Security Presentations
Contents
- 1 SELinux
- 2 Security in IoT
- 3 Others
- 3.1 Technical Overview of the Trusted Firmware: A Class Open Source Project [ELC 2020]
- 3.2 Inside the Linux Security Modules (LSM) [ELC 2020]
- 3.3 Introduction to Embedded Linux Security [ELC 2020]
- 3.4 The Bad Guys Just Broke My Crypto - What Do I Do? [ELC 2020]
- 3.5 Open Source CVE Monitoring and Management: Cutting Through the Vulnerability Storm [ELC 2019]
- 3.6 Introduction to Reverse Engineering [ELC 2018]
- 3.7 Drinking From the CVE Firehouse: Or How To Ensure Your Open Source Product Survives the Onslaught of Publicly Known Security Vulnerabilities [ELC 2017]
- 3.8 Forward Porting Google Nexus 5X/6P - Lessons from the Trenches and What's Next [ELC 2017]
- 3.9 Securing the Connected Car[ELC 2017]
- 3.10 Exporting Virtual Memory as dmabuf [ELC 2017]
- 3.11 Securing Embedded Linux Systems with TPM 2.0 [ELC 2017]
- 3.12 SecurityPI: IronClad you Raspberry Pi [ELC 2017]
- 3.13 Zephyr Project: Developed with Security in Mind [ELC 2016]
SELinux
Security in IoT
Linux Cryptographic Acceleration on an i.MX6 [ELC 2017]
Presenter: Sean Hudson, Mentor Graphics, Inc.
Summary:
Others
Technical Overview of the Trusted Firmware: A Class Open Source Project [ELC 2020]
Presenter: Sandrine Bailleux & Joanna Farley, Arm
Summary:
Inside the Linux Security Modules (LSM) [ELC 2020]
Presenter: Vandana Salve, Prasme Systems
Summary:
Introduction to Embedded Linux Security [ELC 2020]
Presenter: Sergio Prado, Embedded Labworks
Summary:
The Bad Guys Just Broke My Crypto - What Do I Do? [ELC 2020]
Presenter: Kris Chaplin, Intel UK
Summary:
Open Source CVE Monitoring and Management: Cutting Through the Vulnerability Storm [ELC 2019]
Presenter: Akshay Bhat, Timesys
Summary:
This presentation will introduce the process of monitoring CVE's,
determining applicability, assessing the severity and finding fixes.
Some of the challenges in tracking CVE's due to NVD/MITRE feeds having
incorrect/missing data, leading to missed vulnerabilities and a false sense of
security has also been covered.
Introduction to Reverse Engineering [ELC 2018]
Presenter: Mike Anderson, The PTR Group, Inc.
Summary:
This presentation will covers , the techniques used by the cracker
to reverse engineer your hardware and your software. We will look at
techniques to bypass physical security as well as repopulating connectors on
motherboards, reading flash storage, accessing firmware updates and the software
techniques used to find vulnerabilities in your code.
Drinking From the CVE Firehouse: Or How To Ensure Your Open Source Product Survives the Onslaught of Publicly Known Security Vulnerabilities [ELC 2017]
Presenter: Ryan Ware, Intel Corporation
Summary:
Forward Porting Google Nexus 5X/6P - Lessons from the Trenches and What's Next [ELC 2017]
Presenter: Jeremy McNicoll, Red Hat
Summary:
Securing the Connected Car[ELC 2017]
Presenter: Eystein Stenberg, Mender.io
Summary:
Exporting Virtual Memory as dmabuf [ELC 2017]
Presenter: Nikhil Devshatwar, Texas Instruments
Summary:
Securing Embedded Linux Systems with TPM 2.0 [ELC 2017]
Presenter: Philip Tricca, Intel
Summary:
SecurityPI: IronClad you Raspberry Pi [ELC 2017]
Presenter: Rabimba Karanjai
Summary:
Zephyr Project: Developed with Security in Mind [ELC 2016]
Presenter: Constanza Health
Summary: