LinuxSecuritySummit2010/Schedule
JamesMorris (Talk | contribs) (→Overview) |
JamesMorris (Talk | contribs) (→Presentations) |
||
(19 intermediate revisions by one user not shown) | |||
Line 1: | Line 1: | ||
− | |||
− | |||
== Overview == | == Overview == | ||
− | This is the schedule for the [[LinuxSecuritySummit2010|Linux Security Summit 2010]], to be held in Boston in conjunction with [http://events.linuxfoundation.org/events/linuxcon Linuxcon] on Monday, August 9th. The format of the event | + | This is the schedule for the [[LinuxSecuritySummit2010|Linux Security Summit 2010]], to be held in Boston in conjunction with [http://events.linuxfoundation.org/events/linuxcon Linuxcon] on Monday, August 9th. The format of the event is a series of selected presentations, followed by a Q&A panel, and lightning talks. ''This schedule is subject to change: check this page for updates.'' |
+ | == Registration == | ||
+ | |||
+ | {| border="1" cellpadding="6" cellspacing="0" | ||
+ | !Time | ||
+ | !Event | ||
+ | !Notes | ||
+ | |- | ||
+ | |08:30 | ||
+ | |LinuxCon Registration and setup | ||
+ | |The registration desk will be open from 8am. Please arrive early enough to register (there may be queues) and get settled: we plan to start at 9am sharp. | ||
+ | |} | ||
− | |||
== Presentations == | == Presentations == | ||
Line 17: | Line 25: | ||
|- | |- | ||
|09:00 | |09:00 | ||
− | |[[LinuxSecuritySummit2010/Abstracts/Walsh_Sandbox|Recent Advances in the SELinux Sandbox]] | + | |[[LinuxSecuritySummit2010/Abstracts/Walsh_Sandbox|Recent Advances in the SELinux Sandbox]] [http://userweb.kernel.org/~jmorris/lss2010_slides/sandbox_new.odp] |
| Dan Walsh, Red Hat | | Dan Walsh, Red Hat | ||
|- | |- | ||
|09:30 | |09:30 | ||
− | |[[LinuxSecuritySummit2010/Abstracts/Brindle_lolcats|in ur webserver, writin ur logs]] | + | |[[LinuxSecuritySummit2010/Abstracts/Brindle_lolcats|in ur webserver, writin ur logs]] [http://userweb.kernel.org/~jmorris/lss2010_slides/lolpolicy.pptx] |
| Joshua Brindle, Tresys | | Joshua Brindle, Tresys | ||
|- | |- | ||
|10:00 | |10:00 | ||
− | |[[LinuxSecuritySummit2010/Abstracts/Hemminger_Vyatta|Integrating Security into Vyatta]] | + | |[[LinuxSecuritySummit2010/Abstracts/Hemminger_Vyatta|Integrating Security into Vyatta]] [http://userweb.kernel.org/~jmorris/lss2010_slides/Whoville.pdf] |
| Stephen Hemminger, Vyatta | | Stephen Hemminger, Vyatta | ||
|- | |- | ||
Line 32: | Line 40: | ||
|- | |- | ||
|11:00 | |11:00 | ||
− | |[[LinuxSecuritySummit2010/Abstracts/Reshetova_MSF_overview|MSF Security Framework Overview]] | + | |[[LinuxSecuritySummit2010/Abstracts/Reshetova_MSF_overview|MSF Security Framework Overview]] [http://userweb.kernel.org/~jmorris/lss2010_slides/reshetova_LinuxCon_overview_v_final.pdf] |
− | | Elena Reshetova, Nokia | + | | Elena Reshetova, Nokia |
|- | |- | ||
|11:30 | |11:30 | ||
− | |[[LinuxSecuritySummit2010/Abstracts/Karhunen_MSF_AC|Access Control in the MSF Security Framework]] | + | |[[LinuxSecuritySummit2010/Abstracts/Karhunen_MSF_AC|Access Control in the MSF Security Framework]] [http://userweb.kernel.org/~jmorris/lss2010_slides/LinuxCon_access_control_v3.pdf] |
− | | Janne Karhunen, Nokia | + | | Janne Karhunen, Nokia |
|- | |- | ||
|''12:00'' | |''12:00'' | ||
Line 43: | Line 51: | ||
|- | |- | ||
|13:00 | |13:00 | ||
− | |[[LinuxSecuritySummit2010/Abstracts/Spengler_Linux|Linux Security in 10 Years]] | + | |[[LinuxSecuritySummit2010/Abstracts/Spengler_Linux|Linux Security in 10 Years]] [http://userweb.kernel.org/~jmorris/lss2010_slides/spender_summit.pdf] |
| Brad Spengler, grsecurity | | Brad Spengler, grsecurity | ||
|- | |- | ||
|13:30 | |13:30 | ||
− | |[[LinuxSecuritySummit2010/Abstracts/Zohar_EVM|Using EVM to protect security extended attributes]] | + | |[[LinuxSecuritySummit2010/Abstracts/Zohar_EVM|Using EVM to protect security extended attributes]] [http://userweb.kernel.org/~jmorris/lss2010_slides/EVM-security-summit.odp] |
|Mimi Zohar, IBM | |Mimi Zohar, IBM | ||
|- | |- | ||
|14:00 | |14:00 | ||
− | |[[LinuxSecuritySummit2010/Abstracts/MacMillan_Secstate|Secstate: Integrating SCAP and Puppet for System Lockdown]] | + | |[[LinuxSecuritySummit2010/Abstracts/MacMillan_Secstate|Secstate: Integrating SCAP and Puppet for System Lockdown]] [http://userweb.kernel.org/~jmorris/lss2010_slides/Secstate_Overview.pdf] |
|Karl MacMillan, Tresys | |Karl MacMillan, Tresys | ||
|- | |- | ||
Line 58: | Line 66: | ||
|- | |- | ||
|15:00 | |15:00 | ||
− | |[[LinuxSecuritySummit2010/Abstracts/Cook_Tree|Widely Used But Out-Of-Tree]] | + | |[[LinuxSecuritySummit2010/Abstracts/Cook_Tree|Widely Used But Out-Of-Tree]] [http://userweb.kernel.org/~jmorris/lss2010_slides/out-of-tree.pdf] |
|Kees Cook, Canonical | |Kees Cook, Canonical | ||
|- | |- | ||
|15:30 | |15:30 | ||
− | |[[LinuxSecuritySummit2010/Abstracts/Schreuders_FBAC|Linux Security Usability: Restricting Programs Using SELinux, AppArmor and FBAC-LSM]] | + | |[[LinuxSecuritySummit2010/Abstracts/Schreuders_FBAC|Linux Security Usability: Restricting Programs Using SELinux, AppArmor and FBAC-LSM]] [http://userweb.kernel.org/~jmorris/lss2010_slides/Schreuders_Linux_Security_Summit.pdf] |
|Z. Cliffe Schreuders, Murdoch University | |Z. Cliffe Schreuders, Murdoch University | ||
|- | |- | ||
|16:00 | |16:00 | ||
− | |[[LinuxSecuritySummit2010/Abstracts/Gallagher_SSSD|System Security Services Daemon (SSSD)]] | + | |[[LinuxSecuritySummit2010/Abstracts/Gallagher_SSSD|System Security Services Daemon (SSSD)]] [http://userweb.kernel.org/~jmorris/lss2010_slides/sssd_slides.odp] |
|Stephen Gallagher, Red Hat | |Stephen Gallagher, Red Hat | ||
|- | |- | ||
Line 72: | Line 80: | ||
|colspan="2" |''break'' | |colspan="2" |''break'' | ||
|} | |} | ||
− | |||
== Panel == | == Panel == | ||
Line 80: | Line 87: | ||
!Time | !Time | ||
!Topic | !Topic | ||
+ | !Panel Members | ||
!Moderator | !Moderator | ||
|- | |- | ||
|17:00 | |17:00 | ||
− | |The viability of a Linux | + | |The viability of a standard Linux security API |
+ | |Kees Cook, Serge Hallyn, Stephen Smalley | ||
|Casey Schaufler, Smack Project | |Casey Schaufler, Smack Project | ||
|- | |- | ||
|17:20 | |17:20 | ||
|Open Q&A | |Open Q&A | ||
+ | |As above, plus Casey | ||
|Paul Moore, HP | |Paul Moore, HP | ||
|} | |} | ||
− | |||
== Lightning talks and closing == | == Lightning talks and closing == | ||
From approximately 18:00 to 18:30, we'll hold lightning talks and wrap up the event. | From approximately 18:00 to 18:30, we'll hold lightning talks and wrap up the event. | ||
+ | |||
+ | |||
+ | {| border="1" cellpadding="6" cellspacing="0" | ||
+ | !Time | ||
+ | !Event | ||
+ | !Moderator | ||
+ | |- | ||
+ | |18:00 | ||
+ | |Lightning Talks (5mins each) | ||
+ | |Joshua Brindle, Tresys | ||
+ | |- | ||
+ | |''18:30'' | ||
+ | |colspan="2"|''finish'' | ||
+ | |} | ||
+ | |||
Lightning talks will be five minutes in length, with up to six slots. Topics will be accepted on the day, with priority given to topics not accepted as main presentations. | Lightning talks will be five minutes in length, with up to six slots. Topics will be accepted on the day, with priority given to topics not accepted as main presentations. |
Latest revision as of 21:22, 24 August 2010
Contents |
[edit] Overview
This is the schedule for the Linux Security Summit 2010, to be held in Boston in conjunction with Linuxcon on Monday, August 9th. The format of the event is a series of selected presentations, followed by a Q&A panel, and lightning talks. This schedule is subject to change: check this page for updates.
[edit] Registration
Time | Event | Notes |
---|---|---|
08:30 | LinuxCon Registration and setup | The registration desk will be open from 8am. Please arrive early enough to register (there may be queues) and get settled: we plan to start at 9am sharp. |
[edit] Presentations
Presentation sessions are 30 minutes in length, including discussion.
Time | Title | Presenter |
---|---|---|
09:00 | Recent Advances in the SELinux Sandbox [1] | Dan Walsh, Red Hat |
09:30 | in ur webserver, writin ur logs [2] | Joshua Brindle, Tresys |
10:00 | Integrating Security into Vyatta [3] | Stephen Hemminger, Vyatta |
10:30 | break | |
11:00 | MSF Security Framework Overview [4] | Elena Reshetova, Nokia |
11:30 | Access Control in the MSF Security Framework [5] | Janne Karhunen, Nokia |
12:00 | lunch (self-funded at nearby location) | |
13:00 | Linux Security in 10 Years [6] | Brad Spengler, grsecurity |
13:30 | Using EVM to protect security extended attributes [7] | Mimi Zohar, IBM |
14:00 | Secstate: Integrating SCAP and Puppet for System Lockdown [8] | Karl MacMillan, Tresys |
14:30 | break | |
15:00 | Widely Used But Out-Of-Tree [9] | Kees Cook, Canonical |
15:30 | Linux Security Usability: Restricting Programs Using SELinux, AppArmor and FBAC-LSM [10] | Z. Cliffe Schreuders, Murdoch University |
16:00 | System Security Services Daemon (SSSD) [11] | Stephen Gallagher, Red Hat |
16:30 | break |
[edit] Panel
The panel session will start with a discussion topic, followed by open Q&A. Members of the panel will be determined closer to the event.
Time | Topic | Panel Members | Moderator |
---|---|---|---|
17:00 | The viability of a standard Linux security API | Kees Cook, Serge Hallyn, Stephen Smalley | Casey Schaufler, Smack Project |
17:20 | Open Q&A | As above, plus Casey | Paul Moore, HP |
[edit] Lightning talks and closing
From approximately 18:00 to 18:30, we'll hold lightning talks and wrap up the event.
Time | Event | Moderator |
---|---|---|
18:00 | Lightning Talks (5mins each) | Joshua Brindle, Tresys |
18:30 | finish |
Lightning talks will be five minutes in length, with up to six slots. Topics will be accepted on the day, with priority given to topics not accepted as main presentations.