Difference between revisions of "AFSecurity Seminar"

From mn/ifi/AFSecurity
Jump to: navigation, search
 
(21 intermediate revisions by the same user not shown)
Line 1: Line 1:
== Building Cyber Defense Training Capacity ==
+
== ''Confidential Computing'' ==
  
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
|-
 
|-
| '''TIME:'''&nbsp; Friday 17 June 2022, 14:00h<br />'''PLACE:'''&nbsp;  Kristan Nygaards Hall (Room 5370), 5th floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. [https://kart.finn.no/?lng=10.71782&lat=59.94342&zoom=17&mapType=normap&markers=10.71782,59.94342,r,Gaustadall%C3%A9en+23B See map].<br />
+
| '''TIME:'''&nbsp; Friday 1 December 2023, 14:00h<br />'''PLACE:'''&nbsp;  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. [https://kart.finn.no/?lng=10.71782&lat=59.94342&zoom=17&mapType=normap&markers=10.71782,59.94342,r,Gaustadall%C3%A9en+23B See map].<br />
Coffee and snaks served.<br />
+
All interested are welcome. Coffee and snaks served.<br />
 
<br />'''AGENDA:'''<br />
 
<br />'''AGENDA:'''<br />
14:00h Welcome at IFI and AF''Security''<br />14:15 Invited talk<br />
+
14:00h Welcome to AFSecurity at UiO <br />
* TITLE: ''Building Cyber Defense Training Capacity'' &nbsp;
+
14:15h Invited talk<br />
* SPEAKER: Erik Moore, Regis University, USA
+
* TITLE: ''Confidential Computing'' &nbsp;
| <center>[[File:photo-Erik-Moore.jpg|150px|link=https://regis.academia.edu/EMoore]]</center>
+
* SPEAKER: Ijlal Loutfi, Canonical 
| <center>[[File:logo-Regis-University.png|200px|link=https://www.regis.edu/]]</center>
+
| <center>[[File:photo-Ijlal-Loutfi.png|90px|link=https://www.linkedin.com/in/ijlal-loutfi-785125234/]]</center>
 +
| <center>[[File:logo-Canonical.png|320px|link=https://canonical.com/]]</center>
 
|}
 
|}
* ABSTRACT:<br />This talk covers methods and modeling for building society’s capacity to defend digital infrastructure and the systems that rely on it. The modeling is based on a decade of work in the USA that include training state National Guard cyber defense teams focused on protecting infrastructure, hosting cyber defense competitions like the [https://www.regis.edu/academics/colleges-and-schools/anderson/rmccdc#:~:text=The%20Rocky%20Mountain%20Collegiate%20Cyber,their%20cybersecurity%20knowledge%20and%20abilities. Rocky Mountain Region Collegiate Cyber Defense Competition], designing course-specific cybersecurity laboratory space, establishing government relationships, and creating cyber range space for hosting related events at Regis University.  Topics covered include related technology deployments, program evaluation, psychometric decision support tools, team dynamics, inter-organizational structures, and the surrounding ecosystem of resources.<br />
+
* ABSTRACT:<br />Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.<br /><br />Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.<br /><br />In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.
  
'''BIO:''' &nbsp; Erik Moore is a founding co-director of Regis University’s [https://www.regis.edu/academics/colleges-and-schools/anderson/cofr-cias Colorado Front Range Center for Information Assurance Studies] in 2007 where he has guided research projects and taught cybersecurity & technology courses.  He holds a Ph.D. in cybersecurity from the University of Plymouth, UK.  His work with National Guard cyber defense teams and the National Guard Bureau informs his work in this area.  He is also the Editor-in-chief of the Journal of [https://cisse.info/journal/index.php/cisse The Colloquium for Information Systems Security Education] and Chair of [https://www.ifiptc11.org/wg118 IFIP Working Group 11.8], known for hosting the World Information Security Education conference.  
+
<br />15:00h Discussion<br />
 +
 
 +
'''BIO:''' &nbsp; Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.
 +
 
 +
 
 
<br /><br />
 
<br /><br />
  
Line 20: Line 25:
 
|-
 
|-
 
| [[File:AFSecurity-small.png|250px]]
 
| [[File:AFSecurity-small.png|250px]]
| AF''Security'' is organised by UiO [https://www.mn.uio.no/ifi/english/research/groups/sec/ Digital Security] in collaboration with OsloMet.
+
| AF''Security'' is organised by UiO [https://www.mn.uio.no/ifi/forskning/grupper/sec/ Digital Security].
 
| [[File:logo-uio-english-2022.png|250px|link=https://www.mn.uio.no/]]
 
| [[File:logo-uio-english-2022.png|250px|link=https://www.mn.uio.no/]]
 
| [[File:Sec-light-360.png|150px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
 
| [[File:Sec-light-360.png|150px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
 
|}
 
|}

Latest revision as of 15:30, 14 November 2023

Confidential Computing

TIME:  Friday 1 December 2023, 14:00h
PLACE:  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. See map.

All interested are welcome. Coffee and snaks served.

AGENDA:
14:00h Welcome to AFSecurity at UiO
14:15h Invited talk

  • TITLE: Confidential Computing  
  • SPEAKER: Ijlal Loutfi, Canonical
Photo-Ijlal-Loutfi.png
Logo-Canonical.png
  • ABSTRACT:
    Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.

    Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.

    In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.


15:00h Discussion

BIO:   Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.




AFSecurity-small.png AFSecurity is organised by UiO Digital Security. Logo-uio-english-2022.png Sec-light-360.png