-
9:00am • Welcome & Opening Remarks - James Morris, Microsoft
-
9:05am • Enarx - Attested, Secured Execution with AMD’s SEV - Nathaniel McCallum, Red Hat, Inc. & David Kaplan, Advanced Micro Devices, Inc.
-
9:50am • TrenchBoot - How to Nicely Boot System with Intel TXT and AMD SVM - Daniel Kiper, Oracle & Daniel Smith, Apertus Solutions*
-
10:30am • Coffee Break
-
10:50am • Making Containers Safer - Stéphane Graber & Christian Brauner, Canonical Ltd.*
-
11:35am • Kernel Runtime Security Instrumentation - KP Singh, Google *
-
1:45pm • Breaking and Protecting Linux Kernel Stack - Elena Reshetova, Intel*
-
2:30pm • Securing TPM Secrets with TXT and Kernel Signatures - Paul Moore, Cisco*
-
3:10pm • Coffee Break
-
3:30pm • Tutorial: The Why and How of libseccomp - Tom Hromatka, Oracle & Paul Moore, Cisco*
-
9:00am • Keynote: Retrospective: 26 Years of Flexible MAC - Stephen Smalley, National Security Agency*
-
9:55am • NFS Support for the Linux Integrity Measurement Architecture - Chuck Lever, Oracle Corporation *
-
10:30am • Coffee Break
-
10:50am • Application Whitelisting - Steven Grubb, Red Hat*
-
11:35am • Rich Authorization in a Resource Constrained Device - Kenneth Goldman, IBM*
-
1:45pm • Writing Linux Kernel Modules in Safe Rust - Geoffrey Thomas, Two Sigma Investments & Alex Gaynor, Alloy*
-
2:30pm • Integrity Measurements and the Cruel World - Janne Karhunen, Dark Matter LLC*
-
3:10pm • Coffee Break
-
3:30pm • Tutorial: Complete Platform Attestation: Remotely Verifying the Authenticity and Integrity of your Platform’s Hardware, Firmware, and Software - Monty Wiseman & Avani Dave, General Electric
-
9:00am • Tutorial: How to Write a Linux Security Module - Casey Schaufler, Intel*
-
10:50am • Kernel Self-Protection Project - Kees Cook, Google*
-
11:25am • Making Remote Attestation Useful on Linux - Brandon Weeks & Matthew Garrett, Google*
-
12:00pm • It's Coming From Inside the House: Kernelspace Fault Injection with KRF - William Woodruff, Trail of Bits*
-
2:00pm • Using and Implementing Keyring Restrictions for Userspace - Mat Martineau, Intel *
-
2:35pm • syzkaller Update and Open Problems - Dmitry Vyukov, Google*
-
3:10pm • Binary Policy with IMA and AppArmor - Eric Chiang, Google
-
4:00pm • Subsystem Update: State of SELinux, 2019 - Paul Moore, Cisco*
-
4:10pm • Subsystem Update: AppArmor Update 2019 - John Johansen, Canonical
-
4:20pm • Subsystem Update: tpm2-Software Update and Highlights - Philip Tricca, Intel
-
4:30pm • Subsystem Update: Seccomp, Yama, and LoadPin - Kees Cook, Google*
-
4:40pm • Subsystem Update: Linux Integrity Status Update - Mimi Zohar, IBM*
-
4:50pm • Subsystem Update: LSM Stacking - What You Can Do Now and What's Next - Casey Schaufler, Intel
-
4:55pm • Subsystem Update: The 2019 Smack Update - Casey Schaufler, Intel*
-
5:00pm • Lightning Talks
-
5:30pm • Closing Remarks - James Morris, Microsoft