Difference between revisions of "Security Presentations"

From eLinux.org
Jump to: navigation, search
(Introduction to Reverse Engineering [ELC 2018])
 
(55 intermediate revisions by 2 users not shown)
Line 3: Line 3:
 
'''Presenter: '''Michael E. Anderson, The PTR Group <br>
 
'''Presenter: '''Michael E. Anderson, The PTR Group <br>
 
'''Summary:'''
 
'''Summary:'''
 +
This presentation talks about the attackers, Secure boot techniques<br>
 +
encryption, certificates, code signing and digital signatures.Also discusses<br>
 +
about characteristics of a secure system and steps to secure the data center, <br>
 +
border gateway and the edge devices.<br>
  
 
* [https://elinux.org/images/5/54/Manderson4.pdf  PDF]
 
* [https://elinux.org/images/5/54/Manderson4.pdf  PDF]
Line 9: Line 13:
 
'''Presenter: '''Mike Anderson  <br>
 
'''Presenter: '''Mike Anderson  <br>
 
'''Summary:'''
 
'''Summary:'''
 +
This presentation provides information about the problem of <br>
 +
securing a firewall/router, SELinux, layering security on an <br>
 +
example device and debugging the security policy.<br>
  
 
* [https://elinux.org/images/8/8f/SELinux_Anderson.pdf PDF]
 
* [https://elinux.org/images/8/8f/SELinux_Anderson.pdf PDF]
Line 15: Line 22:
 
'''Presenter: '''Yuichi Nakamura <br>
 
'''Presenter: '''Yuichi Nakamura <br>
 
'''Summary:'''
 
'''Summary:'''
 +
This presentation talks about What is SELinux, difficulties in <br>
 +
Embedded SELinux, development of Embedded SELinux and application <br>
 +
to various devices.<br>
  
 
* [https://elinux.org/images/a/a3/ELC2008_nakamura.pdf PDF]
 
* [https://elinux.org/images/a/a3/ELC2008_nakamura.pdf PDF]
Line 21: Line 31:
 
'''Presenter: '''Yuichi Nakamura <br>
 
'''Presenter: '''Yuichi Nakamura <br>
 
'''Summary:'''
 
'''Summary:'''
 +
These slides give information about SELinux & AppArmor<br>
 +
and about SELinux activities in Japan.<br>
 +
* [https://elinux.org/images/3/39/SecureOS_nakamura.pdf PDF]
 +
 +
= '''Security in embedded devices''' =
 +
== Introduction to Embedded Linux Security [ELC 2020] ==
 +
'''Presenter: '''Sergio Prado, Embedded Labworks <br>
 +
'''Summary:'''
 +
This presentation talks about security, secure boot <br>
 +
concepts and it's implementation.<br>
 +
 +
* [https://elinux.org/images/1/16/Introduction_embedded_linux_security.pdf PDF] | [https://www.youtube.com/watch?v=McuP1_mvE_g VIDEO]
 +
 +
== Handling Top Security Threats for Connected Embedded Devices [ELC 2016] ==
 +
'''Presenter: '''Eystein Stenberg, Mender.io <br>
 +
'''Summary:'''
 +
This talk will explain the most effective strategies <br>
 +
and detail the practical steps needed to tackle top security<br>
 +
threats for connected embedded devices.<br>
 +
 +
* [https://elinux.org/index.php?title=Special:Upload&wpDestFile=Stenberg.pdf PDF] | [https://youtu.be/xRZU_cr53uE VIDEO]
 +
 +
== Understanding Threat Models for Embedded Devices [ELC 2010] ==
 +
'''Presenter: ''' Jake Edge<br>
 +
'''Summary:'''
 +
This presentation talks about potential threats, threat model<br>
 +
and protection of data for embedded devices.<br>
 +
 +
* [https://elinux.org/images/6/6c/Edge-Elc-2010.pdf PDF] | [https://elinux.org/images/b/b1/Edge-Elc-2010.odp ODP]
  
* [https://elinux.org/images/3/39/SecureOS_nakamura.pdf PDF]
+
== Security issues for embedded devices [ELC 2009] ==
 +
'''Presenter: '''Jake Edge <br>
 +
'''Summary:'''
 +
These slides give information about the attack surface ,attacks and <br>
 +
attackers and security issues for embedded devices.<br>
 +
 
 +
* [https://elinux.org/images/6/6f/Security-issues.pdf PDF]
 +
 
 +
== Recent Security Features and Issues in Embedded Systems [ELC 2008] ==
 +
'''Presenter: '''KaiGai Kohei <br>
 +
'''Summary:'''
 +
This presentation discusses about evolution of OS security, sorting <br>
 +
out security requirements and recent security features and issues in<br>
 +
embedded systems.<br>
 +
 
 +
* [https://elinux.org/images/e/e2/ELC2008_KaiGai.pdf PDF]
 +
 
 +
='''Crypto'''=
 +
 
 +
== Under Lock & Key: Using Hardware Protected Keys with the Linux Crypto API [ELCE 2019] ==
 +
'''Presenter: '''Gilad, Arm <br>
 +
'''Summary:'''
 +
This presentation gives information about the Linux <br>
 +
Cryptography Sub-System, Crypto API and protected keys usage.<br>
 +
 
 +
* [https://elinux.org/images/e/ea/Under_Lock_And_Key_ELC_2019.pdf PDF] | [https://youtu.be/GbcpwUBFGDw?list=PLbzoR-pLrL6pamOj4UifcMJf560Ph6mJp VIDEO]
 +
 
 +
== Cryptography Basics for Embedded Developers [ELC 2016] ==
 +
'''Presenter: '''Eystein Stenberg, Mender.io <br>
 +
'''Summary:'''
 +
This presentation provides information about the basic mechanisms of <br>
 +
cryptography, like encryption, signatures, and key storage. <br>
 +
 
 +
* [https://elinux.org/images/6/67/Estenberg2.pdf PDF] | [https://youtu.be/bCKrk7KqPNM VIDEO]
 +
 
 +
== An Overview of the Linux Kernel Crypto Subsystem [ELCE] ==
 +
'''Presenter: '''Boris Brezillon, Free Electrons <br>
 +
'''Summary:'''
 +
This presentation provides an introduction to cryptographic algorithms<br>
 +
and discusses questions related to Crypto subsystem.
 +
 
 +
* [https://elinux.org/images/a/a4/Brezillon-crypto-framework_0.pdf PDF] | [https://youtu.be/2JRgBr_5jsI VIDEO]
 +
 
 +
= '''Tomoyo''' =
 +
 
 +
== How to Analyze Your Linux's Behavior with TOMOYO Linux [ELC 2008] ==
 +
'''Presenter:''' Kentaro Takeda <br>
 +
'''Summary:'''
 +
This presentation analyses Tomoyo Linux and talks about <br>
 +
ways to configure different security policies in the same. <br>
 +
 
 +
* [http://sourceforge.jp/projects/tomoyo/document/elc2008.pdf PDF]
 +
 
 +
== TomoyoLinux - A Lightweight and Manageable Security System for PC and Embedded Linux [ELC 2007] ==
 +
'''Presenter:''' ToshiharuHarada, Tetsuo Handa <br>
 +
'''Summary:'''
 +
This presentation talks about Tomoyo Linux -- which is a <br>
 +
lightweight security system for PC and Embedded Linux. <br>
 +
 
 +
* [http://sourceforge.jp/projects/tomoyo/document/elc2007-presentation-20070418.pdf/en/4/elc2007-presentation-20070418.pdf PDF]
  
= '''Security in IoT''' =
+
== TomoyoLinux - Tutorial [ELC 2007] ==
== Linux Cryptographic Acceleration on an i.MX6 [ELC 2017] ==
+
'''Presenter:''' Kei Masumoto, Kentaro Takeda <br>
'''Presenter: '''Sean Hudson, Mentor Graphics, Inc. <br>
 
 
'''Summary:'''
 
'''Summary:'''
 +
This presentation gives basic knowledge of Tomoyo Linux <br>
 +
and also talks about basic configurations on the same. <br>
  
* [https://elinux.org/images/d/da/2017-02_-_ELC_-_Hudson_-_Linux_Cryptographic_Acceleration_on_an_MX6.pdf PDF] | [https://www.youtube.com/watch?v=mNwwAcK_HJM VIDEO]  
+
* [http://sourceforge.jp/projects/tomoyo/document/elc2007-tutorial-20070418.pdf PDF]
  
 
='''Others'''=
 
='''Others'''=
Line 36: Line 135:
 
'''Presenter: ''' Sandrine Bailleux & Joanna Farley, Arm<br>
 
'''Presenter: ''' Sandrine Bailleux & Joanna Farley, Arm<br>
 
'''Summary:'''
 
'''Summary:'''
 +
This presentation talks about what is Trusted Firmware-A  <br>
 +
and how to rearchitecturing the Secure World Software.<br>
  
* [https://elinux.org/images/0/05/Elc-tfa.pdf PDF] | [https://www.youtube.com/watch?v=0ALBfpjJoC4 VIDEO]  
+
* [https://elinux.org/images/0/05/Elc-tfa.pdf PDF] | [https://www.youtube.com/watch?v=0ALBfpjJoC4 VIDEO]
  
 
== Inside the Linux Security Modules (LSM)  [ELC 2020] ==
 
== Inside the Linux Security Modules (LSM)  [ELC 2020] ==
 
'''Presenter: '''Vandana Salve, Prasme Systems <br>
 
'''Presenter: '''Vandana Salve, Prasme Systems <br>
 
'''Summary:'''
 
'''Summary:'''
 
+
This presentation provides information on Linux Security <br>
* [https://elinux.org/images/0/0a/ELC_Inside_LSM.pdf PDF] | [https://www.youtube.com/watch?v=RKBBPsp-TZ0 VIDEO]
+
Modules(LSM),integration of an LSM into the linux kernel,<br>
 
+
architecture and types of LSMs.<br>
== Introduction to Embedded Linux Security [ELC 2020] ==
+
* [https://elinux.org/images/0/0a/ELC_Inside_LSM.pdf PDF] | [https://www.youtube.com/watch?v=RKBBPsp-TZ0 VIDEO]
'''Presenter: '''Sergio Prado, Embedded Labworks <br>
 
'''Summary:'''
 
 
 
* [https://elinux.org/images/1/16/Introduction_embedded_linux_security.pdf PDF] | [https://www.youtube.com/watch?v=McuP1_mvE_g VIDEO]  
 
  
 
== The Bad Guys Just Broke My Crypto - What Do I Do?  [ELC 2020] ==
 
== The Bad Guys Just Broke My Crypto - What Do I Do?  [ELC 2020] ==
 
'''Presenter: '''Kris Chaplin, Intel UK <br>
 
'''Presenter: '''Kris Chaplin, Intel UK <br>
 
'''Summary:'''
 
'''Summary:'''
 +
This presentation give information about secure communication<br>
 +
and methods to protect the data.<br>
  
* [https://www.youtube.com/watch?v=-3klh4Eo_hE VIDEO]  
+
* [https://www.youtube.com/watch?v=-3klh4Eo_hE VIDEO]
  
 
== Open Source CVE Monitoring and Management: Cutting Through the Vulnerability Storm [ELC 2019] ==
 
== Open Source CVE Monitoring and Management: Cutting Through the Vulnerability Storm [ELC 2019] ==
Line 63: Line 162:
 
determining applicability, assessing the severity and finding fixes. <br>
 
determining applicability, assessing the severity and finding fixes. <br>
 
Some of the challenges in tracking CVE's due to NVD/MITRE feeds having <br>
 
Some of the challenges in tracking CVE's due to NVD/MITRE feeds having <br>
incorrect/missing data, leading to missed vulnerabilities and a false sense of
+
incorrect/missing data. <br>
security has also been covered.<br>
 
  
* [https://elinux.org/images/0/0a/Open-Source-CVE-Monitoring-and-Management-V3.pdf PDF] | [https://www.youtube.com/watch?v=cCzb0lewVj4 VIDEO]  
+
* [https://elinux.org/images/0/0a/Open-Source-CVE-Monitoring-and-Management-V3.pdf PDF] | [https://www.youtube.com/watch?v=cCzb0lewVj4 VIDEO]
  
 +
==  Safety vs Security: A Tale of Two Updates [ELCE 2019] ==
 +
'''Presenter: '''Jeremy Rosen, Smile.fr <br>
 +
'''Summary:'''
 +
This talk is about Philosophy and culture, mainly about Industrial <br>
 +
embedded systems and about safety and security importance.<br>
 +
 +
* [https://elinux.org/images/9/94/Surete_v_securite.pdf PDF] | [https://youtu.be/Tte8PKDVp-Y?list=PLbzoR-pLrL6pamOj4UifcMJf560Ph6mJp VIDEO]
 +
 +
== tpm2-software.github.io - Enabling the TPM2.0 Ecosystem in Linux [ELCE 2019] ==
 +
'''Presenter: '''Andreas Fuchs, Infineon Technologies AG <br>
 +
'''Summary:'''
 +
This presentation provides information about basics of the TPM2.0 and <br>
 +
certain use cases using the tpm2-software stack. <br>
 +
 +
* [https://elinux.org/images/8/84/OSSEU-2019-tpm2-Fuchs.pdf PDF] | [https://youtu.be/JlpQX1_bofA?list=PLbzoR-pLrL6pamOj4UifcMJf560Ph6mJp VIDEO]
 +
 +
== Using Seccomp to Limit the Kernel Attack Surface [ELCE 2018] ==
 +
'''Presenter: '''Michael Kerrisk, man7.org Training and Consulting <br>
 +
'''Summary:'''
 +
This presentation talks about Seccomp, Seccomp filtering and BPF, <br>
 +
the BPF virtual machine and BPF instructions and productivity aids.<br>
 +
 +
* [https://elinux.org/images/a/ae/Using-Seccomp-to-Limit-the-Kernel-Attack-Surface-Michael-Kerrisk-man7.org-Training-and-Consulting.pdf PDF] | [https://youtu.be/-hmG5An2bN8 VIDEO]
  
 
== Introduction to Reverse Engineering [ELC 2018] ==
 
== Introduction to Reverse Engineering [ELC 2018] ==
 
'''Presenter: '''Mike Anderson, The PTR Group, Inc. <br>
 
'''Presenter: '''Mike Anderson, The PTR Group, Inc. <br>
 
'''Summary:'''
 
'''Summary:'''
This presentation will covers , the techniques used by the cracker<br>
+
This presentation will covers , the techniques used by <br>
to reverse engineer your hardware and your software. We will look at <br>
+
the cracker to reverse engineer your hardware and your software.<br>
techniques to bypass physical security as well as repopulating connectors on <br>
+
Also will talk about techniques to bypass physical security .<br>
motherboards, reading flash storage, accessing firmware updates and the software <br>
 
techniques used to find vulnerabilities in your code.
 
 
* [https://elinux.org/images/c/c5/IntroductionToReverseEngineering_Anderson.pdf PDF] | [https://www.youtube.com/watch?v=7v7UaMsgg_c VIDEO]
 
* [https://elinux.org/images/c/c5/IntroductionToReverseEngineering_Anderson.pdf PDF] | [https://www.youtube.com/watch?v=7v7UaMsgg_c VIDEO]
  
Line 82: Line 201:
 
'''Presenter: '''Ryan Ware, Intel Corporation <br>
 
'''Presenter: '''Ryan Ware, Intel Corporation <br>
 
'''Summary:'''
 
'''Summary:'''
 +
This talk will present strategies for how you survive <br>
 +
onslaught allowing you to manage the security of your product <br>
 +
and even make your product better over time.<br>
  
* [https://elinux.org/images/8/8c/Drinking_From_The_CVE_Firehose.pdf PDF] | [https://www.youtube.com/watch?v=WOBU4ibPxVA VIDEO]
+
* [https://elinux.org/images/8/8c/Drinking_From_The_CVE_Firehose.pdf PDF] | [https://www.youtube.com/watch?v=WOBU4ibPxVA VIDEO]
 
 
== Forward Porting Google Nexus 5X/6P - Lessons from the Trenches and What's Next [ELC 2017] ==
 
'''Presenter: '''Jeremy McNicoll, Red Hat <br>
 
'''Summary:'''
 
 
 
* [https://elinux.org/images/a/a6/JRM_NEXUS_ELC_2017.pdf PDF] | [https://www.youtube.com/watch?v=77tuFtM4gjA VIDEO]  
 
  
 
+
== Securing the Connected Car [ELC 2017] ==
== Securing the Connected Car[ELC 2017] ==
 
 
'''Presenter: '''Eystein Stenberg, Mender.io <br>
 
'''Presenter: '''Eystein Stenberg, Mender.io <br>
 
'''Summary:'''
 
'''Summary:'''
 +
This presentation talks about the security risks associated with <br>
 +
connected cars, detailing the Jeep Cherokee hack which gives remote<br>
 +
control of the car and the technical details of this attack and provide<br>
 +
specific security strategies.
  
* [https://elinux.org/images/4/4a/Securing_the_Connected_Car-Eystein_Stenberg.pdf PDF] | [https://www.youtube.com/watch?v=BoxaquHtnIo VIDEO]  
+
* [https://elinux.org/images/4/4a/Securing_the_Connected_Car-Eystein_Stenberg.pdf PDF] | [https://www.youtube.com/watch?v=BoxaquHtnIo VIDEO]
  
== Exporting Virtual Memory as dmabuf [ELC 2017] ==
+
== The Aftermath of a Fuzz Run: What to do about those Crashes? [ELC 2017]==
'''Presenter: '''Nikhil Devshatwar, Texas Instruments <br>
+
'''Presenter:''' David Moore, FuzzStation <br>
 
'''Summary:'''
 
'''Summary:'''
 +
This session will describe tools, tactics and techniques for performing post <br>
 +
fuzz (Fuzzing -- means of finding security vulnerabilities) run analysis on <br>
 +
the resulting crashes with the goal of fixing the vulnerabilities. <br>
  
* [https://elinux.org/images/6/6b/ELC-virtmem-exp.pdf PDF] | [https://www.youtube.com/watch?v=LFU39w7lY08 VIDEO]  
+
* [https://elinux.org/images/b/b0/ELCdeck-final-Moore.pdf PDF] | [https://www.youtube.com/watch?v=I4LMhzDGhgE VIDEO]
  
 
== Securing Embedded Linux Systems with TPM 2.0 [ELC 2017] ==
 
== Securing Embedded Linux Systems with TPM 2.0 [ELC 2017] ==
 
'''Presenter: '''Philip Tricca, Intel <br>
 
'''Presenter: '''Philip Tricca, Intel <br>
 
'''Summary:'''
 
'''Summary:'''
 
+
This talk will discuss a threat model that describes the security<br>
 +
goals, the Intel TPM2 software stack (TSS) and the various possible <br>
 +
configurations appropriate for Linux systems from embedded up to servers.<br>
 
* [https://elinux.org/images/6/6e/ELC2017_TPM2-and-TSS_Tricca.pdf PDF] | [https://www.youtube.com/watch?v=0qu9R7Tlw9o VIDEO]
 
* [https://elinux.org/images/6/6e/ELC2017_TPM2-and-TSS_Tricca.pdf PDF] | [https://www.youtube.com/watch?v=0qu9R7Tlw9o VIDEO]
  
Line 113: Line 237:
 
'''Presenter: '''Rabimba Karanjai <br>
 
'''Presenter: '''Rabimba Karanjai <br>
 
'''Summary:'''
 
'''Summary:'''
 +
This presentation talks about the security of a Raspberry Pi 3, <br>
 +
different techniques with code examples. <br>
  
 
* [https://www.youtube.com/watch?v=nls9t66ecq8 VIDEO]
 
* [https://www.youtube.com/watch?v=nls9t66ecq8 VIDEO]
  
== Zephyr Project: Developed with Security in Mind [ELC 2016] ==
+
== OP-TEE - Using TrustZone to Protect Our Own Secrets [ELCE 2017] ==
'''Presenter: '''Constanza Health <br>
+
'''Presenter: '''Marc Kleine-Budde, Pengutronix e. <br>
 +
'''Summary:'''
 +
This presentation gives information about ARM architecture, ARM TrustZone,<br>
 +
Trusted Execution Environment and Open Portable Trusted Execution Environment.<br>
 +
 
 +
* [https://elinux.org/images/e/e6/OP-TEE-Using_TrustZone_to_Protect_Our_Own_Secrets-20171023-2.pdf PDF] | [https://www.youtube.com/watch?v=IB0FmmPUPD4 VIDEO]
 +
 
 +
== Low Level Sensor Programing and Security Enforcement with MRAA [ELCE 2017] ==
 +
'''Presenter: '''Brendan Le Foll, Intel Corporation <br>
 
'''Summary:'''
 
'''Summary:'''
 +
This talk will explain how the power of MRAA associated with AGL <br>
 +
development tools offer a novel approach to sensor and control programming <br>
 +
in a secured environment.
  
* [https://elinux.org/index.php?title=Special:Upload&wpDestFile=Constanza.pdf PDF] | [https://youtu.be/-LuBclNB5jc VIDEO]
+
* [https://elinux.org/images/d/d0/Mraa-agl-elce.pdf PDF] | [https://youtu.be/uGkUelrzYcc VIDEO]
  
== Handling Top Security Threats for Connected Embedded Devices [ELC 2016] ==
+
== Security Features for UBIFS [ELCE 2017] ==
'''Presenter: '''Eystein Stenberg, Mender.io <br>
+
'''Presenter: '''Richard Weinberger, sigma star gmbh <br>
 
'''Summary:'''
 
'''Summary:'''
 +
This talk explains what kind of protection fscrypt brings<br>
 +
to the MTD stack and how to use it.<br>
  
* [https://elinux.org/index.php?title=Special:Upload&wpDestFile=Stenberg.pdf PDF] | [https://youtu.be/xRZU_cr53uE VIDEO]  
+
* [https://elinux.org/images/d/d3/Z3fold.pdf PDF] | [https://youtu.be/eP0HxgTB6bE VIDEO]
 +
 
 +
== Zephyr Project: Developed with Security in Mind [ELC 2016] ==
 +
'''Presenter: '''Constanza Health <br>
 +
'''Summary:'''
 +
These slides give information about the security integration and <br>
 +
methodology for Zephyr project.
 +
* [https://elinux.org/index.php?title=Special:Upload&wpDestFile=Constanza.pdf PDF] | [https://youtu.be/-LuBclNB5jc VIDEO]
  
 
== Intelligence at the Edge. Embracing the Data Flood  [ELC 2016] ==
 
== Intelligence at the Edge. Embracing the Data Flood  [ELC 2016] ==
 
'''Presenter: '''Andrzej Wieczorek & Niklas Kvarnström, Tieto <br>
 
'''Presenter: '''Andrzej Wieczorek & Niklas Kvarnström, Tieto <br>
 
'''Summary:'''
 
'''Summary:'''
 +
This presentation talks about data and intelligence.<br>
 +
Also discusses three real cases: Manufacturing (pulp), Healthcare and Logistics<br>
 +
(cargo ship).
 +
* [https://elinux.org/index.php?title=Special:Upload&wpDestFile=Tieto.pdf PDF] | [https://youtu.be/PSpLwe_157s VIDEO]
  
* [https://elinux.org/index.php?title=Special:Upload&wpDestFile=Tieto.pdf PDF] | [https://youtu.be/PSpLwe_157s VIDEO]
+
== Secure and Scalable Data Collection Using OpenDOF [ELCE 2015] ==
 +
'''Presenter: '''Bryant Eastham, Panasonic <br>
 +
'''Summary:'''
 +
This presentation talks about the OpenDOF Project, data <br>
 +
collection and manipulation and persisting data.<br>
  
== Understanding Threat Models for Embedded Devices [ELC] ==
+
* [https://elinux.org/images/8/8a/Secure_Data_Transfer_using_OpenDOF_-_Presentation.pdf PDF] | [https://www.youtube.com/watch?v=C-LBFb5jSxQ VIDEO]
'''Presenter: ''' Jake Edge<br>
+
 
 +
== Secure Embedded Linux Product - A Success Story [ELCE 2013] ==
 +
'''Presenter: '''Martin Bis <br>
 
'''Summary:'''
 
'''Summary:'''
 +
These slides discuss about Embedded security,<br>
 +
attack vector and surface and a practical example <br>
 +
of secured embedded Linux system.
  
* [https://elinux.org/images/6/6c/Edge-Elc-2010.pdf PDF] | [https://elinux.org/images/b/b1/Edge-Elc-2010.odp ODP]  
+
* [https://elinux.org/images/2/2f/SecureEmbeddedLinuxproduct_Bis.pdf PDF]
  
== Security issues for embedded devices [ELC 2009] ==
+
== Linux Secured Integrity - Protention Against Remote Attacks [ELCE 2013] ==
'''Presenter: '''Jake Edge <br>
+
'''Presenter: '''Holger Dengler <br>
 
'''Summary:'''
 
'''Summary:'''
 +
These slides give information about embedded systems environment,<br>
 +
classic boot and about verifying boot.<br>
  
* [https://elinux.org/images/6/6f/Security-issues.pdf PDF]  
+
* [https://elinux.org/images/7/72/Dengler-linux_secured_integrity_2013elce.pdf PDF]
  
== Recent Security Features and Issues in Embedded Systems [ELC 2008] ==
+
== Digital TV and Application Store, Solving Security Problems [ELCE 2009] ==
'''Presenter: '''KaiGai Kohei <br>
+
'''Presenter: '''Vladislav Buzov <br>
 
'''Summary:'''
 
'''Summary:'''
 
+
This presentation provides information about the security<br>
* [https://elinux.org/images/e/e2/ELC2008_KaiGai.pdf PDF]
+
issues associated with third-party applications on digital TV and discusses <br>
 +
about approaches to fix the issues.<br>
 +
 +
* [https://elinux.org/images/0/06/Buzov-SMACK.pdf PDF]

Latest revision as of 06:40, 5 November 2020

Contents

SELinux

Securing Embedded Linux [ELC 2016]

Presenter: Michael E. Anderson, The PTR Group
Summary: This presentation talks about the attackers, Secure boot techniques
encryption, certificates, code signing and digital signatures.Also discusses
about characteristics of a secure system and steps to secure the data center,
border gateway and the edge devices.

Creating a Secure Router Using SELinux [ELC 2010]

Presenter: Mike Anderson
Summary: This presentation provides information about the problem of
securing a firewall/router, SELinux, layering security on an
example device and debugging the security policy.

Development of Embedded SE Linux [ELC 2008]

Presenter: Yuichi Nakamura
Summary: This presentation talks about What is SELinux, difficulties in
Embedded SELinux, development of Embedded SELinux and application
to various devices.

Comparison of Secure OSes and embedded SELinux activity in Japan [ELC 2007]

Presenter: Yuichi Nakamura
Summary: These slides give information about SELinux & AppArmor
and about SELinux activities in Japan.

Security in embedded devices

Introduction to Embedded Linux Security [ELC 2020]

Presenter: Sergio Prado, Embedded Labworks
Summary: This presentation talks about security, secure boot
concepts and it's implementation.

Handling Top Security Threats for Connected Embedded Devices [ELC 2016]

Presenter: Eystein Stenberg, Mender.io
Summary: This talk will explain the most effective strategies
and detail the practical steps needed to tackle top security
threats for connected embedded devices.

Understanding Threat Models for Embedded Devices [ELC 2010]

Presenter: Jake Edge
Summary: This presentation talks about potential threats, threat model
and protection of data for embedded devices.

Security issues for embedded devices [ELC 2009]

Presenter: Jake Edge
Summary: These slides give information about the attack surface ,attacks and
attackers and security issues for embedded devices.

Recent Security Features and Issues in Embedded Systems [ELC 2008]

Presenter: KaiGai Kohei
Summary: This presentation discusses about evolution of OS security, sorting
out security requirements and recent security features and issues in
embedded systems.

Crypto

Under Lock & Key: Using Hardware Protected Keys with the Linux Crypto API [ELCE 2019]

Presenter: Gilad, Arm
Summary: This presentation gives information about the Linux
Cryptography Sub-System, Crypto API and protected keys usage.

Cryptography Basics for Embedded Developers [ELC 2016]

Presenter: Eystein Stenberg, Mender.io
Summary: This presentation provides information about the basic mechanisms of
cryptography, like encryption, signatures, and key storage.

An Overview of the Linux Kernel Crypto Subsystem [ELCE]

Presenter: Boris Brezillon, Free Electrons
Summary: This presentation provides an introduction to cryptographic algorithms
and discusses questions related to Crypto subsystem.

Tomoyo

How to Analyze Your Linux's Behavior with TOMOYO Linux [ELC 2008]

Presenter: Kentaro Takeda
Summary: This presentation analyses Tomoyo Linux and talks about
ways to configure different security policies in the same.

TomoyoLinux - A Lightweight and Manageable Security System for PC and Embedded Linux [ELC 2007]

Presenter: ToshiharuHarada, Tetsuo Handa
Summary: This presentation talks about Tomoyo Linux -- which is a
lightweight security system for PC and Embedded Linux.

TomoyoLinux - Tutorial [ELC 2007]

Presenter: Kei Masumoto, Kentaro Takeda
Summary: This presentation gives basic knowledge of Tomoyo Linux
and also talks about basic configurations on the same.

Others

Technical Overview of the Trusted Firmware: A Class Open Source Project [ELC 2020]

Presenter: Sandrine Bailleux & Joanna Farley, Arm
Summary: This presentation talks about what is Trusted Firmware-A
and how to rearchitecturing the Secure World Software.

Inside the Linux Security Modules (LSM) [ELC 2020]

Presenter: Vandana Salve, Prasme Systems
Summary: This presentation provides information on Linux Security
Modules(LSM),integration of an LSM into the linux kernel,
architecture and types of LSMs.

The Bad Guys Just Broke My Crypto - What Do I Do? [ELC 2020]

Presenter: Kris Chaplin, Intel UK
Summary: This presentation give information about secure communication
and methods to protect the data.

Open Source CVE Monitoring and Management: Cutting Through the Vulnerability Storm [ELC 2019]

Presenter: Akshay Bhat, Timesys
Summary: This presentation will introduce the process of monitoring CVE's,
determining applicability, assessing the severity and finding fixes.
Some of the challenges in tracking CVE's due to NVD/MITRE feeds having
incorrect/missing data.

Safety vs Security: A Tale of Two Updates [ELCE 2019]

Presenter: Jeremy Rosen, Smile.fr
Summary: This talk is about Philosophy and culture, mainly about Industrial
embedded systems and about safety and security importance.

tpm2-software.github.io - Enabling the TPM2.0 Ecosystem in Linux [ELCE 2019]

Presenter: Andreas Fuchs, Infineon Technologies AG
Summary: This presentation provides information about basics of the TPM2.0 and
certain use cases using the tpm2-software stack.

Using Seccomp to Limit the Kernel Attack Surface [ELCE 2018]

Presenter: Michael Kerrisk, man7.org Training and Consulting
Summary: This presentation talks about Seccomp, Seccomp filtering and BPF,
the BPF virtual machine and BPF instructions and productivity aids.

Introduction to Reverse Engineering [ELC 2018]

Presenter: Mike Anderson, The PTR Group, Inc.
Summary: This presentation will covers , the techniques used by
the cracker to reverse engineer your hardware and your software.
Also will talk about techniques to bypass physical security .

Drinking From the CVE Firehouse: Or How To Ensure Your Open Source Product Survives the Onslaught of Publicly Known Security Vulnerabilities [ELC 2017]

Presenter: Ryan Ware, Intel Corporation
Summary: This talk will present strategies for how you survive
onslaught allowing you to manage the security of your product
and even make your product better over time.

Securing the Connected Car [ELC 2017]

Presenter: Eystein Stenberg, Mender.io
Summary: This presentation talks about the security risks associated with
connected cars, detailing the Jeep Cherokee hack which gives remote
control of the car and the technical details of this attack and provide
specific security strategies.

The Aftermath of a Fuzz Run: What to do about those Crashes? [ELC 2017]

Presenter: David Moore, FuzzStation
Summary: This session will describe tools, tactics and techniques for performing post
fuzz (Fuzzing -- means of finding security vulnerabilities) run analysis on
the resulting crashes with the goal of fixing the vulnerabilities.

Securing Embedded Linux Systems with TPM 2.0 [ELC 2017]

Presenter: Philip Tricca, Intel
Summary: This talk will discuss a threat model that describes the security
goals, the Intel TPM2 software stack (TSS) and the various possible
configurations appropriate for Linux systems from embedded up to servers.

SecurityPI: IronClad you Raspberry Pi [ELC 2017]

Presenter: Rabimba Karanjai
Summary: This presentation talks about the security of a Raspberry Pi 3,
different techniques with code examples.

OP-TEE - Using TrustZone to Protect Our Own Secrets [ELCE 2017]

Presenter: Marc Kleine-Budde, Pengutronix e.
Summary: This presentation gives information about ARM architecture, ARM TrustZone,
Trusted Execution Environment and Open Portable Trusted Execution Environment.

Low Level Sensor Programing and Security Enforcement with MRAA [ELCE 2017]

Presenter: Brendan Le Foll, Intel Corporation
Summary: This talk will explain how the power of MRAA associated with AGL
development tools offer a novel approach to sensor and control programming
in a secured environment.

Security Features for UBIFS [ELCE 2017]

Presenter: Richard Weinberger, sigma star gmbh
Summary: This talk explains what kind of protection fscrypt brings
to the MTD stack and how to use it.

Zephyr Project: Developed with Security in Mind [ELC 2016]

Presenter: Constanza Health
Summary: These slides give information about the security integration and
methodology for Zephyr project.

Intelligence at the Edge. Embracing the Data Flood [ELC 2016]

Presenter: Andrzej Wieczorek & Niklas Kvarnström, Tieto
Summary: This presentation talks about data and intelligence.
Also discusses three real cases: Manufacturing (pulp), Healthcare and Logistics
(cargo ship).

Secure and Scalable Data Collection Using OpenDOF [ELCE 2015]

Presenter: Bryant Eastham, Panasonic
Summary: This presentation talks about the OpenDOF Project, data
collection and manipulation and persisting data.

Secure Embedded Linux Product - A Success Story [ELCE 2013]

Presenter: Martin Bis
Summary: These slides discuss about Embedded security,
attack vector and surface and a practical example
of secured embedded Linux system.

Linux Secured Integrity - Protention Against Remote Attacks [ELCE 2013]

Presenter: Holger Dengler
Summary: These slides give information about embedded systems environment,
classic boot and about verifying boot.

Digital TV and Application Store, Solving Security Problems [ELCE 2009]

Presenter: Vladislav Buzov
Summary: This presentation provides information about the security
issues associated with third-party applications on digital TV and discusses
about approaches to fix the issues.