Loading…

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Linux Security Summit (LSS) [clear filter]
Thursday, October 29
 

13:00 GMT

Opening Remarks - Elena Reshetova, Security Engineer, Intel Corporation
Speakers
avatar for Elena Reshetova

Elena Reshetova

Security engineer, Intel
Elena Reshetova is a security engineer and researcher at the Intel System Software Products Security group in Finland working with various Open Source platform security projects across the whole Linux platform security community.


Thursday October 29, 2020 13:00 - 13:05 GMT
LSS Theater
  Linux Security Summit (LSS)
  • Skill Level Any
  • Technical Talk Yes

13:05 GMT

Block Me if You Can: Subverting IMA - Tobias Mueller, University of Hamburg
This presentation investigates the resilience of IMA against malicious block devices. While it is not too surprising that all hope is lost if the hardware betrays you, we note that reprogramming hard-disk controllers is still relatively easy and the results may surprise some who sought to protect their machines with IMA. We find that users, in particular in the domain of critical infrastructure, may be susceptible in ways they have not considered. In this presentation, we demonstrate that the security guarantees of IMA can be undermined by way of a specially-crafted malicious block device, which delivers different data depending on whether the block has already been accessed. We extensively analyse the conditions which allow the attack to be launched and discuss how the attack affects certain use cases of IMA and discuss potential mitigations.

Speakers
TM

Tobias Mueller

Academic, University of Hamburg
Tobias is a German Free Software advocate, former member of the GNOME Foundation's Board of Directors, and Pythonista. He acquired a Masters degree in Security and Forensic computing from Dublin, is now working in the area of applied cryptography, and loves to build and break stuff... Read More →



Thursday October 29, 2020 13:05 - 13:50 GMT
LSS Theater
  Linux Security Summit (LSS)

14:00 GMT

Kernel Integrity Enforcement with HLAT In a Virtual Machine - Chao Gao, Intel Corporation
Some VMMs are using virtualization technology to enhance guest kernel security. Enforcing guest kernel integrity is a topic that has been explored many times. Read-only page where guest kernel locates can help to prevent tampering but cannot effectively prevent “remapping” attacks which edit guest page table to hijack control flow. Some solutions have to introduce complex mechanism (for example, track all guest page table changes somehow) to defend against “remapping” attack at the cost of performance. Hypervisor-manage linear address translation (HLAT), a new extension to Intel VT-x, provides an efficient solution to enforce guest kernel integrity. This presentation will analyze the challenges in kernel integrity enforcement, then describe how to enforce kernel integrity in a virtual machine with HLAT.

Speakers
CG

Chao Gao

Cloud Software Engineer, Intel
Chao has work for Intel for 4 years as a software engineer. He is responsible for enabling new Intel virtualization features in KVM/Xen and is familiar with interrupt virtualization, performance tuning and virtualization base security. Currently, Chao is working on using HLAT to enhance... Read More →



Thursday October 29, 2020 14:00 - 14:30 GMT
LSS Theater
  Linux Security Summit (LSS)

14:40 GMT

Introducing TPM NV Storage with E/A Policies and TSS-FAPI - Andreas Fuchs, Fraunhofer SIT
The TPM contains two major features; a certain amount of NV memory and the so-called Enhanced Authorization framework. The former can be configured as simple storage, but also as monotonic counter, or bitfield. The latter can be used to implement fine-grained access policies for access TPM objects, such as NV memory. This presentation will give an introduction into these concepts and demonstrates how the features of TPM NV and E/A policies can easily be used via the TPM Software Stacks's (TSS) Feature API (FAPI). This API includes a declarative language and processing engine for TPM E/A policies which for the first time make their use very easy. In order to illustrate their usefulness, a set of example use cases and configurations, such as WriteOnceReadMany (WORM) storage (for device serial numbers) or role-based access on a per-operation level for NV storage will be presented.

Speakers
AF

Andreas Fuchs

Head of Trustworthy Platform, Fraunhofer SIT
Andreas Fuchs is a TPM and OpenSource enthusiast involved with TCG. He is a maintainer of the OpenSource TPM Software Stack (TSS) 2.0, the tpm2tss OpenSSL engine and the tpm2-totp project. Andreas Fuchs studied computer science at the Technische Universität Darmstadt and the University... Read More →



Thursday October 29, 2020 14:40 - 15:25 GMT
LSS Theater
  Linux Security Summit (LSS)

15:40 GMT

Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds - Ravi Sahita & Jun Nakajima, Intel Corporation
Confidential computing focuses on data-in-use protection - a large volume of sensitive data-in-use is processed in public clouds, where the trusted computing base (TCB) is large including hypervisors, host operating system, operators, orchestration software, devices (with firmware), and BIOS. This talk describes the architectural extensions (CPU and platform) to enable hardware-isolated virtual machines for confidential computing in an untrustworthy public cloud environment. The proposed architecture enables the TCB of the cloud environment to be reduced substantially while providing the ability to shift existing applications without recompilation. The talk will describe the platform capabilities to address the threats and security objectives, starting with a threat model and will discuss future requirements for an increasingly heterogeneous computing environment with diverse workloads.

Speakers
avatar for Jun Nakajima

Jun Nakajima

Sr. Principal Engineer, Intel Corp.
Jun Nakajima is a Senior Principal Engineer at the Intel Open Source Technology Center, leading open source virtualization, such as KVM and Xen. Jun presented a number of times at technical conferences, including KVM Forum, Xen Summit, LinuxCon, OpenStack Summit, and USENIX. He has... Read More →
avatar for Ravi Sahita

Ravi Sahita

Sr. Principal Engineer and Security Architect, Intel Corp.
Ravi Sahita is a Senior Principal Engineer at Intel in the Data Platforms Group. He has 20 years of experience in computer security, hardware virtualization, systems and platform software, CPU ISA and applying machine learning for security. His current focus is on architecture development... Read More →


Thursday October 29, 2020 15:40 - 16:25 GMT
LSS Theater
  Linux Security Summit (LSS)

16:40 GMT

Network File System Security Overview: Securing SMB3 - Steven French, Microsoft
Network file systems on Linux present challenging security problems, especially as data moves to the cloud and clustered storage. This presentation will provide an overview of security considerations, focusing on the most popular file system protocol (SMB3), its security features, and areas its integration with Linux security components. Access to storage over these protocols is often encrypted, and relies on other security protocols for authentication, verifying claims and id mapping. Integration with future security protocols will be needed, and also finding better interfaces to map a user's identity among the 4 ways it is represented in Linux (username, POSIX UID, SID, OID). As more data moves to remote storage, the importance of network file system security becomes more critical. This presentation will discuss where we are and areas where additional improvements are needed.

Speakers
SF

Steven French

Principal Software Engineer - Azure Storage, Microsoft
Steve French is a member of the Samba team, and Principal Software Engineer at Microsoft (Azure Storage), and long time maintainer (as well as original author) of one of the more active Linux file systems (cifs.ko), and a frequent presenter at SMB and storage conferences (including... Read More →



Thursday October 29, 2020 16:40 - 17:25 GMT
LSS Theater
  Linux Security Summit (LSS)

17:25 GMT

Overview of the Crypto-engine Improvements - Iuliana Prodan, NXP Semiconductors
dm-crypt is the Linux kernel's device mapper that provides transparent encryption of block devices using the kernel Crypto API. Linaro provided crypto engine framework to replace the in-house solutions provided by various hardware drivers. Crypto engine framework implements the queue and thread for pushing requests to the hardware, as the hardware becomes free so that drivers could use it. This talk will first detail the basics about crypto-engine framework, highlighting how it works and how hardware drivers use it. Then, some information about the new added features: support for executing multiple, independent or not, requests based on a retry mechanism, support for batch requests. At the end will draw some conclusions regarding performance improvements and why should be crypto engine the de facto crypto queue manager.

Speakers
avatar for Iuliana Prodan

Iuliana Prodan

Software engineer, NXP Semiconductors
Currently part of the NXP Security Technology Excellence Center (STEC) in Romania. Working on adding new features to CAAM (Cryptographic Accelerator and Assurance Module) driver and looking to improve crypto frameworks/API.



Thursday October 29, 2020 17:25 - 17:55 GMT
LSS Theater
  Linux Security Summit (LSS)
 
Friday, October 30
 

13:00 GMT

State of the User Namespace - Stephane Graber & Christian Brauner, Canonical
The user namespace first started off as a way to run safer containers, preventing trivial container escapes and privilege escalations. It has since evolved into a versatile tool used by container managers as well as a growing number of other software, ranging from network services to web browsers. In this talk we'll go over the main characteristics of the user namespace, its current uses, recent improvements and new features as well as going over some of the upcoming work on it.

Speakers
avatar for Stéphane Graber

Stéphane Graber

Project leader for LXD, LXC and LXCFS, Canonical Ltd.
Stéphane Graber is the engineering manager for the LXD team at Canonical Ltd. He is the upstream project leader for LXC and LXD and a frequent speaker and track leader at events related to containers and Linux. Stéphane is also a longtime contributor to the Ubuntu Linux distribution... Read More →
avatar for Christian Brauner

Christian Brauner

Senior Software Engineer, Canonical
Christian Brauner is a kernel developer and maintainer of the LXD and LXC projects currently working at Canonical. He works mostly upstream on the Linux Kernel maintaining various bits and pieces. He is strongly committed to working in the open, and an avid proponent of Free Software... Read More →



Friday October 30, 2020 13:00 - 13:45 GMT
LSS Theater
  Linux Security Summit (LSS)

14:00 GMT

TBOOT and Secure Boot Coexistence to Launch OS Even More Securely - Łukasz Hawryłko, Intel Corporation
Intel TXT is a D-RTM technology that allows to set-up trusted environment by measuring boot process components. Measurements, stored in TPM, can be verified by local or remote attestation to detect any inconsistency in the boot process. UEFI Secure Boot has a similar goal, however, it is achieved in different ways. In opposite to Intel TXT, Secure Boot is an S-RTM technology that requires to maintain trusted chain from the beginning of system power up. TBOOT is an implementation of MLE in Intel TXT dedicated for Linux kernel based OS and Xen VMM. The current version does not support Secure Boot, so there is no possibility to enable Intel TXT and Secure Boot simultaneously when using TBOOT. This presentation discusses the possibilities of enabling Secure Boot in TBOOT and what benefits come from that.

Speakers
LH

Łukasz Hawryłko

Security Engineer, Intel
I am working at Intel in BIOS Security team, where I am an architect and leading developer of TBOOT project. In my job, I am also working with Open Source community to help in enabling Intel TXT on Linux based systems.



Friday October 30, 2020 14:00 - 14:45 GMT
LSS Theater
  Linux Security Summit (LSS)

15:00 GMT

Bypassing Many Kernel Protections Using Elastic Objects - Yueqi Chen & Zhepeng Lin, Ph.D. Students
We will analyze an anecdotal exploit that demonstrates the capability of bypassing KASLR, using an elastic object in the Linux kernel implementation. We justify this exploit could be abstracted and extended as a general exploitation practice. First, the Linux kernel contains a large number of such elastic objects, by using which, nearly any kernel vulnerabilities (with an overwriting capability) could enable the adversary to easily bypass heap cookie protector, KASLR, stack canary, and even realize an arbitrary read attack. Second, we show that Linux is not the only kernel using these objects for implementation. Other OS kernels, e.g., XNU, also adopt the same practice. Third, we conclude that elastic kernel objects are perilous as they provide a new, general approach to breaking existing protection mechanisms, and thus new defense should be designed as a part of kernel hardening.

Speakers
avatar for Yueqi Chen

Yueqi Chen

Ph.D. Student, Pennsylvania State University
Yueqi (Lewis) Chen received his B.Sc degree from Nanjing University in 2017 and is currently a Ph.D. student with Dr. Xinyu Xing at Pennsylvania State University. He was awarded the IBM Ph.D. Fellowship 2020. His research focuses on OS security and vulnerability analysis. He is particularly... Read More →
ZL

Zhenpeng Lin

Ph.D. Student, Pennsylvania State University
Zhenpeng Lin is a first-year Ph.D. student advised by Dr. Xinyu Xing at Pennsylvania State University. His research focuses on vulnerability discovery and exploitation. He plays CTF a lot. As a core member of Nu1L, he won 1st place in BCTF 2017, BCTF 2018, Baidu AI CTF, WCTF Junior... Read More →


Friday October 30, 2020 15:00 - 15:45 GMT
LSS Theater
  Linux Security Summit (LSS)

16:00 GMT

Container Runtime Support for SGX and TEE Environment - Isaku Yamahata, Intel Corporation
Recently Trusted Execution Environment(TEE) is getting momentum as Linux Foundation founded Confidential Computing Consortium(CCC) and cloud service providers have already provided such environments. Container runtime support is key feature so that TEE can be easily managed in cloud environment like kubernetes. We discuss taxonomy of container support of TEE first and then how it will be implemented concretely. For example, Function-As-A-Service requir es different characteristic from normal container support, so does its design for container runtime. Lastly Graphene-LibOS Shielded Container(GSC) is introduced as concrete Example.

Speakers
avatar for Isaku Yamahata

Isaku Yamahata

Software engineer, Intel
Isaku Yamahata is a Software architect in the Open Source Technology Center, Intel. His main focus is virtualization technology, network virtualization as Software Defined Networking for multiple years. Isaku is an active on Graphene LibOS and OpenStack Neutron (networking) and has... Read More →



Friday October 30, 2020 16:00 - 16:45 GMT
LSS Theater
  Linux Security Summit (LSS)

17:00 GMT

Would Abandoning the C Language Really Help? - Moderated by Casey Schaufler; Steve Klabnik, Rustacean; Julia Lawall, Inria & Yannick Moy, AdaCore
Many vulnerabilities stem from easily-made errors in C and C++. This includes their many undefined behaviors, such as buffer overflows and double-frees. Other systems programming languages (such as Rust and Ada)have been developed that prevent or reduce the likelihood of these defects. Firefox is reimplementing parts of its code in Rust, and curl is investigating using the Hyper Rust library. 
What are the pros and cons of trying to switch parts of a larger system, like the Linux kernel, to a language designed to reduce the likelihood or impact of defects? What are the lessons learned?
Is it worth it?

Speakers
avatar for Casey Schaufler

Casey Schaufler

Engineer, Intel
Casey Schaufler worked on Unix kernels in the 1970s-90s. He has implemented access control lists, mandatory access control, extended filesystem attributes, X11 access controls, network protocols and audit systems. His involvement in Linux began with the Linux Security Module work... Read More →
avatar for Steve Klabnik

Steve Klabnik

Rustacean, Oxide Computer
Steve is the co-author of the Rust book.
JL

Julia Lawall

Researcher, Inria
verification, scheduling, coccinelle
avatar for Yannick Moy

Yannick Moy

Engineer, AdaCore
Yannick Moy is SPARK Product Manager at AdaCore and co-director of the ProofInUse joint laboratory with Inria. At AdaCore, he works on software source code analyzers CodePeer and SPARK, aiming either at detecting bugs or at verifying safety/security properties. Yannick leads... Read More →


Friday October 30, 2020 17:00 - 18:00 GMT
LSS Theater
  Linux Security Summit (LSS)
  • Skill Level Any
  • Technical Talk No

18:00 GMT

Closing Remarks - Elena Reshetova, Security Engineer, Intel Corporation
Speakers
avatar for Elena Reshetova

Elena Reshetova

Security engineer, Intel
Elena Reshetova is a security engineer and researcher at the Intel System Software Products Security group in Finland working with various Open Source platform security projects across the whole Linux platform security community.


Friday October 30, 2020 18:00 - 18:05 GMT
LSS Theater
  Linux Security Summit (LSS)
  • Skill Level Any
  • Technical Talk No
 

Twitter Feed