Difference between revisions of "Security Presentations"
(→Open Source CVE Monitoring and Management: Cutting Through the Vulnerability Storm [ELC 2019]) |
(→Introduction to Reverse Engineering [ELC 2018]) |
||
Line 82: | Line 82: | ||
'''Presenter: '''Mike Anderson, The PTR Group, Inc. <br> | '''Presenter: '''Mike Anderson, The PTR Group, Inc. <br> | ||
'''Summary:''' | '''Summary:''' | ||
− | This presentation will covers , the techniques used by | + | This presentation will covers , the techniques used by <br> |
− | to reverse engineer your hardware and your software. | + | the cracker to reverse engineer your hardware and your software.<br> |
− | techniques to bypass physical security | + | Also will talk about techniques to bypass physical security .<br> |
− | |||
− | |||
* [https://elinux.org/images/c/c5/IntroductionToReverseEngineering_Anderson.pdf PDF] | [https://www.youtube.com/watch?v=7v7UaMsgg_c VIDEO] | * [https://elinux.org/images/c/c5/IntroductionToReverseEngineering_Anderson.pdf PDF] | [https://www.youtube.com/watch?v=7v7UaMsgg_c VIDEO] | ||
Revision as of 01:45, 6 October 2020
Contents
- 1 SELinux
- 2 Others
- 2.1 Technical Overview of the Trusted Firmware: A Class Open Source Project [ELC 2020]
- 2.2 Inside the Linux Security Modules (LSM) [ELC 2020]
- 2.3 Introduction to Embedded Linux Security [ELC 2020]
- 2.4 The Bad Guys Just Broke My Crypto - What Do I Do? [ELC 2020]
- 2.5 Open Source CVE Monitoring and Management: Cutting Through the Vulnerability Storm [ELC 2019]
- 2.6 Introduction to Reverse Engineering [ELC 2018]
- 2.7 Drinking From the CVE Firehouse: Or How To Ensure Your Open Source Product Survives the Onslaught of Publicly Known Security Vulnerabilities [ELC 2017]
- 2.8 Forward Porting Google Nexus 5X/6P - Lessons from the Trenches and What's Next [ELC 2017]
- 2.9 Securing the Connected Car[ELC 2017]
- 2.10 Exporting Virtual Memory as dmabuf [ELC 2017]
- 2.11 Securing Embedded Linux Systems with TPM 2.0 [ELC 2017]
- 2.12 SecurityPI: IronClad you Raspberry Pi [ELC 2017]
- 2.13 Zephyr Project: Developed with Security in Mind [ELC 2016]
- 2.14 Handling Top Security Threats for Connected Embedded Devices [ELC 2016]
- 2.15 Intelligence at the Edge. Embracing the Data Flood [ELC 2016]
- 2.16 Understanding Threat Models for Embedded Devices [ELC 2010]
- 2.17 Security issues for embedded devices [ELC 2009]
- 2.18 Recent Security Features and Issues in Embedded Systems [ELC 2008]
SELinux
Securing Embedded Linux [ELC 2016]
Presenter: Michael E. Anderson, The PTR Group
Summary:
This presentation talks about the attackers, Secure boot techniques
encryption, certificates, code signing and digital signatures.Also discusses
about characteristics of a secure system and steps to secure the data center,
border gateway and the edge devices.
Creating a Secure Router Using SELinux [ELC 2010]
Presenter: Mike Anderson
Summary:
This presentation provides information about the problem of
securing a firewall/router, SELinux, layering security on an
example device and debugging the security policy.
Development of Embedded SE Linux [ELC 2008]
Presenter: Yuichi Nakamura
Summary:
This presentation talks about What is SELinux, difficulties in
Embedded SELinux, development of Embedded SELinux and application
to various devices.
Comparison of Secure OSes and embedded SELinux activity in Japan [ELC 2007]
Presenter: Yuichi Nakamura
Summary:
These slides give information about SELinux & AppArmor
and about SELinux activities in Japan.
Others
Technical Overview of the Trusted Firmware: A Class Open Source Project [ELC 2020]
Presenter: Sandrine Bailleux & Joanna Farley, Arm
Summary:
This presentation talks about what is Trusted Firmware-A
and how to rearchitecturing the Secure World Software.
Inside the Linux Security Modules (LSM) [ELC 2020]
Presenter: Vandana Salve, Prasme Systems
Summary:
This presentation provides information on Linux Security
Modules(LSM),integration of an LSM into the linux kernel,
architecture and types of LSMs.
Introduction to Embedded Linux Security [ELC 2020]
Presenter: Sergio Prado, Embedded Labworks
Summary:
This presentation talks about security, secure boot
concepts and it's implementation.
The Bad Guys Just Broke My Crypto - What Do I Do? [ELC 2020]
Presenter: Kris Chaplin, Intel UK
Summary:
This presentation give information about secure communication
and methods to protect the data.
Open Source CVE Monitoring and Management: Cutting Through the Vulnerability Storm [ELC 2019]
Presenter: Akshay Bhat, Timesys
Summary:
This presentation will introduce the process of monitoring CVE's,
determining applicability, assessing the severity and finding fixes.
Some of the challenges in tracking CVE's due to NVD/MITRE feeds having
incorrect/missing data.
Introduction to Reverse Engineering [ELC 2018]
Presenter: Mike Anderson, The PTR Group, Inc.
Summary:
This presentation will covers , the techniques used by
the cracker to reverse engineer your hardware and your software.
Also will talk about techniques to bypass physical security .
Drinking From the CVE Firehouse: Or How To Ensure Your Open Source Product Survives the Onslaught of Publicly Known Security Vulnerabilities [ELC 2017]
Presenter: Ryan Ware, Intel Corporation
Summary:
Forward Porting Google Nexus 5X/6P - Lessons from the Trenches and What's Next [ELC 2017]
Presenter: Jeremy McNicoll, Red Hat
Summary:
Securing the Connected Car[ELC 2017]
Presenter: Eystein Stenberg, Mender.io
Summary:
Exporting Virtual Memory as dmabuf [ELC 2017]
Presenter: Nikhil Devshatwar, Texas Instruments
Summary:
Securing Embedded Linux Systems with TPM 2.0 [ELC 2017]
Presenter: Philip Tricca, Intel
Summary:
SecurityPI: IronClad you Raspberry Pi [ELC 2017]
Presenter: Rabimba Karanjai
Summary:
Zephyr Project: Developed with Security in Mind [ELC 2016]
Presenter: Constanza Health
Summary:
Handling Top Security Threats for Connected Embedded Devices [ELC 2016]
Presenter: Eystein Stenberg, Mender.io
Summary:
Intelligence at the Edge. Embracing the Data Flood [ELC 2016]
Presenter: Andrzej Wieczorek & Niklas Kvarnström, Tieto
Summary:
Understanding Threat Models for Embedded Devices [ELC 2010]
Presenter: Jake Edge
Summary:
Security issues for embedded devices [ELC 2009]
Presenter: Jake Edge
Summary:
Recent Security Features and Issues in Embedded Systems [ELC 2008]
Presenter: KaiGai Kohei
Summary: