
-
9:00am • Welcome - James Morris, Oracle
-
9:05am • ARMv8.3 Pointer Authentication - Mark Rutland, ARM Ltd.
-
9:50am • Defeating Invisible Enemies: Firmware Based Security in the OpenPOWER Platform - George Wilson, IBM
-
10:45am • Landlock LSM: Toward Unprivileged Sandboxing - Mickaël Salaün, Developer
-
11:30am • The State of Kernel Self-Protection - Kees Cook, Google
-
1:45pm • Confessions of a Security Hardware Driver Maintainer - Gilad Ben-Yossef, ARM
-
2:30pm • CII Best Practices Badge, 1.5 Years Later - David Wheeler, IDA
-
3:30pm • The Smack 10th Year Update - Casey Schaufler, The Smack Project
-
3:50pm • Integrity Subsystem Update - Mimi Zohar, IBM
-
4:10pm • TPM Subsystem Update - Jarkko Sakkinen, Intel Corporation
-
4:40pm • BoF: Extreme Security Module Stacking - Issues and Directions - Casey Schaufler, The Smack Project
-
5:15pm • BoF: Namespacing LSM Subsystems - John Johansen, Canonical Group Ltd.
-
9:00am • Hatching Security: LinuxKit as Security Incubator -Tycho Andersen & Riyaz Faizullabhoy, Docker
-
9:45am • Running Linux in a Shielded VM - Michael Kelley, Microsoft
-
10:40am • Keys Subsystem - Dave Howells, Red Hat
-
11:25am • Protecting VM Register State with AMD SEV-ES - David Kaplan, AMD
-
1:40pm • Proposal of a Method to Prevent Privilege Escalation Attacks for Linux Kernel - Yuichi Nakamura, Hitachi,Ltd & Toshihiro Yamauchi, Okayama University
-
2:25pm • SELinux in Android O: Separating Policy to Allow for Independent Updates - Daniel Cashman, Google
-
3:20pm • SELinux Subsystem Update - Paul Moore, Red Hat
-
3:40pm • AppArmor Subsystem Update - John Johansen, Canonical Group Ltd.
-
4:00pm • Seccomp Subsystem Update - Kees Cook, Google
-
4:30pm • Securing Automated Decryption - Nathaniel McCallum, Red Hat
-
5:15pm • BoF Sessions - To Be Announced