architecture and types of LSMs.


The Bad Guys Just Broke My Crypto - What Do I Do? [ELC 2020]

Presenter: Kris Chaplin, Intel UK
Summary: This presentation give information about secure communication
and methods to protect the data.

Open Source CVE Monitoring and Management: Cutting Through the Vulnerability Storm [ELC 2019]

Presenter: Akshay Bhat, Timesys
Summary: This presentation will introduce the process of monitoring CVE's,
determining applicability, assessing the severity and finding fixes.
Some of the challenges in tracking CVE's due to NVD/MITRE feeds having
incorrect/missing data.

Safety vs Security: A Tale of Two Updates [ELCE 2019]

Presenter: Jeremy Rosen, Smile.fr
Summary: This talk is about Philosophy and culture, mainly about Industrial
embedded systems and about safety and security importance.

Under Lock & Key: Using Hardware Protected Keys with the Linux Crypto API [ELCE 2019]

Presenter: Gilad, Arm
Summary: This presentation gives information about the Linux Cryptography
Sub-System, Crypto API and protected keys usage.

Using Seccomp to Limit the Kernel Attack Surface [ELCE 2018]

Presenter: Michael Kerrisk, man7.org Training and Consulting
Summary:

Collaborate on Linux for Use in Safety-Critical Systems? [ELCE 2018]

Presenter: Lukas Bulwahn, BMW Car IT GmbH
Summary:


Introduction to Reverse Engineering [ELC 2018]

Presenter: Mike Anderson, The PTR Group, Inc.
Summary: This presentation will covers , the techniques used by
the cracker to reverse engineer your hardware and your software.
Also will talk about techniques to bypass physical security .

Drinking From the CVE Firehouse: Or How To Ensure Your Open Source Product Survives the Onslaught of Publicly Known Security Vulnerabilities [ELC 2017]

Presenter: Ryan Ware, Intel Corporation
Summary: This talk will present strategies for how you survive
onslaught allowing you to manage the security of your product
and even make your product better over time.

Securing the Connected Car [ELC 2017]

Presenter: Eystein Stenberg, Mender.io
Summary: This presentation talks about the security risks associated with
connected cars, detailing the Jeep Cherokee hack which gives remote
control of the car and the technical details of this attack and provide
specific security strategies.

Exporting Virtual Memory as dmabuf [ELC 2017]

Presenter: Nikhil Devshatwar, Texas Instruments
Summary: This presentation will discuss some of the challenges faced
in integrating some of the legacy drivers and RTOS applications
with Linux.

Securing Embedded Linux Systems with TPM 2.0 [ELC 2017]

Presenter: Philip Tricca, Intel
Summary: This talk will discuss a threat model that describes the security
goals, the Intel TPM2 software stack (TSS) and the various possible
configurations appropriate for Linux systems from embedded up to servers.

SecurityPI: IronClad you Raspberry Pi [ELC 2017]

Presenter: Rabimba Karanjai
Summary: This presentation talks about the security of a Raspberry Pi 3,
different techniques with code examples.


OP-TEE - Using TrustZone to Protect Our Own Secrets [ELCE 2017]

Presenter: Marc Kleine-Budde, Pengutronix e.
Summary:

Low Level Sensor Programing and Security Enforcement with MRAA [ELCE 2017]

Presenter: Brendan Le Foll, Intel Corporation
Summary:

Security Features for UBIFS [ELCE 2017]

Presenter: Richard Weinberger, sigma star gmbh
Summary:

How I Survived to a SoC with a Terrible Linux BSP [ELCE 2017]

Presenter: Luca Ceresoli, AIM Sportline
Summary:

Zephyr Project: Developed with Security in Mind [ELC 2016]

Presenter: Constanza Health
Summary: These slides give information about the security integration and
methodology for Zephyr project.

Intelligence at the Edge. Embracing the Data Flood [ELC 2016]

Presenter: Andrzej Wieczorek & Niklas Kvarnström, Tieto
Summary: This presentation talks about data and intelligence.
Also discusses three real cases: Manufacturing (pulp), Healthcare and Logistics
(cargo ship).


Secure and Scalable Data Collection Using OpenDOF [ELCE 2015]

Presenter: Bryant Eastham, Panasonic
Summary:

Secure Embedded Linux Product - A Success Story [ELCE 2013]

Presenter: Martin Bis
Summary:

Linux Secured Integrity - Protention Against Remote Attacks [ELCE 2013]

Presenter: Holger Dengler
Summary:

Digital TV and Application Store, Solving Security Problems [ELCE 2009]

Presenter: Vladislav Buzov
Summary: