LinuxSecuritySummit2010/Schedule

From Linux Security Wiki (obsolete)
(Difference between revisions)
Jump to: navigation, search
(Panel)
(Presentations)
 
(15 intermediate revisions by one user not shown)
Line 1: Line 1:
''' *** DRAFT *** ''' ''' *** DRAFT *** ''' ''' *** DRAFT *** '''
 
 
 
== Overview ==
 
== Overview ==
  
This is the schedule for the [[LinuxSecuritySummit2010|Linux Security Summit 2010]], to be held in Boston in conjunction with [http://events.linuxfoundation.org/events/linuxcon Linuxcon] on Monday, August 9th. The format of the event will be selected presentations with discussion, followed by a Q&A panel, and lightning talks.  ''Note that this schedule is subject to change: check this page for updates.''
+
This is the schedule for the [[LinuxSecuritySummit2010|Linux Security Summit 2010]], to be held in Boston in conjunction with [http://events.linuxfoundation.org/events/linuxcon Linuxcon] on Monday, August 9th. The format of the event is a series of selected presentations, followed by a Q&A panel, and lightning talks.  ''This schedule is subject to change: check this page for updates.''
 +
 
 +
== Registration ==
 +
 
 +
{| border="1" cellpadding="6" cellspacing="0"
 +
!Time
 +
!Event
 +
!Notes
 +
|-
 +
|08:30
 +
|LinuxCon Registration and setup
 +
|The registration desk will be open from 8am.  Please arrive early enough to register (there may be queues) and get settled: we plan to start at 9am sharp.
 +
|}
  
  
Line 15: Line 25:
 
|-
 
|-
 
|09:00
 
|09:00
|[[LinuxSecuritySummit2010/Abstracts/Walsh_Sandbox|Recent Advances in the SELinux Sandbox]]  
+
|[[LinuxSecuritySummit2010/Abstracts/Walsh_Sandbox|Recent Advances in the SELinux Sandbox]]  [http://userweb.kernel.org/~jmorris/lss2010_slides/sandbox_new.odp]
| Dan Walsh, Red Hat <sup>*</sup>
+
| Dan Walsh, Red Hat
 
|-
 
|-
 
|09:30
 
|09:30
|[[LinuxSecuritySummit2010/Abstracts/Brindle_lolcats|in ur webserver, writin ur logs]]  
+
|[[LinuxSecuritySummit2010/Abstracts/Brindle_lolcats|in ur webserver, writin ur logs]]  [http://userweb.kernel.org/~jmorris/lss2010_slides/lolpolicy.pptx]
| Joshua Brindle, Tresys <sup>*</sup>
+
| Joshua Brindle, Tresys
 
|-
 
|-
 
|10:00
 
|10:00
|[[LinuxSecuritySummit2010/Abstracts/Hemminger_Vyatta|Integrating Security into Vyatta]]  
+
|[[LinuxSecuritySummit2010/Abstracts/Hemminger_Vyatta|Integrating Security into Vyatta]]  [http://userweb.kernel.org/~jmorris/lss2010_slides/Whoville.pdf]
 
| Stephen Hemminger, Vyatta
 
| Stephen Hemminger, Vyatta
 
|-
 
|-
Line 30: Line 40:
 
|-
 
|-
 
|11:00
 
|11:00
|[[LinuxSecuritySummit2010/Abstracts/Reshetova_MSF_overview|MSF Security Framework Overview]]  
+
|[[LinuxSecuritySummit2010/Abstracts/Reshetova_MSF_overview|MSF Security Framework Overview]]  [http://userweb.kernel.org/~jmorris/lss2010_slides/reshetova_LinuxCon_overview_v_final.pdf]
| Elena Reshetova, Nokia Meego
+
| Elena Reshetova, Nokia
 
|-
 
|-
 
|11:30
 
|11:30
|[[LinuxSecuritySummit2010/Abstracts/Karhunen_MSF_AC|Access Control in the MSF Security Framework]]  
+
|[[LinuxSecuritySummit2010/Abstracts/Karhunen_MSF_AC|Access Control in the MSF Security Framework]] [http://userweb.kernel.org/~jmorris/lss2010_slides/LinuxCon_access_control_v3.pdf]
| Janne Karhunen, Nokia Meego
+
| Janne Karhunen, Nokia
 
|-
 
|-
 
|''12:00''
 
|''12:00''
Line 41: Line 51:
 
|-
 
|-
 
|13:00
 
|13:00
|[[LinuxSecuritySummit2010/Abstracts/Spengler_Linux|Linux Security in 10 Years]]
+
|[[LinuxSecuritySummit2010/Abstracts/Spengler_Linux|Linux Security in 10 Years]]  [http://userweb.kernel.org/~jmorris/lss2010_slides/spender_summit.pdf]
 
| Brad Spengler, grsecurity
 
| Brad Spengler, grsecurity
 
|-
 
|-
 
|13:30
 
|13:30
|[[LinuxSecuritySummit2010/Abstracts/Zohar_EVM|Using EVM to protect security extended attributes]]
+
|[[LinuxSecuritySummit2010/Abstracts/Zohar_EVM|Using EVM to protect security extended attributes]]  [http://userweb.kernel.org/~jmorris/lss2010_slides/EVM-security-summit.odp]
|Mimi Zohar, IBM <sup>*</sup>
+
|Mimi Zohar, IBM
 
|-
 
|-
 
|14:00
 
|14:00
|[[LinuxSecuritySummit2010/Abstracts/MacMillan_Secstate|Secstate: Integrating SCAP and Puppet for System Lockdown]]
+
|[[LinuxSecuritySummit2010/Abstracts/MacMillan_Secstate|Secstate: Integrating SCAP and Puppet for System Lockdown]]  [http://userweb.kernel.org/~jmorris/lss2010_slides/Secstate_Overview.pdf]
|Karl MacMillan, Tresys <sup>*</sup>
+
|Karl MacMillan, Tresys
 
|-
 
|-
 
|''14:30''
 
|''14:30''
Line 56: Line 66:
 
|-
 
|-
 
|15:00
 
|15:00
|[[LinuxSecuritySummit2010/Abstracts/Cook_Tree|Widely Used But Out-Of-Tree]]
+
|[[LinuxSecuritySummit2010/Abstracts/Cook_Tree|Widely Used But Out-Of-Tree]]  [http://userweb.kernel.org/~jmorris/lss2010_slides/out-of-tree.pdf]
 
|Kees Cook, Canonical
 
|Kees Cook, Canonical
 
|-
 
|-
 
|15:30
 
|15:30
|[[LinuxSecuritySummit2010/Abstracts/Schreuders_FBAC|Linux Security Usability: Restricting Programs Using SELinux, AppArmor and FBAC-LSM]]
+
|[[LinuxSecuritySummit2010/Abstracts/Schreuders_FBAC|Linux Security Usability: Restricting Programs Using SELinux, AppArmor and FBAC-LSM]]  [http://userweb.kernel.org/~jmorris/lss2010_slides/Schreuders_Linux_Security_Summit.pdf]
 
|Z. Cliffe Schreuders, Murdoch University
 
|Z. Cliffe Schreuders, Murdoch University
 
|-
 
|-
 
|16:00
 
|16:00
|[[LinuxSecuritySummit2010/Abstracts/Gallagher_SSSD|System Security Services Daemon (SSSD)]]
+
|[[LinuxSecuritySummit2010/Abstracts/Gallagher_SSSD|System Security Services Daemon (SSSD)]]  [http://userweb.kernel.org/~jmorris/lss2010_slides/sssd_slides.odp]
 
|Stephen Gallagher, Red Hat
 
|Stephen Gallagher, Red Hat
 
|-
 
|-
Line 70: Line 80:
 
|colspan="2" |''break''
 
|colspan="2" |''break''
 
|}
 
|}
 
''<small><sup>*</sup> Awaiting speaker confirmation</small>''
 
  
 
== Panel ==
 
== Panel ==
Line 79: Line 87:
 
!Time
 
!Time
 
!Topic
 
!Topic
 +
!Panel Members
 
!Moderator
 
!Moderator
 
|-
 
|-
 
|17:00
 
|17:00
 
|The viability of a standard Linux security API
 
|The viability of a standard Linux security API
 +
|Kees Cook, Serge Hallyn, Stephen Smalley
 
|Casey Schaufler, Smack Project
 
|Casey Schaufler, Smack Project
 
|-
 
|-
 
|17:20
 
|17:20
 
|Open Q&A
 
|Open Q&A
 +
|As above, plus Casey
 
|Paul Moore, HP
 
|Paul Moore, HP
 
|}
 
|}
Line 92: Line 103:
 
== Lightning talks and closing ==
 
== Lightning talks and closing ==
 
From approximately 18:00 to 18:30, we'll hold lightning talks and wrap up the event.
 
From approximately 18:00 to 18:30, we'll hold lightning talks and wrap up the event.
 +
 +
 +
{| border="1" cellpadding="6" cellspacing="0"
 +
!Time
 +
!Event
 +
!Moderator
 +
|-
 +
|18:00
 +
|Lightning Talks (5mins each) &nbsp; &nbsp; &nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 +
|Joshua Brindle, Tresys
 +
|-
 +
|''18:30''
 +
|colspan="2"|''finish''
 +
|}
 +
  
 
Lightning talks will be five minutes in length, with up to six slots.  Topics will be accepted on the day, with priority given to topics not accepted as main presentations.
 
Lightning talks will be five minutes in length, with up to six slots.  Topics will be accepted on the day, with priority given to topics not accepted as main presentations.

Latest revision as of 21:22, 24 August 2010

Contents

[edit] Overview

This is the schedule for the Linux Security Summit 2010, to be held in Boston in conjunction with Linuxcon on Monday, August 9th. The format of the event is a series of selected presentations, followed by a Q&A panel, and lightning talks. This schedule is subject to change: check this page for updates.

[edit] Registration

Time Event Notes
08:30 LinuxCon Registration and setup The registration desk will be open from 8am. Please arrive early enough to register (there may be queues) and get settled: we plan to start at 9am sharp.


[edit] Presentations

Presentation sessions are 30 minutes in length, including discussion.

Time Title Presenter
09:00 Recent Advances in the SELinux Sandbox [1] Dan Walsh, Red Hat
09:30 in ur webserver, writin ur logs [2] Joshua Brindle, Tresys
10:00 Integrating Security into Vyatta [3] Stephen Hemminger, Vyatta
10:30 break
11:00 MSF Security Framework Overview [4] Elena Reshetova, Nokia
11:30 Access Control in the MSF Security Framework [5] Janne Karhunen, Nokia
12:00 lunch (self-funded at nearby location)
13:00 Linux Security in 10 Years [6] Brad Spengler, grsecurity
13:30 Using EVM to protect security extended attributes [7] Mimi Zohar, IBM
14:00 Secstate: Integrating SCAP and Puppet for System Lockdown [8] Karl MacMillan, Tresys
14:30 break
15:00 Widely Used But Out-Of-Tree [9] Kees Cook, Canonical
15:30 Linux Security Usability: Restricting Programs Using SELinux, AppArmor and FBAC-LSM [10] Z. Cliffe Schreuders, Murdoch University
16:00 System Security Services Daemon (SSSD) [11] Stephen Gallagher, Red Hat
16:30 break

[edit] Panel

The panel session will start with a discussion topic, followed by open Q&A. Members of the panel will be determined closer to the event.

Time Topic Panel Members Moderator
17:00 The viability of a standard Linux security API Kees Cook, Serge Hallyn, Stephen Smalley Casey Schaufler, Smack Project
17:20 Open Q&A As above, plus Casey Paul Moore, HP

[edit] Lightning talks and closing

From approximately 18:00 to 18:30, we'll hold lightning talks and wrap up the event.


Time Event Moderator
18:00 Lightning Talks (5mins each)                  Joshua Brindle, Tresys
18:30 finish


Lightning talks will be five minutes in length, with up to six slots. Topics will be accepted on the day, with priority given to topics not accepted as main presentations.

Personal tools