Loading…
This event has ended. View the official site or create your own event → Check it out
This event has ended. Create your own
Don’t miss the Linux Security Summit, be sure to register now! 
View analytic

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Wednesday, August 24
 

15:00

Pre-registration
Wednesday August 24, 2016 15:00 - 17:25
Frontenac Foyer
 
Thursday, August 25
 

08:00

Registration
Thursday August 25, 2016 08:00 - 09:00
Harbour Ballroom Foyer

09:00

Welcome & Opening Remarks - James Morris, Oracle
Speakers
avatar for James Morris

James Morris

Consulting Member Of Technical Staff, Oracle
James Morris is the maintainer of the Linux kernel security subsystem. He is the author of sVirt, multi-category security (MCS), and the kernel cryptographic API; and has contributed to the SELinux, Netfilter, and IPsec projects. He works for Oracle as manager of the mainline Linux kernel development team, from his base in Sydney, Australia. | | http://blog.namei.org/


Thursday August 25, 2016 09:00 - 09:05
Harbour C

09:05

Keynote: Inside the Mind of a Coccinelle Programmer - Julia Lawall, Developer of Coccinelle and Researcher at Inria
Speakers
JL

Julia Lawall

Senior Research Scientist, Inria
Julia Lawall is a Senior Research Scientist at Inria. Her research is at the intersection of programming languages and operating systems. She develops the tool Coccinelle and has over 1000 patches in the Linux kernel based on this work. She has presented her work on Coccinelle at numerous events, including FOSDEM, Linux Plumbers, and the Kernel Summit. She has previously mentored three Outreachy (OPW) interns and has been the Linux Kernel... Read More →


Thursday August 25, 2016 09:05 - 09:55
Harbour C

09:55

Break
Thursday August 25, 2016 09:55 - 10:00
Harbour C

10:00

The State of Kernel Self Protection Project - Kees Cook, Google
Last year the Kernel Self-Protection Project was kicked off to address gaps in Linux's defensive technologies. With Linux reaching into every corner of modern life, it becomes an ever-increasing target for attackers and much more needs to be done to harden the kernel so it can project itself. A quick overview will be shown of what we're trying to protect Linux against, as well as the state of the art in available technologies. Also presented will be a summary of the last year's participation by many people over a wide range of technologies, with a review of KSPP project attempts, accomplishments, active efforts, and an examination of future projects and goals.

Speakers
avatar for Kees Cook

Kees Cook

Security Engineer, Google
Kees Cook has been working with Free Software since 1994. He is currently employed by Google to work on IoT Security. From 2006 to 2011 he worked for Canonical as the Ubuntu Security Team's Tech Lead, and remains on the Ubuntu Technical Board. He has written various utilities including GOPchop and Sendpage, and contributes code to OpenSSH, Inkscape, Wine, MPlayer, and Wireshark. He's been spending most of his time lately focused on security... Read More →



Thursday August 25, 2016 10:00 - 10:45
Harbour C

10:45

Towards Measured Boot Out of the Box - Matthew Garrett, CoreOS
The technology to support measured boot has existed for over a decade, but no mainstream Linux distribution provides it out of the box. Now that we know people are attacking not only the boot chain but the system firmware itself, that's not good enough.

This presentation will cover the reasons for lack of adoption, why we need to do better and what needs to be done to achieve that. It'll also discuss how traditional models of measurement are suboptimal, how we can provide fine-grained measurement in reproducible ways and demonstrate some fun things that we can do with TPMs to improve general quality of life. It'll also describe some additional work distributions can do to make it easier for users to deploy trusted boot in their environments.

Speakers
MG

Matthew Garrett

Principal Security Developer, CoreOS
Matthew Garrett is a security developer at CoreOS, developing technologies to improve the security of containers and the systems that run them. He has a background in firmware integration, power management and fruitfly genetics and so has atypical ideas about system complexity and the ease of reverse engineering. He is a board member of the Free Software Foundation and passionate defender of user freedoms


Thursday August 25, 2016 10:45 - 11:30
Harbour C

11:30

AM Break
Thursday August 25, 2016 11:30 - 11:45
TBA

11:45

Current State of Kernel Audit and Linux Namespaces, Looking Ahead to Containers - Richard Guy Briggs, Red Hat
Namespaces have been around since the mount namespace was introduced over a decade ago and audit was introduced a couple of years later.

Since then, audit's relationship with namespaces has evolved to restrict everything to PID and user initial namespaces for reporting integrity reasons, but then start to loosen things up again, first listening in all network namespaces, then permitting user audit message writes from any PID namespace.

Looking forward, audit will need to run in containers, possibly for distributions, but more likely for docker micro-services to meet new certification requirements. Anchoring the audit daemon in the user namespace with its own rulespace and queue looks to make the most sense. Since the kernel has no concept of containers, identifying namespaces in audit messages will equip tracking tools to follow process events in containers.

Speakers
avatar for Richard Guy Briggs

Richard Guy Briggs

Senior Software Engineer, Red Hat
Richard was an early adopter of Linux, having used it since 1992. He was also a founding board member of Ottawa Canada Linux Users Group and a speaker at the inaugural Ottawa Linux Symposium. Richard has written UNIX and Linux device drivers for telecom, video and network applications and embedded devices, having a good knowledge of IPsec protocols. He is comfortable in C, bash, Perl, with a soldering iron, oscilloscope, at a podium or... Read More →


Thursday August 25, 2016 11:45 - 12:30
Harbour C

12:30

Lunch (Attendees on Own)
Thursday August 25, 2016 12:30 - 14:00
TBA

14:00

AMD x86 Memory Encryption Technologies - David Kaplan, AMD
This presentation will introduce the audience to two new x86 security technologies developed by AMD which utilize new memory encryption hardware to provide new security enhancements. The first feature, Secure Memory Encryption (SME), is designed to protect systems from physical access attacks by encrypting some or all system memory. The second feature, Secure Encrypted Virtualization (SEV) enables the ability to run encrypted virtual machines isolated from the hypervisor. This presentation will include a technical overview of these features, including ISA changes, security benefits, the key management framework, and Linux enablement.

Speakers
DK

David Kaplan

Security Architect, AMD
David is a hardware security architect at AMD who focuses on developing new security technologies across the AMD product line as part of the Security Architecture Research and Development center. He is the lead architect for the AMD memory encryption features and has worked on both CPU and SOC level security features for the last 4 years. David has almost 10 years of experience at AMD with a background in x86 CPU development. He has filed over 30... Read More →


Thursday August 25, 2016 14:00 - 14:45
Harbour C

14:45

Securing Filesystem Images for Unprivileged Containers - James Bottomley, IBM
User Namespaces are an essential tool of container security because they allow apparently privileged (root) execution within a container, while the executing entity is really unprivileged as the host (linux kernel) sees it. Unfortunately, the current cost of using user namespaces is that filesystem writes have to be at the identity seen by the kernel (the unprivileged uid/gid) rather than by the identity the container thinks it has. This is all fine and dandy until we want to share images and archives (even simple tar archives) amongst containers. Having the filesystem identity be the same as the container identity is essential for this sharing and is currently broken. There are at least three mechanisms currently proposed for fixing this: shiftfs (by the author), userns portable roots and filesystem mappings. We'll discuss the pros and cons of each of these approaches.

Speakers
avatar for James Bottomley

James Bottomley

Distinguished Engineer, IBM Research
James Bottomley is a Distinguished Engineer at IBM Research where he works on Cloud and Container technology. He is also Linux Kernel maintainer of the SCSI subsystem. He has been a Director on the Board of the Linux Foundation and Chair of its Technical Advisory Board. He went to university at Cambridge for both his undergraduate and doctoral degrees after which he joined AT&T Bell labs to work on Distributed Lock Manager technology for... Read More →


Thursday August 25, 2016 14:45 - 15:30
Harbour C

15:30

PM Break
Thursday August 25, 2016 15:30 - 15:45
TBA

15:45

Minijail: Running Untrusted Programs Safely - Jorge Lucangeli Obes, Google
The Linux kernel provides several sandboxing, containment and privilege-dropping features. Many of these features provide the same functionality, while others compose nicely to create de-privileged running environments for executing untrusted code.

In this talk we’ll describe Minijail, a sandboxing and containment tool initially developed for Chrome OS and now used across Google, including client platforms (like Android) and server environments (like Chrome’s fuzzing infrastructure ClusterFuzz). Minijail is also used outside of Google to create sandboxed environments in coding competitions, build farms and everything in between.

Finally, we’ll describe how Minijail is used in Chrome OS to implement a containerized version of Android that allows Chrome OS devices to run Android applications natively.

Speakers
avatar for Jorge Lucangeli Obes

Jorge Lucangeli Obes

Software Engineer, Google Inc.
Jorge is the platform security lead for Brillo, Google's Android-based operating system for Internet-connected devices. Before working on Brillo and Android, Jorge worked on Chrome OS security. He has presented on Chrome OS security at Ekoparty, IATP Secure By Default (organized by CESG), and internal security summits at Google.


Thursday August 25, 2016 15:45 - 16:30
Harbour C

16:30

On the Way to Safe Containers - Stephane Graber, Canonical
LXC and now LXD are both container managers with a focus on providing a VM-like, system container experience to their users. Our users therefore expect to be able to do the same things they would in a VM and to have an environment that's by and large as safe as a VM.

Our containers security story is mostly based on the user namespace, on top of which we layer apparmor, seccomp, capabilities, filesystem quotas, qdisc limits and cgroups restrictions. The result is a container which cannot accidentally harm the host, is root safe and if properly configured, cannot trivially DoS the host.

This talk will cover all of the above technologies and how they're used to provide our containers, what their limitations are, how the system can still be abused and some of the proposed fixes for those limitations.

Speakers
avatar for Stéphane Graber

Stéphane Graber

Software Engineer, Canonical Ltd.
Stéphane Graber works as the technical lead for LXD at Canonical Ltd. He is the upstream project leader for LXC and LXD and a frequent speaker and track leader at the various containers and other Linux related events.Stéphane is also a long time contributor to the Ubuntu Linuxdistribution as an Ubuntu Core Developer and he currently sitson the Ubuntu Technical Board.On his spare time, Stéphane helps organize a yearly securityconference and... Read More →


Thursday August 25, 2016 16:30 - 17:15
Harbour C
 
Friday, August 26
 

08:00

Registration & Breakfast
Friday August 26, 2016 08:00 - 09:00
Harbour Ballroom Foyer

09:00

Smack in 2016 - Casey Schaufler, The Smack Project
Smack in 2016 - The annual Smack update. An overview of the changes to Smack in the past year.

Speakers
CS

Casey Schaufler

Engineer, The Smack Project
Casey Schaufler started programming Unix kernels at the end of the 1970's, when megabytes were for disc drives and C was still written in K&R style. He started working on system security in the Orange Book era, contributing to SunOS/MLS, Trusted Irix and the POSIX P1003.1e/2c drafts. During this time he implemented access control lists, mandatory access control, extended filesystem attributes, X11 access controls, network protocols and more audit... Read More →


Friday August 26, 2016 09:00 - 09:20
Harbour C

09:20

09:40

TPM - Jarkko Sakkinen, Intel
Speakers
avatar for Jarkko Sakkinen

Jarkko Sakkinen

Software Engineer, Intel Corp.


Friday August 26, 2016 09:40 - 10:00
Harbour C

10:00

SELinux - Paul Moore, Red Hat
Speakers
avatar for Paul Moore

Paul Moore

Software Engineer, Red Hat
Paul has been a working on various Linux security projects since 2004. In addition to starting the libseccomp project, Paul is currently serving as the Linux Kernel Maintainer for the SELinux, audit, and labeled networking subsystems.



Friday August 26, 2016 10:00 - 10:20
Harbour C

10:20

AppArmor - John Johansen
Speakers
JJ

John Johansen

Security Engineer, Canonical Group Ltd


Friday August 26, 2016 10:20 - 10:40
Harbour C

10:40

Seecomp - Kees Cook, Google
Speakers
avatar for Kees Cook

Kees Cook

Security Engineer, Google
Kees Cook has been working with Free Software since 1994. He is currently employed by Google to work on IoT Security. From 2006 to 2011 he worked for Canonical as the Ubuntu Security Team's Tech Lead, and remains on the Ubuntu Technical Board. He has written various utilities including GOPchop and Sendpage, and contributes code to OpenSSH, Inkscape, Wine, MPlayer, and Wireshark. He's been spending most of his time lately focused on security... Read More →



Friday August 26, 2016 10:40 - 11:00
Harbour C

11:00

AM Break
Friday August 26, 2016 11:00 - 11:15
Harbour C

11:15

Design and Implementation of a Security Architecture for Critical Infrastructure Industrial Control Systems in the Era of Nation State Cyber Warfare - David Safford, GE
GE electrical generation and distribution systems provide over 50% of all electrical power used in the world. GE is also a major supplier of critical components in aviation, transportation, and medical systems. Unfortunately, we are now in the era of nation-state cyber warfare. The Stuxnet and Ukraine incidents demonstrated attacks on industrial control systems that breached air gaps, and permanently bricked components.

At GE Research, we are prototyping a new security architecture across our x86, PPC, and ARM based industrial control systems. It includes hardware roots of trust for secure and trusted boot, along with firmware, hypervisors, operating systems, applications, and network and cloud services with integrity measurement, appraisal, and attestation. We will give an overview of the architecture, status of the reference implementations and products, and remaining gaps.

Speakers
avatar for David Safford

David Safford

Senior Principal Engineer, GE
David Safford is a Senior Principal Engineer at General Electric's Global Research Center (GRC), where he works on solutions for control system security for all business units. His primary area of research is in hardware root's of trust for security in a Linux environment. He formerly worked at IBM's T.J. Watson Research Center, was Director of Supercomputing and Networking at Texas A&M University, and was a weapon system test pilot and submarine... Read More →


Friday August 26, 2016 11:15 - 12:00
Harbour C

12:00

Android: Protecting the Kernel - Jeffrey Vander Stoep, Google
Root isn’t what it used to be. SELinux and DAC capabilities have disarmed the typical root process on Android. This has forced rooting exploits to target the source of sandbox enforcement - the Linux kernel. The goal is simple, disable SELinux and restore root to its former glory!

This talk will describe where and how the kernel is being attacked, kernel protections added to AOSP/Android-N, and ideas and prototypes for new protections.

Speakers
JV

Jeffrey Vander Stoep

Jeff Vander Stoep is a software engineer on the Android security team at Google where he is working on improving the security of the Android platform.


Friday August 26, 2016 12:00 - 12:45
Harbour C

12:45

Lunch (Attendees on Own)
Friday August 26, 2016 12:45 - 14:00
TBA

14:00

Opportunistic Encryption Using IPsec - Paul Wouters, Libreswan IPsec VPN Project
Opportunistic IPsec (Paul Wouters, Red Hat) - Leveraging the XFRM code inside the kernel, the libreswan IKE daemon can create XFRM kernel so it will be notified of each new netflow. It uses this information to encrypt as much of the host's traffic as possible towards other hosts with the same IPsec capability. In addition to packet-triggered events, it can also hook itself into the system via DNS calls, attempting to setup IPsec encryption before the application has even been given the IP address to contact.

By supporting different authentication mechanisms, such as X.509 certificates, GSSAPI, or DNSSEC secured IPSECKEY records, this method can be deployed on any enterprise or cloud platform or even for internet hosts at large.

Wouters will show how to configure Opportunistic IPsec for an X.509 based cloud deployment and for internet-wide deployment using LetsEncrypt.

Speakers
avatar for Paul Wouters

Paul Wouters

Security, IPsec, DNSSEC, Red Hat
Paul Wouters is one of the core developers for the Libreswan IPsec VPN project. He is an active IETF member in security and DNS related working groups and author of several RFC's related to IPsec and DNS. He is one of the IETF liaisons for ICANN's Technical Experts Group and a member of the ICANN DNSSEC Root zone Key Signing Key Design Team. He is the co-chair of the IETF Certificate Transparency working group. | | Paul is currently the... Read More →


Friday August 26, 2016 14:00 - 14:45
Harbour C

14:45

(Ab)using Linux as a Trusted Bootloader - Eric Richter, IBM
Petitboot is a kexec-based bootloader that (ab)uses Linux to boot Linux, and is used as part of OpenPOWER firmware. By leveraging the linux-integrity subsystem, minimal kernel modifications are needed to transform Petitboot into a trusted boot loader. This talk will provide an overview of Petitboot, describe trusted boot on OpenPOWER and the changes to the kernel required to make it a trusted bootloader. This work also lays a foundation for using Petitboot as a secure bootloader.

Speakers
ER

Eric Richter

Eric Richter is a software developer for the Linux Technology Center in IBM. He obtained | his Bachelor of Science degree in Computer Science and Mathematics at Clarkson University. At | Clarkson, he participated as a member and director of the Clarkson Open Source Institute: a | student-run organization focused on the promotion and development of free and open source | software. He started at IBM in June of 2015 as part of a team designing... Read More →


Friday August 26, 2016 14:45 - 15:30
Harbour C

15:30

PM Break
Friday August 26, 2016 15:30 - 15:45
TBA

15:45

Integrity Protection and Access Control - Who Do You Trust? - Glenn Wurster, BlackBerry
Without file-system and boot integrity for all storage, on-line access control against a physical attacker is a masquerade. Using an off-line attack, an attacker can change the permissions, contents, and even the SELinux label of a file not integrity protected. What does SELinux do if it can't trust its labels? One solution is to encrypt all file-systems using hardware backed keys. In this talk I will start by talking about a LSM created for the BlackBerry Priv that ties running with elevated privileges (including SEAndroid domains) to integrity protection. The approach is designed to limit the risk of a system service executing a binary on the user data partition with elevated privileges. After talking about the specific LSM developed, I will expand the focus to the general intersection between integrity protection and access control.

Speakers
avatar for Glenn Wurster

Glenn Wurster

Principal Security Researcher, BlackBerry
Glenn Wurster is currently a Principal Security Researcher with BlackBerry. He has presented at conferences including Usenix Enigma, ACM CCS, Usenix HotSec, and IEEE S&P. He co-chaired ACM SPSM in 2015 and is on the program committee for Usenix WOOT and ACM SPSM in 2016. He is currently involved in operating system security for both Linux (as a result of his ongoing work with the Android based BlackBerry Priv smartphone) and QNX (as a result of... Read More →


Friday August 26, 2016 15:45 - 16:30
Harbour C

16:30

Birds of a Feather Session
Friday August 26, 2016 16:30 - 17:30
Harbour C