Difference between revisions of "AFSecurity Seminar"

From mn/ifi/AFSecurity
Jump to: navigation, search
 
(10 intermediate revisions by the same user not shown)
Line 1: Line 1:
 +
== ''Confidential Computing'' ==
 +
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
|-
 
|-
| '''TIME:'''&nbsp; Friday 9 June 2023, 14:00h<br />'''PLACE:'''&nbsp;  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. [https://kart.finn.no/?lng=10.71782&lat=59.94342&zoom=17&mapType=normap&markers=10.71782,59.94342,r,Gaustadall%C3%A9en+23B See map].<br />
+
| '''TIME:'''&nbsp; Friday 1 December 2023, 14:00h<br />'''PLACE:'''&nbsp;  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. [https://kart.finn.no/?lng=10.71782&lat=59.94342&zoom=17&mapType=normap&markers=10.71782,59.94342,r,Gaustadall%C3%A9en+23B See map].<br />
Coffee and snacks will be served.<br />
+
All interested are welcome. Coffee and snaks served.<br />
 
<br />'''AGENDA:'''<br />
 
<br />'''AGENDA:'''<br />
14:00h Welcome at IFI and AF''Security''<br />14:15 Invited talk<br />
+
14:00h Welcome to AFSecurity at UiO <br />
* TITLE: ''Challenges in Learning from Behaviour'' &nbsp;
+
14:15h Invited talk<br />
* SPEAKERS: David Aspinall and Robert Flood, University of Edinburgh
+
* TITLE: ''Confidential Computing'' &nbsp;
| <center>[[File:photo-Daniela-Poehn.jpg|150px|link=https://dpoehn.de]]</center>
+
* SPEAKER: Ijlal Loutfi, Canonical 
| <center>&nbsp;&nbsp;[[File:logo-univ-edinbourgh.png|150px|link=https://www.ed.ac.uk/]]</center>
+
| <center>[[File:photo-Ijlal-Loutfi.png|90px|link=https://www.linkedin.com/in/ijlal-loutfi-785125234/]]</center>
 +
| <center>[[File:logo-Canonical.png|320px|link=https://canonical.com/]]</center>
 
|}
 
|}
* ABSTRACT:<br />Artificial Intelligence and Machine Learning are promoted as solutions for cyber security which can adapt to changes in attacker behaviour, learning models from data to distinguish what is normal and what may consitute a threat. Despite much research, there are still fundamental challenges in each stage of the process which prevent us having good benchmarks to understand the robustness of state-of-the-art models. The challenges span: collecting and sharing data safely, ensuring a sufficient fidelity and diversity of data, and then understanding model performance. We will consider these challenges in turn and present some recent research results which address each aspect. Under the second challenge, we will introduce some work-in-progress on identifying "bad smells" for cyber security datasets used for training.<br />
+
* ABSTRACT:<br />Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.<br /><br />Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.<br /><br />In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.
 +
 
 +
<br />15:00h Discussion<br />
  
'''BIO:''' &nbsp;  
+
'''BIO:''' &nbsp; Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.
<br />David Aspinall is Professor of Software Safety and Security at the University of Edinburgh. He is Director of the University's UK government recognised Academic Centre of Excellence in Cyber Security Research and was a Fellow of the Alan Turing Institute from 2015-2021.
 
His research interests range from foundations for formal methods in software security to more applied areas including anomaly detection in network security.
 
 
Robert Flood is a PhD student in the University of Edinburgh where he previously studied for an MSc in Computer Science. His PhD primarily focuses on synthetic data generation for training anomaly detection systems. He has also worked with cyber security data anonymisation and software  correctness with The Turing Institute and The University of Edinburgh.
 
  
 +
 
 +
<br /><br />
  
 
{| border="0" cellpadding="1" cellspacing="1" width="90%"
 
{| border="0" cellpadding="1" cellspacing="1" width="90%"
 
|-
 
|-
 
| [[File:AFSecurity-small.png|250px]]
 
| [[File:AFSecurity-small.png|250px]]
| AF''Security'' is organised by UiO [https://www.mn.uio.no/ifi/english/research/groups/sec/ Digital Security].
+
| AF''Security'' is organised by UiO [https://www.mn.uio.no/ifi/forskning/grupper/sec/ Digital Security].
 
| [[File:logo-uio-english-2022.png|250px|link=https://www.mn.uio.no/]]
 
| [[File:logo-uio-english-2022.png|250px|link=https://www.mn.uio.no/]]
 
| [[File:Sec-light-360.png|150px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
 
| [[File:Sec-light-360.png|150px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
 
|}
 
|}

Latest revision as of 15:30, 14 November 2023

Confidential Computing

TIME:  Friday 1 December 2023, 14:00h
PLACE:  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. See map.

All interested are welcome. Coffee and snaks served.

AGENDA:
14:00h Welcome to AFSecurity at UiO
14:15h Invited talk

  • TITLE: Confidential Computing  
  • SPEAKER: Ijlal Loutfi, Canonical
Photo-Ijlal-Loutfi.png
Logo-Canonical.png
  • ABSTRACT:
    Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.

    Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.

    In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.


15:00h Discussion

BIO:   Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.




AFSecurity-small.png AFSecurity is organised by UiO Digital Security. Logo-uio-english-2022.png Sec-light-360.png